lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Date: Mon Apr  4 04:34:56 2005
From: vertex at securitytrap.com (vertex)
Subject: Securitytrap 2005 March Top20 List,
	Priviledge escalation technique and EEYE SMB vulnerability on top 

Hello,

you also read it on 

http://www.securitytrap.org/?q=node/40

1, pen-test: Re: priviledge escalation techniques

URL: http://www.securitytrap.org/mail/pen-test/2005/Jan/0155.html 

2, ntbugtraq: EEYE: Windows SMB Client Transaction Response Handling Vulnerability

URL: http://www.securitytrap.org/mail/ntbugtraq/2005/Feb/0023.html 

3, incidents: Re: strange software &amp;gt; winsupdater.exe

URL: http://www.securitytrap.org/mail/incidents/2005/Mar/0034.html 

4, vuln-dev: IE crash

URL: http://www.securitytrap.org/mail/vuln-dev/2005/Feb/0000.html 

5, pen-test: RE: priviledge escalation techniques

URL: http://www.securitytrap.org/mail/pen-test/2005/Jan/0158.html 

6, incidents: Re: New MSN worm?

URL: http://www.securitytrap.org/mail/incidents/2005/Feb/0034.html 

7, incidents: Re: SQL injection ... another attack

URL: http://www.securitytrap.org/mail/incidents/2005/Jan/0051.html 

8, ntbugtraq: Re: Microsoft Windows Malicous Software Removal Tool

URL: http://www.securitytrap.org/mail/ntbugtraq/2005/Feb/0026.html 

9, incidents: Re: Global DNS Cache poisoning?

URL: http://www.securitytrap.org/mail/incidents/2005/Mar/0011.html 

10, pen-test: Summary of answers for VAP routers/switches/firewalls (was Re: Routers, Switches, and Firewall testing)

URL: http://www.securitytrap.org/mail/pen-test/2005/Feb/0084.html 

11, vuln-dev: RE: IE crash

URL: http://www.securitytrap.org/mail/vuln-dev/2005/Feb/0001.html 

12, incidents: Re: strange software &amp;gt; winsupdater.exe

URL: http://www.securitytrap.org/mail/incidents/2005/Mar/0035.html 

13, bugtraq: Re: phpBB 2.0.12 Session Handling Administrator Authentication Bypass Exploit

URL: http://www.securitytrap.org/mail/bugtraq/2005/Mar/0077.html 

14, full-disclosure:  Google Search and Gmail Correlation

URL: http://www.securitytrap.org/mail/full-disclosure/2005/Feb/0551.html 

15, incidents: strange software &amp;gt; winsupdater.exe

URL: http://www.securitytrap.org/mail/incidents/2005/Mar/0019.html 

16, ISN: [ISN] MIT says it won't admit hackers

URL: http://www.securitytrap.org/mail/ISN/2005/Mar/0033.html 

17, incidents: Re: strange software &amp;gt; winsupdater.exe

URL: http://www.securitytrap.org/mail/incidents/2005/Mar/0022.html 

18, bugtraq: -==phpBB 2.0.12 Full path disclosure==-

URL: http://www.securitytrap.org/mail/bugtraq/2005/Feb/0487.html 

19, bugtraq: new tool : the first remote PHP vulnerability scanner

URL: http://www.securitytrap.org/mail/bugtraq/2005/Jan/0147.html 

20, incidents: Re: strange software &amp;gt; winsupdater.exe

URL: http://www.securitytrap.org/mail/incidents/2005/Mar/0036.html 


Any suggestion is welcome,

-vertex
-- 
http://www.securitytrap.org
Security by full disclosure

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ