lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Date: Fri, 28 Nov 2003 14:55:39 -0500
From: "Chris Mann" <>
To: <>, <>,
	<>, <>,
	<>, <>
Subject: Re: Multiple Remote Issues in Applied Watch IDS Suite
	(advisory attached)

Could you please provide which versions of Command Center these exploits
were found?


Christopher Mann, SAGE
Systems Administrator
Stonebridge Bank

>>> Bugtraq Security Systems <> 11/28/2003 2:10:24
PM >>>
Hello Lists,

We have recently concluded a comprehensive audit of the Applied Watch
Command Center, which resulted with the discovering of hundreds of

This is the first of many future advisories on the IDS suite, which
discusses two remote issues in the authentication mechanisms used.

Working proof-of-concept code is included.

There is currently no patch available from the vendor, so consider the
Threatcon[1] to be higher than normal.

Please see the attached advisory for more information.

Team Bugtraq Security
Research Division of Bugtraq Security Systems, Incorporated. 

[1] The Global Internet ThreatCon, 

" - Keeping Track of Bugs (tm)"

Powered by blists - more mailing lists