On Tue, Mar 22, 2005 at 02:01:37PM +0100, Frank Küster wrote:
>
> Thank you, I found it extremely difficult (as someone who follows their
> own upstream, but not security-related mailinglists) to find ressources
> of information. Currently, the CVE IDs are often used to indicate which
> issue is
On Tue, Mar 22, 2005 at 11:57:01AM +0100, Frank Küster wrote:
>
> Me neither. I find these CVE pages on mitre.org annyoing, giving no
> real information, only meta-information which is again just vendor stuff
> without code.
CVE is not a database, it's a dictionary. If you are looking into more
On Wed, Mar 09, 2005 at 11:24:54AM -0800, Matt Zimmerman wrote:
> On Wed, Mar 09, 2005 at 12:25:06PM +0100, Javier Fernández-Sanguino Peña
> wrote:
>
> > I would like somebody to do a similar analysis regarding Debian's
> > vulnerabilities (Ubuntu vulns are probably a subset of those affecting
On Wed, Feb 09, 2005 at 08:48:20AM +0100, Javier Fernández-Sanguino Peña wrote:
> Hi everyone,
>
> I've recently uploaded (to experimental only) new Snort 2.3.0 packages
> (based on the release made by the Snort team last January 25th). One of the
> main reasons I've uploaded this to experimenta
On Wed, Oct 20, 2004 at 06:04:29PM +0200, Javier Fernández-Sanguino Peña wrote:
>
> To tarpit remote password/login attempts I think it would be best
> if you just tarpited remote attempts for _invalid_ users which I believe
> you are currently not accounting for. Notice that even if there are
5 matches
Mail list logo