On Fri, 4 Jun 2004 [EMAIL PROTECTED] wrote:
Anyone know anyone at weather.com?
No, but I must share that I am perhaps for the first time on this list
truly scared of what you might have discovered.
A weather control exploit?
--
- bash$ :(){ :|:};: --
Michal Zalewski
Michal Zalewski wrote:
On Fri, 4 Jun 2004 [EMAIL PROTECTED] wrote:
Anyone know anyone at weather.com?
No, but I must share that I am perhaps for the first time on this list
truly scared of what you might have discovered.
A weather control exploit?
*lol* You can Control the Weather on
Am 05.06.2004 um 11:26 schrieb Michal Zalewski:
On Fri, 4 Jun 2004 [EMAIL PROTECTED] wrote:
Anyone know anyone at weather.com?
No, but I must share that I am perhaps for the first time on this list
truly scared of what you might have discovered.
Some XSS probably.
A weather control exploit?
While
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Gentoo Linux Security Advisory GLSA 200406-03
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
I found the following IBM advisory via their outside advisory service:
http://www-1.ibm.com/support/docview.wss?uid=swg21168762
They refer to an externally available paper that identifies a form of
credential impersonation exploit that can affect multiple IBM
products. Does anybody know
On Thursday, 2004-06-03 at 19:35:22 +0200, Tom Knienieder wrote:
Possibly vulnerable (not verified)
WG602 with other Firmware Versions
WG602v2
The WG602v2 uses different firmware.
Download the WG602 Version 1.5.67 firmware from Netgear
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
- --
Debian Security Advisory DSA 515-1 [EMAIL PROTECTED]
http://www.debian.org/security/ Matt Zimmerman
June 5th, 2004
On Sat, 5 Jun 2004, Michal Zalewski wrote:
On Fri, 4 Jun 2004 [EMAIL PROTECTED] wrote:
Anyone know anyone at weather.com?
No, but I must share that I am perhaps for the first time on this list
truly scared of what you might have discovered.
A weather control exploit?
didn't they try
[SNIP]
How are these system getting compromised? Why don't you have this patch
deployed yet? Why are these systems reachable from the Internet over
port
445?
For someone who knows nothing about his network, you sure are willing
to make a lot of assumptions. You admit you
SMC has released updated firmware for their 7008ABRv2 (part number: 750.9814)
and 7004VBRv1 routers that permanently fixes the port 1900 issue, making port
1900 no longer be WAN (internet) accessible.
The firmware update for the 7008ABRv2 (version 1.035) is available from:
My WG602v2 with firmware 2.0RC5 does not appear to be vulnerable.
I cannot login with the super/5777364 combination.
Lupe Christoph wrote:
On Thursday, 2004-06-03 at 19:35:22 +0200, Tom Knienieder wrote:
Possibly vulnerable (not verified)
WG602 with other Firmware Versions
CORRECTION - Firmware is 3.1RC5 not 2.0RC5 as I first stated
My WG602v2 with firmware 3.1RC5 does not appear to be vulnerable.
^^
I cannot login with the super/5777364 combination.
Lupe Christoph wrote:
On Thursday, 2004-06-03 at 19:35:22 +0200, Tom Knienieder wrote:
Hi,
We use Symantec Corporate Anti-Virus here at the University of
Richmond for all faculty, staff and student Windows machines.
Several institutions have expressed interest in a script that I
wrote to have the logs from the virus server sorted and e-mailed daily.
It is
13 matches
Mail list logo