lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <20050106044758.GA2816@securitytrap.com>
From: vertex at securitytrap.com (vertex)
Subject: Securitytrap 2004 Dec Top 20 List - PHP exploit
	on Top

Hello,

Securitytrap is a realtime security related mailing list summary site
which includes full-disclosure, bugtraq, osvdb, focus-ids,
packet storm, incidents, etc.

For more information, please visit,

        http://www.securitytrap.com/

Top 20 list,

http://www.securitytrap.com/top20.html

1, K-Otik Exploits: phpBB 2.x with PHP 4.3.9 Remote unserialize Exploit

URL: http://www.k-otik.com/exploits/20041217.phpbbmemorydump.c.php 

2, Pen-TEST: RE: An idiot question

URL: http://www.securitytrap.com/mail/pen-test/2004/Nov/0008.html 

3, Full-disclosure:  New IE / Windoze Zero-Day?

URL: http://www.securitytrap.com/mail/full-disclosure/2004/Dec/0507.html 

4, Security News: Universities struggling with SSL-busting spyware

URL: http://lists.insecure.org/lists/isn/2004/Dec/0006.html 

5, Security News: Hacker Gets 16 Months In Prison

URL: http://lists.insecure.org/lists/isn/2004/Dec/0042.html 

6, vulnwatch: re: How to Break Windows XP SP2 + Internet Explorer 6 SP2

URL: http://lists.insecure.org/lists/vulnwatch/2004/Oct-Dec/0015.html 

7, Security News: Hackers deface county Web site

URL: http://lists.insecure.org/lists/isn/2004/Dec/0043.html 

8, Packetstorm: phpbbquoteflaw.txt

URL: http://packetstormsecurity.org/0412-exploits/phpbbquoteflaw.txt 

9, Full-disclosure:  [HAT-SQUAD] NetCat Remote Critical Vulnerability, Poc inside.

URL: http://www.securitytrap.com/mail/full-disclosure/2004/Dec/0541.html 

10, Incidents: Re: Strange command histories in hacked shell server

URL: http://www.securitytrap.com/mail/incidents/2004/Dec/0036.html 

11, Full-disclosure: Re:  TCP Port 42 port scans?  What the heck over...

URL: http://www.securitytrap.com/mail/full-disclosure/2004/Dec/0221.html 

12, K-Otik Exploits: Santy.A - phpBB 2.0.10 Web Worm Source Code (PoC)

URL: http://www.k-otik.com/exploits/20041222.sanityworm.pl.php 

13, bugtrap: PHPBB worm in action

URL: http://www.securitytrap.com/mail/bugtraq/2004/Dec/0343.html 

14, K-Otik Exploits: phpBB 2.0.10 highlight parameter Remote Execution Exploit

URL: http://www.k-otik.com/exploits/20041122.r57phpbb2010.pl.php 

15, Top20: HoneyPot: New Scan Of The Month : Protected Binary.

URL: http://lists.insecure.org/lists/honeypots/2004/Oct-Dec/0043.html 

16, Microsoft: Microsoft Security Bulletin Summary for December 2004

URL: http://lists.insecure.org/lists/microsoft/2004/Oct-Dec/0005.html 

17, Full-disclosure:  Multiple Backdoors found in eEye Products (IRIS and SecureIIS)

URL: http://www.securitytrap.com/mail/full-disclosure/2004/Dec/0586.html 

18, Full-disclosure:  Windows (XP SP2) Remote code execution with parameters

URL: http://www.securitytrap.com/mail/full-disclosure/2004/Dec/0565.html 

19, Full-disclosure: Re:  To anybody who's offended by my disclosure policy-GET THIS GUYS

URL: http://www.securitytrap.com/mail/full-disclosure/2004/Dec/0244.html 

20, K-Otik Exploits: WS_FTP Server v5.03 Remote buffer overflow Exploit

URL: http://www.k-otik.com/exploits/20041130.IPSWSFTP-exploit.c.php 


Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ