Bugtraq: by date

397 messages starting Apr 30 00 and ending May 31 00
Date index | Thread index | Author index


Sunday, 30 April

Buffer overflows in Skyline/SpinBox client Tollef Fog Heen
Wemilo cassius () HUSHMAIL COM

Monday, 01 May

"Microsoft to publish details of Kerberos Authorisation Data in Windows 2000" Grant Bayley
Re: Solaris 7 x86 lpset exploit. Casper Dik
Re: Windows NT/95/98/Possible Others Denial of Service Attack. Mi crosoft ODBC Database connectivity flaw. Daniel Docekal
Re: CVS DoS Kris Kennaway
Re: Windows NT/95/98/Possible Others Denial of Service Attack. Microsoft ODBC Database connectivity flaw. Jeff Dafoe
Re: aaa_base still vulnerable after upgrade Valdis.Kletnieks () VT EDU
Re: aaa_base still vulnerable after upgrade Horst von Brand
Re: Solaris/SPARC 2.7 lpset exploit (well not likely !) Casper Dik
Re: Solaris 7 x86 lpset exploit. Peter da Silva
Linux knfsd DoS issue Chris Evans
Re: Source code to mstream, a DDoS tool Dave Dittrich
Announcement: Phrack Lovin' route () TRADECRAFT INFONEXUS COM
Esafe Protect Gateway issue still unresolved! Hugo.van.der.Kooij () CAIW NL
Re: Source code to mstream, a DDoS tool Security
Re: Source code to mstream, a DDoS tool Paul Cardon

Tuesday, 02 May

Re: fingerd Psarras Nikos
Security Bug in Jana HTTP Server eAX -
INFO:AppleShare IP 6.3.2 squashes security bug deepquest () NETSCAPE NET
el8.org advisory - Win 95/98 DoS (RFParalyze.c) dm () JUGGERNAUT EL8 ORG
spj-003-000 - S0ftPj Advisory fusys () ITAPAC NET
Re: CVS DoS Hannah Schröter
Re: "Microsoft to publish details of Kerberos Authorisation Data in Windows 2000" Peter Leonard
Re: "Microsoft to publish details of Kerberos Authorisation Data in Windows 2000" Joseph Moran
SuSE Security Announcement - aaa_base - UPDATE Marc Heuse
pam_console bug Michal Zalewski
Re: Windows NT/95/98/Possible Others Denial of Service Attack. Microsoft ODBC Database connectivity flaw. Jeff Dafoe
Re: Wemilo daedalus
Possible issue with Cisco on-line help? Fernando Montenegro
4ward:It's a blue world! deepquest () NETSCAPE NET
Denial of service attack against tcpdump bretonh () PARANOIA PGCI CA
glibc resolver weakness antirez
Re: Solaris 7 x86 lpset exploit. der Mouse

Wednesday, 03 May

Re: el8.org advisory - Win 95/98 DoS (RFParalyze.c) Marcy Abene
Another interesting Cart32 command cassius () HUSHMAIL COM
Fun with UltraBoard V1.6X rudi carell
Re: SuSE 6.3 Gnomelib buffer overflow Thomas Biege
Race condition in "rm -r" Morten Welinder
Security Bulletins Digest (fwd) Justin Tripp
Mac OS X Signature Omachonu Ogali
Re: el8.org advisory - Win 95/98 DoS (RFParalyze.c) weed5312 () UIDAHO EDU
Re: SuSE Security Announcement - aaa_base - UPDATE Jeremy Rauch
Re: Denial of service attack against tcpdump antirez
Re: Solaris 7 x86 lpset exploit. Casper Dik
Re: glibc resolver weakness Bennett Todd
Re: Denial of service attack against tcpdump Sebastian
Re: glibc resolver weakness Valdis.Kletnieks () VT EDU
Re: Denial of service attack against tcpdump Dragos Ruiu
Re: glibc resolver weakness Andrew Brown
Re: netkill - generic remote DoS attack stanislav shalunov
Re: Denial of Service Against pcAnywhere. Patrick Turcotte
Re: glibc resolver weakness Steven M. Bellovin
Alert: Listserv Web Archives (wa) buffer overflow Cerberus Security Team
Fwd: tcpdump workaround against dnsloop exploit. THE INFAMOUS
Reminder: MaxClientRequestBuffer Marc
Internet Security Systems Security Advisory: Vulnerability in Quake3Arena Auto-Download Feature Aleph One
Re: netkill - generic remote DoS attack Brian Fundakowski Feldman
Alert: DMailWeb buffer overflow Cerberus Security Team
Re: pam_console bug Benjamin Smee
Re: Denial of service attack against tcpdump Gerald Combs

Thursday, 04 May

Re: pam_console bug Michal Zalewski
Re: Libsafe Protecting Critical Elements of Stacks Mariusz Woloszyn
Re: Possible issue with Cisco on-line help? Fernando Montenegro
Security Bulletins Digest (fwd) Justin Tripp
Aladdin eToken 3.3.3.x Hardware USB Key Private Data Extraction Kingpin
ILOVEYOU worm Elias Levy
Formated and commented loveletter. The Hidden
"ILOVEYOU" virus analysis Steve Wolfe
Re: IL0VEY0U worm Elias Levy
Re: ILOVEYOU worm Jaanus Kase
Re: IL0VEY0U worm Ed Padin
Trend Micro InterScan VirusWall Remote Overflow NAI Labs
How we defaced www.apache.org Peter van Dijk
Re: Solaris 7 x86 lpset exploit. Peter da Silva
Re: IL0VEY0U worm Elias Levy
Passive Network Mapping bind
Re: IL0VEY0U worm Elias Levy

Friday, 05 May

Alert: DNewsWeb buffer overflow Cerberus Security Team
2.2.14 Kernel exec/open bug (?) The Cr0W
Re: IL0VEY0U worm Elias Levy
Re: Fun with UltraBoard V1.6X Juan M. Bello Rivas
Black Watch Labs Vulnerability Alert Blackwatchlabs
Cayman 3220-H DSL Router DOS cassius () HUSHMAIL COM

Saturday, 06 May

Re: Alert: DNewsWeb buffer overflow Nishad Herath
Re: Denial of service attack against tcpdump bretonh () PARANOIA PGCI CA
Re: Race condition in "rm -r" Glynn Clements
Re: tcpdump workaround against dnsloop exploit. David Schwartz
shtml.exe reveal local path of IIS web directory Frankie Zie
NetBSD Security Advisory 2000-002 Daniel Carosone
[NHC20000504a.0: NetBSD Panics when sent unaligned IP options] NHC Research
Re: glibc resolver weakness D. J. Bernstein
non-exec stack Tim Newsham

Sunday, 07 May

AIX 4.1.4.0 local root LC_MESSAGES /usr/sbin/arp exploit cripto
Re: Fwd: tcpdump workaround against dnsloop exploit. Sebastian
Re: Denial of service attack against tcpdump Donald McLachlan
Re: Race condition in "rm -r" David Brownlee
Re: Race condition in "rm -r" Alex Belits
"I don't think I really love you" Michal Zalewski
Re: shtml.exe reveal local path of IIS web directory SMILER
Ipchains! Dimuthu Parussalla
Re: Race condition in "rm -r" Glynn Clements
Re: Race condition in "rm -r" Glynn Clements
Re: shtml.exe reveal local path of IIS web directory Dimitri van de Giessen

Monday, 08 May

Re: non-exec stack Casper Dik
Re: Race condition in "rm -r" David Brownlee
Re: AIX 4.1.4.0 local root LC_MESSAGES /usr/sbin/arp exploit Troy Bollinger
Re: shtml.exe reveal local path of IIS web directory Security
Re: Race condition in "rm -r" Chris Calabrese
Contemplations : Melissa, I love you - not! Cerberus Security Team
Re: glibc resolver weakness Gary Ellison
June 2000 FIRST Conference Reminder Roger Safian
AOL Instant Messenger Daniel P. Stasinski
New Allaire Security Zone Bulletin Posted Aleph One
Advisory: Netopia R9100 router vulnerability Stephen Friedl

Tuesday, 09 May

NetStructure 7110 console backdoor Brian Oblivion
NetStructure 7180 remote backdoor vulnerability Brian Oblivion
Re: AOL Instant Messenger Oppenheimer, Max
Re: Advisory: Netopia R9100 router vulnerability Gary L. Burnore
Re: non-exec stack Gert Doering
FreeBSD Security Advisory: FreeBSD-SA-00:16.golddig FreeBSD Security Officer
FreeBSD Security Advisory: FreeBSD-SA-00:17.libmytinfo FreeBSD Security Officer
FreeBSD Security Advisory: FreeBSD-SA-00:18.gnapster FreeBSD Security Officer
Re: non-exec stack Casper Dik
Re: Possible issue with Cisco on-line help? Lisa Napier
Re: Denial of service attack against tcpdump Hugo.van.der.Kooij () CAIW NL
Self-Replication Using Gnutella Seth McGann
"ClientSideTrojan" bug Kragen Sitaker

Wednesday, 10 May

ALERT: Bypassing Warnings For Invalid SSL Certificates In Netscape Navigator Mitja Kolsek
forward:Update on Web Companion Issues deepquest () NETSCAPE NET
KNapster Vulnerability Compromises User-readable Files Tom Daniels
Gnapster Vulnerability Compromises User-readable Files Jim Early
Possible symlink problems with Netscape 4.73 foo
SSH Authentication Vulnerability John P. McNeely
Black Watch Labs Vulnerability Alert Black Watch Labs
Re: non-exec stack Nate Eldredge
Re: Possible symlink problems with Netscape foo
»Ø¸´: Re: non-exec stac ZhaoQian
Re: Advisory: Netopia R9100 router vulnerability Rob Tashjian
Re: Advisory: Netopia R9100 router vulnerability Rob Tashjian
Microsoft Security Bulletin (MS00-031) Microsoft Product Security
Advisory: Unchecked system(blaat $var blaat) call in Bugzilla 2.8 Frank van Vliet
issues with free Perl CGI's (Re: Black Watch Labs...) Peter W
Re: Ipchains! Paul D. Carlucci
Re: Advisory: Unchecked system(blaat $var blaat) call in Bugzilla 2.8 Todd C. Miller

Thursday, 11 May

Re: "ClientSideTrojan" bug Matthew J.Francis
Re: [cert] SSH Authentication Vulnerability Ignacio Kadel-Garcia
Alert: IIS ism.dll exposes file contents Cerberus Security Team
ISSalert: Internet Security Systems Security Advisory: Microsoft IIS Remote Denial of Service Attack Warren Barrow
Remote DoS attack in Internet Information Server 4.0 & 5.0 "Malformed Extension Data in URL" Vulnerability Ussr Labs
Microsoft Security Bulletin (MS00-030) Microsoft Product Security
IE Domain Confusion Vulnerability Foo Bar
Re: "ClientSideTrojan" bug David L. Nicol

Friday, 12 May

NTMail Proxy Exploit Geo.
Overflow in Outlook Express 4.* - too long filenames with graphic format extension Ultor
IE Domain Confusion Vulnerability is an Email problem also Richard M. Smith
Re: IE Domain Confusion Vulnerability doesn't matter much Marc Slemko
Re: ZoneAlarm Larz Sherer
New Solaris root exploit for /usr/lib/lp/bin/netpr Anonymous
Prevent Current and Future E-Mail Worms AXENT Security Team
Re: Reappearance of an old IE security bug TAKAGI, Hiromitsu
Microsoft Security Bulletin (MS00-034) Microsoft Product Security
Microsoft Office 2000 Advisory dildog

Saturday, 13 May

Re: Advisory: Netopia R9100 router vulnerability Jeffrey Paul
Re: shtml.exe reveal local path of IIS web directory Matt Carothers

Monday, 15 May

Cisco Security Advisory: Cisco IOS HTTP Server Vulnerability Cisco Systems Product Security Incident Response Team
Re: "ClientSideTrojan" bug Clover Andrew
Re: IE Domain Confusion Vulnerability doesn't matter much Richard M. Smith
Eudora Pro & Outlook Overflow - too long filenames again Ultor
Microsoft to release a new Outlook Security patch Richard M. Smith
Vulnerability in CGI counter 4.0.7 by George Burgyan Howard M. Kash III
Vulnerability in EMURL-based e-mail providers Pierre Benoit
Re: New Solaris root exploit for /usr/lib/lp/bin/netpr Darren Moffat - Solaris Sustaining Engineering
Re: New Solaris root exploit for /usr/lib/lp/bin/netpr Jeremy Rauch
You can now track Bugtraq 24/7 with Software. Alfred Huger
MICROSOFT SECURITY FLAW? http-equiv () excite com
Allmanage.pl Vulnerabilities bighawk
Re: New Solaris root exploit for /usr/lib/lp/bin/netpr Casper Dik

Tuesday, 16 May

kscd vulnerability Sebastian
Re: "ClientSideTrojan" bug Magosanyi Arpad
Cisco Bug Esteve Espuna
Cisco Bug Error Log Esteve Espuna
Fwd: [nohack] Yet another way to disguise files. Josh Rollyson
CProxy v3.3 SP 2 DoS |[TDP]|
Re: Eudora Pro & Outlook Overflow - too long filenames again Microsoft Security Response Center
Re: Eudora Pro & Outlook Overflow - too long filenames again Henrik .H
BUFFER OVERRUN VULNERABILITIES IN KERBEROS Jeffrey I. Schiller
antisniff x86/linux remote root exploit, including "fixed" 1.02 version Sebastian
Banner Rotation 01 zillion
Vuln in calender.pl (Matt Kruse calender script) suid () SUID KG
Various Lame Stuff wizdumb () LEET ORG
Re: BUFFER OVERRUN VULNERABILITIES IN KERBEROS Assar Westerlund
Re: Fwd: [nohack] Yet another way to disguise files. Ron DuFresne
Re: Cisco Bug James Sneeringer

Wednesday, 17 May

announce : Nessus 1.0 released Renaud Deraison
Re: Banner Rotation 01 Joao Pedro Gonçalves
Security Bulletins Digest (fwd) Mike Bush
Alert: Buffer overflow in Rockliffe's MailSite Cerberus Security Team
Alert: Carello File Creation flaw Cerberus Security Team
RFP2K04: Mining BlackICE with RFPickAxe rain forest puppy
Bugtraq Stats for the last 3 years available now. Alfred Huger
xsoldier update for Linux Mandrake THE INFAMOUS
Yet Another Kerberos Patch Jeffrey I. Schiller
Standard & Poors security nightmare Stephen Friedl
Re: Fwd: [nohack] Yet another way to disguise files. Dan Harkless
checpks non-explooitiable buffer overrun Duncan Simpson
FreeBSD Security Advisory: FreeBSD-SA-00:08.lynx [REVISED] FreeBSD Security Officer
FreeBSD Security Advisory: FreeBSD-SA-00:18.gnapster [REVISED] FreeBSD Security Officer
klogin remote exploit duke
Re: RFP2K04: Mining BlackICE with RFPickAxe Robert Graham
Microsoft Security Bulletin (MS00-033) Microsoft Product Security
Re: BUFFER OVERRUN VULNERABILITIES IN KERBEROS Microsoft Security Response Center
[TL-Security-Announce] openLDAP TLSA2000010-1 Katherine M. Moussouris
AUX Security Advisory on Be/OS 5.0 (DoS) visi0n

Thursday, 18 May

Eudora Sensitive to Long Filenames Ron Moritz
CERT Advisory CA-2000-06 Aleph One
Re: xsoldier update for Linux Mandrake Cashdollar, Larry
(old) informix security hole with ruserok() style security Nathan Neulinger
antisniff latest ("two times fixed") version still exploitable, l0phtl0phe-kid.c Sebastian
Re: Fwd: [nohack] Yet another way to disguise files. Larry Olin Horn
Clarification/further info on Kerberos issues Chris Evans
Re: BUFFER OVERRUN VULNERABILITIES IN KERBEROS Kris Kennaway
Lotus ESMTP Service (Lotus Domino Release 5.0.1 (Intl)) Michal Zalewski
Re: RFP2K04: Mining BlackICE with RFPickAxe Matt
Nasty XFree Xserver DoS Chris Evans
Fw: [suse-security-announce] SuSE Security Announcement - kernel bacano
Kerberos ksu and krshd exploits Jim Paris
FW: Security Notice: Big Brother System and Network Monitor Cunningham Stace D MSgt 2 AF/XTI
Re: Standard & Poors security nightmare Jim Knoble
Re: xsoldier update for Linux Mandrake Brock Tellier
Re: MICROSOFT SECURITY FLAW? Russ
Re: Fwd: [nohack] Yet another way to disguise files. Dan Harkless
Re: Fwd: [nohack] Yet another way to disguise files. Peter W
Re: antisniff latest ("two times fixed") version still exploitable, l0phtl0phe-kid.c Mudge
Remote Dos attack against Intel express 8100 router Dimuthu Parussalla

Friday, 19 May

Re: Microsoft to release a new Outlook Security patch Jay R. Ashworth
RFP2K05: NetProwler vs. RFProwler rain forest puppy
Re: RFP2K04: Mining BlackICE with RFPickAxe rain forest puppy
Re: RFP2K04: Mining BlackICE with RFPickAxe Andrew Lambeth
revised patches for kerberos vulnerability Tom Yu
Re: Lotus ESMTP Service (Lotus Domino Release 5.0.1 (Intl)) chris neill
Microsoft Security Bulletin (MS00-029) Microsoft Product Security
[RHSA-2000:028-02] Netscape 4.73 available bugzilla () REDHAT COM
BindView Security Advisory: jolt2 - Remote DoS against NT, W2K, 9x BindView Security Advisory
Black Watch Labs Vulnerability Alert Black Watch Labs
Black Watch Labs Vulnerability Alert Black Watch Labs
Re: Fwd: [nohack] Yet another way to disguise files. mock () ACTIVESTATE COM

Saturday, 20 May

Re: Lotus ESMTP Service (Lotus Domino Release 5.0.1 (Intl)) Su, Nick
Re: Standard & Poors security nightmare Richard Seaman, Jr.
Re: Standard & Poors security nightmare Crispin Cowan

Sunday, 21 May

Re: Standard & Poors security nightmare Richard Seaman, Jr.
"gdm" remote hole Chris Evans

Monday, 22 May

fdmount buffer overflow Arend-Jan Wijtzes
Another hole in Cart32 bunny_69_1 () HOTMAIL COM
Gauntlet CyberPatrol Buffer Overflow Rob Lindenbusch
Gauntlet Firewall Vulnerability Elias Levy
Re: "gdm" remote hole Thomas Biege
Re: Another hole in Cart32 Elias Levy
Re: Another hole in Cart32 Michael Form
QuickCommerce Vulnerability zoran () UVINC COM
MetaProducts Offline Explorer Directory Traversal Vulnerability Servio Medina
Re: fdmount buffer overflow Greg Olszewski
Vulnerability in infosrch.cgi SGI Security Coordinator
Re: "gdm" remote hole Katherine M. Moussouris
fdmount 0.8 exploit Paulo Ribeiro
Re: fdmount buffer overflow Cami
Re: Nasty XFree Xserver DoS Weston Pawlowski
Re: Another hole in Cart32 sert sert

Tuesday, 23 May

vnc remote dictionary based cracker Patrick Oonk
Re: Lotus ESMTP Service (Lotus Domino Release 5.0.1 (Intl)) SMILER
Problem with FrontPage on Cobalt RaQ2/RaQ3 Chris Adams
Re: "gdm" remote hole Greg Olszewski
Re: fdmount buffer overflow Vandoorselaere Yoann
Re: fdmount buffer overflow Chmouel Boudjnah
Qpopper 2.53 remote problem, user can gain gid=mail Prizm
Re: Standard & Poors security nightmare Warren Young
Re: Problem with FrontPage on Cobalt RaQ2/RaQ3 Noah
Re: Another hole in Cart32 Clover Andrew
RFP2K05 - NetProwler "Fragmentation" Issue AXENT Security Team
Re: Problem with FrontPage on Cobalt RaQ2/RaQ3 Chris Adams
Re: Another hole in Cart32 CDI
Key Generation Security Flaw in PGP 5.0 gec () ACM ORG
more majordomo brokeness Federico G. Schwindt
I think Jay Mobley
infosrch.cgi 'interactive' shell rpc
Filesystem vulnerability in AIX salme () US IBM COM
Re: RFP2K05: NetProwler vs. RFProwler Pedro Quintanilha
CyberCop Monitor NT 2.5 dr_erik_wright () GMX NET
Cayman 3220H DSL Router Software Update and New Bonus Attack cassius () HUSHMAIL COM
Security Vulnerability in Qpopper 2.53 (Upgrade to 3.0.2) Qpopper Support

Wednesday, 24 May

Remote xploit for MDBMS |[TDP]|
HP Web JetAdmin Version 5.6 Web interface Server Directory Traversal Vulnerability Ussr Labs
HP Web JetAdmin Version 6.0 Remote DoS attack Vulnerability Ussr Labs
About VNC Patrick Oonk
Re: fdmount buffer overflow Tomasz Grabowski
Re: "gdm" remote hole White Vampire
Re: Qpopper 2.53 remote problem, user can gain gid=mail Jose Nazario
Kerberos Vulnerability and IBM SP2 Frame swlodin () IQUEST NET
Re: Standard & Poors security nightmare Stephen J. Friedl
Gauntlet Exploit proof gramble none
Re: Vulnerability in infosrch.cgi Jose Nazario
Deerfield Communications MDaemon Mail Server DoS cassius () HUSHMAIL COM
Re: Qpopper 2.53 remote problem, user can gain gid=mail Qpopper Support
Re: Another hole in Cart32 Justin King
Re: vnc remote dictionary based cracker Peter W
Re: kscd vulnerability Matt Wilson
Re: fdmount buffer overflow Matt Wilson
Re: fdmount buffer overflow Katherine M. Moussouris
Re: fdmount buffer overflow Christopher Schulte
Re: CyberCop Monitor NT 2.5 Robert Graham
Re: Eudora Sensitive to Long Filenames Jim Riley

Thursday, 25 May

Re: kscd vulnerability Sebastian
Cobalt Networks - Security Advisory - Frontpage Jeff Lovell
Re: kscd vulnerability Chmouel Boudjnah
Re: "gdm" remote hole Chmouel Boudjnah
Aladdin Software Security SecretDisk console blocking failure Vitaly Fedrushkov
`sniffit -L mail' vulnerabilities Michel Kaempf
Re: Qpopper 2.53 remote problem, user can gain gid=mail Sebastian
Omnis Weak Encryption - Many products affected Eric.Stevens () AVENTIS COM
Re: Gauntlet Exploit proof Shivdasani, Meenoo
DST2K0004b: Authentication issue in WebShield SMTP v4.5.44 Manage ment Tool Security Team
DST2K0003 : Buffer Overrun in NAI WebShield SMTP v4.5.44 Managem ent Tool Security Team
Re: Standard & Poors security nightmare Kevin Kadow
Re: Nasty XFree Xserver DoS - Workaround Fred Silva
Re: Nasty XFree Xserver DoS - Workaround Cy Schubert - ITSD Open Systems Group
Re: Cobalt Networks - Security Advisory - Frontpage Neulinger, Nathan R.
MDaemon Mail Server DoS - FIXED Arvel Hathcock
Windows DoS code (jolt2.c) Laurent LEVIER
Alert: PDG Cart Overflows Cerberus Security Team
Buffer Overflow in fdmount (fwd) Patrick J. Volkerding
[COVERT-2000-05] Microsoft Windows Computer Browser Reset Vulnerability COVERT Labs
Re: DST2K0004b: Authentication issue in WebShield SMTP v4.5.44 Management Tool Luciano Martins
Security Vulnerability in IPFilter 3.3.15 and 3.4.3 emf
Re: Omnis Weak Encryption - Many products affected Ben Greenbaum
Re: Qpopper 2.53 problem, user can gain gid=mail Prizm
Steal Passwords Using SQL Server EM Justin Gunther
Buffer Overflows with long file extensions in Windows Moritz Jodeit
Re: kscd vulnerability Katherine M. Moussouris

Friday, 26 May

Analysis of jolt2.c (MS00-029) Mikael Olsson
Addendum: Analysis of jolt2.c (MS00-029) Mikael Olsson
new vulnerability in Netscape effectively disables SSL server auth Kevin Fu
Microsoft Security Bulletin (MS00-036) Microsoft Product Security
KDE: /usr/bin/kdesud, gid = 0 exploit noir
Re: [COVERT-2000-05] Microsoft Windows Computer Browser Reset Vulnerability Vladimir Dubrovin
formmail patch Peter D. Thompson Yezek
FreeBSD Security Advisory: FreeBSD-SA-00:19.semconfig FreeBSD Security Officer
FreeBSD Security Advisory: FreeBSD-SA-00:20.krb5 FreeBSD Security Officer
Re: Microsoft Security Bulletin (MS00-036) Matt
Re: FreeBSD Security Advisory: FreeBSD-SA-00:19.semconfig Charles M. Hannum
Re: FreeBSD Security Advisory: FreeBSD-SA-00:19.semconfig Theo de Raadt
Re: Foward: FreeBSD Security Advisory: FreeBSD-SA-00:19.semconfig Jason R Thorpe
Re: Analysis of jolt2.c (MS00-029) Darren Reed
Re: FreeBSD Security Advisory: FreeBSD-SA-00:19.semconfig Theo de Raadt
[TL-Security-Announce] gpm TLSA2000011-1 Katherine M. Moussouris

Saturday, 27 May

Re: DST2K0004b: Authentication issue in WebShield SMTP v4.5.44 Ma nagement Tool Ollie Whitehouse
Re: DST2K0004b: Authentication issue in WebShield SMTP v4.5.44 Management Tool Luciano Martins
Mandrake 7.0: /usr/bin/cdrecord gid=80 (strike #2) noir
Revision 2: Analysis of jolt2.c (MS00-029) Mikael Olsson
Re: Qpopper 2.53 problem, user can gain gid=mail Maurycy Prodeus

Sunday, 28 May

New OpenBSD patches Richard Trott
Trivial bug in IIS5 SSL Laurent LEVIER
Re: KDE: /usr/bin/kdesud, gid = 0 exploit Chmouel Boudjnah
E-Serv Security Flaws Fixed wizdumb () LEET ORG
Re: [linux-security] Re: [RHSA-2000:028-02] Netscape 4.73 available Tony Nugent
Re: New OpenBSD patches Theo de Raadt
NetBSD Security Advisory 2000-003 NetBSD Security Officer
NetBSD Security Advisory 2000-004 NetBSD Security Officer
NetBSD Security Advisory 2000-005 NetBSD Security Officer
NetBSD Security Advisory 2000-006 NetBSD Security Officer

Monday, 29 May

Re: i think axess .
SuSE Security Announcement: kmulti Thomas Biege
Corel Linux Default Install j nickson
Re: I think Ben Greenbaum
Re: Corel Linux Default Install Vincent Power
Re: i think Ben Greenbaum
Anyone alive at Lotus? chris neill
[COVERT-2000-06] Initialized Data Overflow in Xlock COVERT Labs
Re: Revision 2: Analysis of jolt2.c (MS00-029) David LeBlanc
Re: Mandrake 7.0: /usr/bin/cdrecord gid=80 (strike #2) Dan Kaminsky

Tuesday, 30 May

An Analysis of the TACACS+ Protocol and its Implementations Solar Designer
Re: An Analysis of the TACACS+ Protocol and its Implementations Damir Rajnovic
Re: Steal Passwords Using SQL Server EM Russ
Re: more majordomo brokeness Skahan, Vince
Alert: Windows NT Browser Service DoS Cerberus Security Team
Jolt2 crashes tcpdump Earl T. Carter
Fw: Steal Passwords Using SQL Server EM Martin Drury
Call for Presentations Chet Uber
Microsoft Security Bulletin (MS00-035) Microsoft Product Security
[TL-Security-Announce] xlockmore TLSA2000012-1.txt Katherine M. Moussouris
Microsoft Security Bulletin (MS00-038) Microsoft Product Security
PGP Security Advisory for PGP 5.0 Will Price

Wednesday, 31 May

KDE::KApplication feature? Sebastian
Re: Lotus ESMTP Service (Lotus Domino Release 5.0.1 (Intl)) Cory Visi
[RHSA-2000:005-05] New majordomo packages available (fwd) Raymond Dijkxhoorn
Re: more majordomo brokeness Richard Trott
Re: strike#2 krahmer () CS UNI-POTSDAM DE
IBM HTTP SERVER / APACHE Marek Roy