lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <200403121510.i2CFAY1D063921@mailserver3.hushmail.com> From: bart2k at hushmail.com (bart2k@...hmail.com) Subject: Apache 1.3.29 On Thu, 11 Mar 2004 12:38:02 -0800 VeNoMouS <venom@...-x.co.nz> wrote: >any one know if theres a new exploit for apache 1.3.29 in the wild >one of my mates boxes was breached this morning by ir4dex appears >they gained axx via apache then got root via mmap() Only one I have seen is for "Apache for Cygwin" version 2.0.48 and prior which was for directory traversal on Feb 24 2004 Concerned about your privacy? Follow this link to get FREE encrypted email: https://www.hushmail.com/?l=2 Free, ultra-private instant messaging with Hush Messenger https://www.hushmail.com/services.php?subloc=messenger&l=434 Promote security and make money with the Hushmail Affiliate Program: https://www.hushmail.com/about.php?subloc=affiliate&l=427
Powered by blists - more mailing lists