CERT Quarterly Summary CS-2002-04 - Popular vulnerabilities being exploited by attackers these days include an Apache/mod_ssl worm, OpenSSL bugs, Trojan horse sendmail, libpcap, and tcpdump, multiple BIND bugs, and a heap overflow in Microsoft MDAC.
9533ea880a378b11d111894d5f2c202e138383a35bb1203499c902284363b2ee
CERT Quarterly Summary CS-2002-03 - Popular vulnerabilities being exploited by attackers these days include multiple Apache chunked encoding bug, and more.
96d14f0afce3447f055da7b5653fefef945af842745ab8cf70130922407d913e
CERT Quarterly Summary CS-2002-02 - Recent attack trends include exploitation of vulnerabilities in Microsoft SQL Server, Buffer Overflow in Microsoft's MSN Chat ActiveX Control, Heap Overflow in Cachefs Daemon (cachefsd), IIS, Oracle, and more.
efde773bb7f56efc13cc4392691a982f51eb2484cc804e6e711e96318a3be282
CERT Quarterly Summary for May, 2001. Since the last regularly scheduled CERT summary, issued in February 2001 (CS-2001-01), we have seen a significant increase in reconnaissance activity, a number of self-propagating worms, and active exploitation of vulnerabilities in snmpxdmid, BIND and IIS by intruders.
4a4c69c74f9f9dfbf99e62d106c6b336a191d5792a093ca4b01aa1079a25f3c2
CERT Quarterly Summary for February, 2001 - Since the last regularly scheduled CERT summary, issued in November 2000, bugs in BIND TSIG and LPRng have began to be used on a large scale, while rpc.statd and FTPD continue to be exploited. A new Vulnerability Notes database has been started.
fe50242a328ecc66210ff9c70c8c7c8235963c7b3c118a3f1dbf25678c5876c5
CERT Quarterly Summary for November, 2000 - Since the last regularly scheduled CERT summary, issued in August (CS-2000-03), we have seen continued compromises via rpc.statd and FTPd. We have also seen a number of sites compromised by exploiting a vulnerability in the IRIX telnet daemon. Notable virus activity includes the Loveletter.as worm and the QAZ worm.
e8488c9895d8d674123d6fae983a30e4fa01369e7a25ab353192c987dd4546ee
This is the CERT quarterly summary which focuses on the types of attacks reported to their incident response team, as well as other noteworthy incident and vulnerability information. This quarter CERT focuses on the input validation vulnerability in rpc.statd, multiple vulnerabilities in FTP daemons, ActiveX control vulnerabilities, exploitation of hidden file extensions, the Outlook and Outlook Express cache bypass vulnerability, chat clients and network security
4bf51de8888d1e0758c6a87a82f98451db5052c4790df7688c13d096dc65859a
CERT Quarterly Hacker Activity Summary CS-2000-02 - The BIND "NXT bug" continues to be exploited every day. Kerberos services are a new popular remote root target. Many denial of service packet flood attacks are now being bounced off of nameservers. CERT keeps track of current hacker activity here.
6c4ed9066fbdba4cde964f576c93812864bee03cb271ff07cb87bba6f263fec5
CERT Quarterly Attack Summary - Currently being actively exploited on the internet are remote BIND vulnerabilities, Vixie Cron, WU-FTPD 2.5, RPC services and Malicious HTML Tags Embedded in Client Web Requests.
2846747e784cc97960ceec77e3c5fe98744cecc282ed7e9d1a59da63411d86aa
CERT Quarterly Summary #5 - Currently exploited vulnerabilities include am-utils package and RPC vulnerabilities. Also has Y2K/security Information sources.
73d076a1d46e60bf08ea93291abe8457424ded6288f087e755102d8e05a0cbc9
Each quarter, the CERT Coordination Center (CERT/CC) issues the CERT summary to draw attention to the types of attacks reported to our incident response team. This quarter, the most popular attacks are Distributed DoS tools, Distributed Sniffer for Linux, CDE Vulnerabilities, BIND Vulnerabilities, WU-FTPD Vulnerabilities, AMD Vulnerabilities, RPC Vulnerabilities, and virus / trojan activity.
4916697ede111fc56d0a555e05360d53fa9f7f98f5ba31cbadd4565952b50824
01-README
fa5fc12266f4e9e2f9608f8e8192814cbb00aca096ede71358120672697aef61
CS-95:01
0a830b3e0c80ef2cb0896867bdff64f04bbd35ef5147b1605c361eb652bb22a5
CS-95:02
c0cd25fc987fbddee695d4bcfde78f6d7187c72d7f6abb350312e9bc239befb1
CS-95:03
81d8adc5eb85487e15327ea142c810ebf51814752ba42d4027c83c6c05f13539
CS-96.01
6086577dbb6e4281f529085f8183b578b3168a0c12b5971c203a96395d1f0618
CS-96.02
424e195840c7d2f69180480bde720b9668121ce76e06d4ba93d1b4ae3aaaa9cd
CS-96.03
fb8e2701e9cac46798aa4e75aa0a86ca3744a73c9664d71558707a150a258acb
CS-96.04
ed26230263a8e30b21339ee15fcaad29abe985d55bc56b3021eb1d9a07e9921f
CS-96.05
19dd73259ddcf3788f7d9719252f474115272fdf3bacbf2accf87b874887a6ea
CS-96.06
f925dca73a4760d925c80dd185235247e2e963dce4570cf2fea5a089a519b0e1
CS-97.01
10e13b5d4209cc1eb58925369f5837e2161de2dba5661b7f2ccd7e01a09421fa
CS-97.02
1ce0eac12603ccdf675a4f9510f53c2d4f50713a85b943d6e947f4562ae6ab2d
CS-97.03
6eef61398eb0f3ba2272f3fd49b5de8b99c37943f5e8d2ef69e7223159e0802d
CS-97.04
dd198faf1dfb056daf68a31f18e04cecd70e363673143d00d1c25363c91d2560