lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Date: Thu Jun 30 18:08:24 2005
From: OPinson-Roxburgh at getech.co.uk (Oliver Pinson-Roxburgh)
Subject: Cisco Router IOS History Bug 

I have been running some scans on some of our Cisco kit and one of our
scanners came up with the following vulnerability :

Cisco Router IOS History Bug 
CVE ID:CVE-2000-0368 
Vendor Reference:CSCdk43920 

I would like to clarify this vulnerability by hand if possible. Does any
one have any way of hand craft testing this vulnerability? A POC or any
other information on this? 
 
 

--------------------------------------------------------------------------------
This electronic message contains information from Getech Limited, 
which may be privileged and confidential. The information is intended 
to be for the use of the individual(s) or entity named above. If you 
are not the intended recipient, be aware that any disclosure, copying, 
distribution or use of the contents of this information is prohibited. 
If you have received this electronic message in error, please notify 
me immediately. Opinions, conclusions and other information in this 
message that do not relate to the official business of Getech Limited 
shall be understood as neither given nor endorsed by Getech Limited.

Getech filters & monitors all Internet communications. 
--------------------------------------------------------------------------------
-------------- next part --------------
An HTML attachment was scrubbed...
URL: http://lists.grok.org.uk/pipermail/full-disclosure/attachments/20050630/6b91ecf8/attachment.html

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ