Microsoft Security Bulletin (MS00-014) - Microsoft has released a patch for a security vulnerability in Microsoft SQL Server 7.0 and Microsoft Data Engine (MSDE) 1.0. The vulnerability allows the remote author of a malicious SQL query to take unauthorized actions on a SQL Server or MSDE database or on the underlying system that was hosting the SQL Server or MSDE database. Microsoft FAQ on this issue available here.
8d650d7fe06feed9d6f924164a526de1a196bb37989f31654e55b160cb9fc6d2
Etherape is an etherman clone which displays network activity graphically. Active hosts are shown as circles of varying size, and traffic among them is shown as lines of varying width. It is GNOME and pcap based.
af5a3f6322396ee300dffa541d0902f8100c6b57793c100f90495e87d0310a52
Etherape is an etherman clone which displays network activity graphically. Active hosts are shown as circles of varying size, and traffic among them is shown as lines of varying width. It is GNOME and pcap based.
632f77c87e73173885b742cad8f0bb57fd19a7848c771aa8f034e2fae4aa6813
By default, printtool leaves world readable printer passwords on Redhat 6.1 and 6.2B.
83f0b23844e3d51becdd970b58879110654e3fa689b5b2e538daa609a6c683df
This document is a technical analysis of the Tribe Flood Network 2000 (TFN2K) distributed denial-of-service (DDoS) attack tool, the successor to the original TFN Trojan by Mixter. Additionally, countermeasures for this attack are also covered.
52ca3aa11a97181fd8f458991f35f7642c2e78842154cb4db563dd4b37504103
Unofficial fix for the /con/con vulnerability. Win 95/98/se server operators may want to give it a try.
a635bc88b5678393faa4c2557a2cbd5c81f473f66f7c9eae1ec7f9cbef6f267d
Debian Security Advisory - The version of mtr as distributed in Debian GNU/Linux 2l1 did not drop root privileges correctly. While there are no known exploits it is conceivable that a weakness in gtk or ncurses could be used to exploit this. Debian security homepage here.
700b8cd7130f87834567c495ee277853ced57c9ca1b4d0cf4ca2798f7791f817
L0pht Research Labs Advisory - Microsoft ClipArt Gallery Overflow. An attacker can seize control of a Windows 95, 98, NT, or 2000 machine via any HTML source, including Microsoft Outlook e-mail. Proof of conccept exploit included.
2ec7de2c3c3d0f143a2c07d960d34afb1a67c52f1b03a5b7f8a09bed7e065237
Another new way to find the web root directory of an IIS 4.0 webserver, if it is run on a share, by requesting a .idq file.
6d259cef445a382e76d7f2c57cdb31eb4e7c9398b37fca02edd6435795568276
Pocsag v2.05, a popular pager decoding software by default accepts connections on port 8000 with a default password, even remote access is not enabled, allowing anyone to view the decoded data.
03c142a6dd83e470a50a1c6cce1fe8e287e9b2fe23130ae7f6ad2b167c84d37b
Red Hat Security Advisory - New nmh packages are available to fix a remote vulnerability in nmh.
180cf743dd3838fcaeafbfb168f90185b0525bc0ba12b216f4aee5952a760ac7