ID SECURITYVULNS:VULN:2066
Type securityvulns
Reporter BUGTRAQ
Modified 2002-06-12T00:00:00
Description
No description provided
{"id": "SECURITYVULNS:VULN:2066", "bulletinFamily": "software", "title": "Microsoft Internet Explorer, Microsoft Proxy & Microsoft ISA server buffer overflow gopher buffer overflow", "description": "No description provided", "published": "2002-06-12T00:00:00", "modified": "2002-06-12T00:00:00", "cvss": {"score": 0.0, "vector": "NONE"}, "href": "https://vulners.com/securityvulns/SECURITYVULNS:VULN:2066", "reporter": "BUGTRAQ", "references": ["https://vulners.com/securityvulns/securityvulns:doc:3052", "https://vulners.com/securityvulns/securityvulns:doc:3029"], "cvelist": [], "type": "securityvulns", "lastseen": "2018-08-31T11:09:16", "edition": 1, "viewCount": 3, "enchantments": {"score": {"value": 7.3, "vector": "NONE", "modified": "2018-08-31T11:09:16", "rev": 2}, "dependencies": {"references": [{"type": "pentestpartners", "idList": ["PENTESTPARTNERS:AC15E5822BA31553AA32E8AE87253B96"]}, {"type": "openvas", "idList": ["OPENVAS:1361412562311220192066", "OPENVAS:1361412562311220191533"]}, {"type": "debian", "idList": ["DEBIAN:DLA-2066-1-:CF83D"]}, {"type": "cve", "idList": ["CVE-2019-2066", "CVE-2018-2066"]}, {"type": "nessus", "idList": ["SUSE_SU-2018-2066-1.NASL", "EULEROS_SA-2019-1533.NASL", "SUSE_SU-2019-2066-1.NASL", "EULEROS_SA-2019-2066.NASL"]}, {"type": "exploitpack", "idList": ["EXPLOITPACK:BB32C31536B875ACF1D71A7984C9E9BE", "EXPLOITPACK:97B1847B8C1552E10708B1E532E24B91"]}, {"type": "exploitdb", "idList": ["EDB-ID:45635", "EDB-ID:47101"]}, {"type": "hackerone", "idList": ["H1:591770"]}, {"type": "zdt", "idList": ["1337DAY-ID-31362"]}, {"type": "packetstorm", "idList": ["PACKETSTORM:149854"]}, {"type": "openbugbounty", "idList": ["OBB:606528", "OBB:606526", "OBB:606530"]}, {"type": "securityvulns", "idList": ["SECURITYVULNS:DOC:3029", "SECURITYVULNS:DOC:3052"]}], "modified": "2018-08-31T11:09:16", "rev": 2}, "vulnersScore": 7.3}, "affectedSoftware": [{"name": "Internet Explorer", "operator": "eq", "version": "6.0"}, {"name": "Proxy Server", "operator": "eq", "version": "2.0"}, {"name": "ISA Server", "operator": "eq", "version": "2000"}]}
{"rst": [{"lastseen": "2021-02-28T00:00:00", "bulletinFamily": "ioc", "cvelist": [], "description": "Found **avito-chek[.]ru** in [RST Threat Feed](https://rstcloud.net/profeed) with score **20**.\n First seen: 2020-09-03T03:00:00, Last seen: 2021-02-28T03:00:00.\n IOC tags: **phishing**.\nWhois:\n Created: 2020-09-03 11:13:21, \n Registrar: REGRURU, \n Registrant: Private Person.\nIOC could be a **False Positive** (Domain not resolved, but Whois records found).\n[https://rstcloud.net/](https://rstcloud.net/)", "edition": 1, "modified": "2020-09-03T00:00:00", "id": "RST:D5013397-2066-3389-91A4-562B9B9CC6D7", "href": "", "published": "2021-03-01T00:00:00", "title": "RST Threat feed. IOC: avito-chek.ru", "type": "rst", "cvss": {}}, {"lastseen": "2021-02-28T00:00:00", "bulletinFamily": "ioc", "cvelist": [], "description": "Found **39[.]73.240.59** in [RST Threat Feed](https://www.rstcloud.net/profeed) with score **20**.\n First seen: 2020-12-17T03:00:00, Last seen: 2021-02-28T03:00:00.\n IOC tags: **generic**.\nASN 4837: (First IP 39.64.0.0, Last IP 39.95.255.255).\nASN Name \"CHINA169BACKBONE\" and Organisation \"CNCGROUP China169 Backbone\".\nASN hosts 561095 domains.\nGEO IP information: City \"Beijing\", Country \"China\".\nIOC could be a **False Positive** (May be a Cloud provider IP).\n[https://rstcloud.net/](https://rstcloud.net/)", "edition": 1, "modified": "2020-12-17T00:00:00", "id": "RST:8D62BDF1-2066-33B9-9135-98A39EA9073C", "href": "", "published": "2021-03-01T00:00:00", "title": "RST Threat feed. IOC: 39.73.240.59", "type": "rst", "cvss": {}}, {"lastseen": "2021-02-28T00:00:00", "bulletinFamily": "ioc", "cvelist": [], "description": "Found **89[.]237.33.129** in [RST Threat Feed](https://www.rstcloud.net/profeed) with score **13**.\n First seen: 2020-12-22T03:00:00, Last seen: 2021-02-28T03:00:00.\n IOC tags: **generic**.\nASN 20485: (First IP 89.237.32.0, Last IP 89.237.37.255).\nASN Name \"TRANSTELECOM\" and Organisation \"Moscow Russia\".\nASN hosts 1037 domains.\nGEO IP information: City \"Novotroitsk\", Country \"Russia\".\n[https://rstcloud.net/](https://rstcloud.net/)", "edition": 1, "modified": "2020-12-22T00:00:00", "id": "RST:E3A1C525-2066-385B-AB61-2DD2050B777F", "href": "", "published": "2021-03-01T00:00:00", "title": "RST Threat feed. IOC: 89.237.33.129", "type": "rst", "cvss": {}}, {"lastseen": "2021-02-28T00:00:00", "bulletinFamily": "ioc", "cvelist": [], "description": "Found **101[.]25.120.159** in [RST Threat Feed](https://www.rstcloud.net/profeed) with score **20**.\n First seen: 2020-12-26T03:00:00, Last seen: 2021-02-28T03:00:00.\n IOC tags: **generic**.\nASN 4837: (First IP 101.16.0.0, Last IP 101.31.255.255).\nASN Name \"CHINA169BACKBONE\" and Organisation \"CNCGROUP China169 Backbone\".\nASN hosts 561095 domains.\nGEO IP information: City \"Beijing\", Country \"China\".\nIOC could be a **False Positive** (May be a Cloud provider IP).\n[https://rstcloud.net/](https://rstcloud.net/)", "edition": 1, "modified": "2020-12-26T00:00:00", "id": "RST:9E9C460E-2066-3706-AD82-9FF8314A2915", "href": "", "published": "2021-03-01T00:00:00", "title": "RST Threat feed. IOC: 101.25.120.159", "type": "rst", "cvss": {}}, {"lastseen": "2021-02-27T00:00:00", "bulletinFamily": "ioc", "cvelist": [], "description": "Found **astros[.]net** in [RST Threat Feed](https://rstcloud.net/profeed) with score **2**.\n First seen: 2019-12-15T03:00:00, Last seen: 2021-02-27T03:00:00.\n IOC tags: **spam**.\nDomain has DNS A records: 91[.]195.240.13\nWhois:\n Created: 2000-11-20 13:59:28, \n Registrar: PSIUSA Inc dba Domain Robot, \n Registrant: unknown.\n[https://rstcloud.net/](https://rstcloud.net/)", "edition": 1, "modified": "2019-12-15T00:00:00", "id": "RST:B1463536-2066-3254-B0CD-A14E37E0B385", "href": "", "published": "2021-02-28T00:00:00", "title": "RST Threat feed. IOC: astros.net", "type": "rst", "cvss": {}}, {"lastseen": "2021-02-27T00:00:00", "bulletinFamily": "ioc", "cvelist": [], "description": "Found **xn--f1aan7cmhdp[.]xn--p1ai** in [RST Threat Feed](https://rstcloud.net/profeed) with score **10**.\n First seen: 2019-12-15T03:00:00, Last seen: 2021-02-27T03:00:00.\n IOC tags: **spam**.\nIOC could be a **False Positive** (Domain not resolved. Whois records not found).\n[https://rstcloud.net/](https://rstcloud.net/)", "edition": 1, "modified": "2019-12-15T00:00:00", "id": "RST:13313FCF-2066-3873-B54F-502AEF331127", "href": "", "published": "2021-02-28T00:00:00", "title": "RST Threat feed. IOC: xn--f1aan7cmhdp.xn--p1ai", "type": "rst", "cvss": {}}, {"lastseen": "2021-01-17T00:00:00", "bulletinFamily": "ioc", "cvelist": [], "description": "Found **ppp19[.]node.hiveon.net** in [RST Threat Feed](https://rstcloud.net/profeed) with score **10**.\n First seen: 2019-12-15T03:00:00, Last seen: 2021-01-17T03:00:00.\n IOC tags: **cryptomining**.\nIOC could be a **False Positive** (Domain not resolved. Whois records not found).\n[https://rstcloud.net/](https://rstcloud.net/)", "edition": 1, "modified": "2019-12-15T00:00:00", "id": "RST:1AF569C4-2066-3C71-8948-E27A0190EFBB", "href": "", "published": "2021-02-24T00:00:00", "title": "RST Threat feed. IOC: ppp19.node.hiveon.net", "type": "rst", "cvss": {}}, {"lastseen": "2021-01-17T00:00:00", "bulletinFamily": "ioc", "cvelist": [], "description": "Found **hotel[.]bittrader.io** in [RST Threat Feed](https://rstcloud.net/profeed) with score **10**.\n First seen: 2020-01-10T03:00:00, Last seen: 2021-01-17T03:00:00.\n IOC tags: **cryptomining**.\nIOC could be a **False Positive** (Domain not resolved. Whois records not found).\n[https://rstcloud.net/](https://rstcloud.net/)", "edition": 1, "modified": "2020-01-10T00:00:00", "id": "RST:FB6A852E-2066-36D2-A8EF-FFD90F792E46", "href": "", "published": "2021-02-24T00:00:00", "title": "RST Threat feed. IOC: hotel.bittrader.io", "type": "rst", "cvss": {}}, {"lastseen": "2021-02-23T00:00:00", "bulletinFamily": "ioc", "cvelist": [], "description": "Found **0[.]0.0.0 www.etn.bubblemine.com** in [RST Threat Feed](https://rstcloud.net/profeed) with score **20**.\n First seen: 2021-02-23T03:00:00, Last seen: 2021-02-23T03:00:00.\n IOC tags: **cryptomining**.\nWhois:\n Created: 2018-04-17 05:13:46, \n Registrar: GoDaddycom LLC, \n Registrant: Not Available From Registry.\nIOC could be a **False Positive** (Domain not resolved, but Whois records found).\n[https://rstcloud.net/](https://rstcloud.net/)", "edition": 1, "modified": "2021-02-23T00:00:00", "id": "RST:30D801AB-2066-3E69-99DB-DAFA7F4EAC7A", "href": "", "published": "2021-02-23T00:00:00", "title": "RST Threat feed. IOC: 0.0.0.0 www.etn.bubblemine.com", "type": "rst", "cvss": {}}, {"lastseen": "2021-02-23T00:00:00", "bulletinFamily": "ioc", "cvelist": [], "description": "Found **0[.]0.0.0 bhsb.onlycash.ddns.net** in [RST Threat Feed](https://rstcloud.net/profeed) with score **10**.\n First seen: 2021-02-23T03:00:00, Last seen: 2021-02-23T03:00:00.\n IOC tags: **cryptomining**.\nIOC could be a **False Positive** (Domain not resolved. Whois records not found).\n[https://rstcloud.net/](https://rstcloud.net/)", "edition": 1, "modified": "2021-02-23T00:00:00", "id": "RST:09CFD46D-2066-3A66-856A-C33B5A7E39AA", "href": "", "published": "2021-02-23T00:00:00", "title": "RST Threat feed. IOC: 0.0.0.0 bhsb.onlycash.ddns.net", "type": "rst", "cvss": {}}]}