User:Fabrickator/cert.org path change
Carnegie Mellon Software Engineering Institute's cert.org site has undergone some changes. Though the home page on cert.org and www.cert.org will redirect to www.sei.cmu.edu, the "advisories" directory remains available, but unfortunately, the content of the pages has been changed, and not in a good way.
One example of this is http://www.cert.org/advisories/CA-2001-13.html. The preferred url to replace this is https://www.kb.cert.org/vuls/id/952336 ... this is suggested because it actually contains relevant content whereas http://www.cert.org/advisories/CA-2001-13.html will force you to take additional steps to find the relevant content!
- I'm not sure we should be considering the vulnerability id link as preferred. It seems these pages have links to the CERT advisory, but that link redirects to a page that takes you to the annual consolidated advisories, which is just annoying. There's little we can do other than whine about it, I suppose, assuming we want to reference the vulnerability pages. I consider those consolidated advisories to be "unfit" for purposes of providing a link to a specific advisory.
An alternative approach would be to specify an archived url and indicate the uselessness of the live url with url-status=unfit.
Here are the affected pages:
- Application firewall
- Backdoor (computing)
- Blaster (computer worm)
- Certificate authority
- Code Red (computer worm)
- Denial-of-service attack
- FTP bounce attack
- ILOVEYOU
- InterBase
- Internet Information Services
- Michał Zalewski
- Michelangelo (computer virus)
- Nimda
- Sadmind
- Sendmail
- SQL Slammer
- SYN flood
- TCP Wrappers
- Trojan horse (computing)
- UDP flood attack
- WANK (computer worm)
reference table
[edit]The following stanzas provide the following information:
- advisory id
- advisory name
- original url for the advisory
- working url 1
- working url ...
CA-1989-04 WANK Worm On SPAN Network http://www.cert.org/advisories/CA-1989-04.html https://web.archive.org/web/20001218104500/http://www.cert.org/advisories/CA-1989-04.html https://resources.sei.cmu.edu/asset_files/WhitePaper/1989_019_001_496236.pdf#page=14 CA-1992-02 Michelangelo PC Virus Warning http://www.cert.org/advisories/CA-1992-02.html https://web.archive.org/web/20010116102700/http://www.cert.org/advisories/CA-1992-02.html https://resources.sei.cmu.edu/asset_files/WhitePaper/1992_019_001_496266.pdf#page=6 CA-1996-01 UDP Port Denial-of-Service Attack http://www.cert.org/advisories/CA-1996-01.html https://web.archive.org/web/20010124064800/http://www.cert.org/advisories/CA-1996-01.html https://resources.sei.cmu.edu/asset_files/WhitePaper/1996_019_001_496172.pdf#page=5 CA-1996-06 Vulnerability in NCSA/Apache CGI example code http://www.cert.org/advisories/CA-1996-06.html http://web.archive.org/web/20010407070533/http://www.cert.org/advisories/CA-1996-06.html https://resources.sei.cmu.edu/asset_files/WhitePaper/1996_019_001_496172.pdf#page=34 CA-1996-20 Sendmail Vulnerabilities http://www.cert.org/advisories/CA-1996-20.html http://web.archive.org/web/20010420201453/http://www.cert.org/advisories/CA-1996-20.html https://resources.sei.cmu.edu/asset_files/WhitePaper/1996_019_001_496172.pdf#page=111 CA-1996-21 TCP SYN Flooding and IP Spoofing Attacks https://www.cert.org/advisories/CA-1996-21.html http://web.archive.org/web/20001017145139/https://www.cert.org/advisories/CA-1996-21.html https://resources.sei.cmu.edu/asset_files/WhitePaper/1996_019_001_496172.pdf#page=123 CA-1996-24 Sendmail Daemon Mode Vulnerability http://www.cert.org/advisories/CA-1996-24.html https://web.archive.org/web/20001214122100/http://www.cert.org/advisories/CA-1996-24.html https://resources.sei.cmu.edu/asset_files/WhitePaper/1996_019_001_496172.pdf#page=139 CA-1996-25 Sendmail Group Permissions Vulnerability http://www.cert.org/advisories/CA-1996-25.html https://web.archive.org/web/20010123074100/http://www.cert.org/advisories/CA-1996-25.html https://resources.sei.cmu.edu/asset_files/WhitePaper/1996_019_001_496172.pdf#page=149 CA-1997-05 MIME Conversion Buffer Overflow in Sendmail Versions 8.8.3 and 8.8.4 http://www.cert.org/advisories/CA-1997-05.html https://web.archive.org/web/20010404232440/http://www.cert.org/advisories/CA-1997-05.html https://resources.sei.cmu.edu/asset_files/WhitePaper/1997_019_001_496176.pdf#page=31 CA-1997-27 FTP Bounce Attack http://www.cert.org/advisories/CA-1997-27.html https://web.archive.org/web/20021002034218/http://www.cert.org/advisories/CA-1997-27.html https://resources.sei.cmu.edu/asset_files/WhitePaper/1997_019_001_496176.pdf#page=170 CA-1997-28 IP Denial-of-Service Attacks http://www.cert.org/advisories/CA-1997-28.html https://web.archive.org/web/20011118030102/http://www.cert.org/advisories/CA-1997-28.html https://resources.sei.cmu.edu/asset_files/WhitePaper/1997_019_001_496176.pdf#page=180 CA-1999-01 Trojan horse version of TCP Wrappers http://www.cert.org/advisories/CA-1999-01.html http://web.archive.org/web/20001017170613/http://www.cert.org/advisories/CA-1999-01.html https://resources.sei.cmu.edu/asset_files/WhitePaper/1999_019_001_496184.pdf#page=5 CA-1999-02 Trojan Horses http://www.cert.org/advisories/CA-1999-02.html https://web.archive.org/web/20001017172300/http://www.cert.org/advisories/CA-1999-02.html https://resources.sei.cmu.edu/asset_files/WhitePaper/1999_019_001_496184.pdf#page=14 CA-2000-04 Love Letter Worm http://www.cert.org/advisories/CA-2000-04.html https://web.archive.org/web/20000510145139/http://www.cert.org/advisories/CA-2000-04.html https://resources.sei.cmu.edu/asset_files/WhitePaper/2000_019_001_496188.pdf#page=17 CA-2001-01 Interbase Server Contains Compiled-in Back Door Account http://www.cert.org/advisories/CA-2001-01.html https://web.archive.org/web/20010124071700/http://www.cert.org/advisories/CA-2001-01.html https://resources.sei.cmu.edu/asset_files/WhitePaper/2001_019_001_496192.pdf#page=5 CA-2001-04 Unauthentic "Microsoft Corporation" Certificates http://www.cert.org/advisories/CA-2001-04.html https://web.archive.org/web/20010331083920/http://www.cert.org/advisories/CA-2001-04.html https://resources.sei.cmu.edu/asset_files/WhitePaper/2001_019_001_496192.pdf#page=27 CA-2001-09 Statistical Weaknesses in TCP/IP Initial Sequence Numbers http://www.cert.org/advisories/CA-2001-09.html https://web.archive.org/web/20050404004054/http://www.cert.org/advisories/CA-2001-09.html https://resources.sei.cmu.edu/asset_files/WhitePaper/2001_019_001_496192.pdf#page=51 CA-2001-11 sadmind/IIS Worm" http://www.cert.org/advisories/CA-2001-11.html http://web.archive.org/web/20011107035310/http://www.cert.org/advisories/CA-2001-11.html https://resources.sei.cmu.edu/asset_files/WhitePaper/2001_019_001_496192.pdf#page=69 CA-2001-13 Buffer Overflow In IIS Indexing Service DLL http://www.cert.org/advisories/CA-2001-13.html https://web.archive.org/web/20020124093955/http://www.cert.org/advisories/CA-2001-13.html https://resources.sei.cmu.edu/asset_files/WhitePaper/2001_019_001_496192.pdf#page=76 CA-2001-19 "code red" worm exploiting buffer overflow in iis indexing service dll http://www.cert.org/advisories/CA-2001-19.html https://web.archive.org/web/20020603123658/http://www.cert.org/advisories/CA-2001-19.html https://resources.sei.cmu.edu/asset_files/WhitePaper/2001_019_001_496192.pdf#page=101 CA-2001-26 Nimda Worm http://www.cert.org/advisories/CA-2001-26.html https://web.archive.org/web/20011014191001/http://www.cert.org/advisories/CA-2001-26.html https://resources.sei.cmu.edu/asset_files/WhitePaper/2001_019_001_496192.pdf#page=133 CA-2002-22 Multiple Vulnerabilities in Microsoft SQL Server http://www.cert.org/advisories/CA-2002-22.html https://web.archive.org/web/20030207175347/http://www.cert.org/advisories/CA-2002-22.html https://resources.sei.cmu.edu/asset_files/WhitePaper/2002_019_001_496196.pdf#page=226 CA-2003-04 MS-SQL Server Worm http://www.cert.org/advisories/CA-2003-04.html https://web.archive.org/web/20030201230443/http://www.cert.org/advisories/CA-2003-04.html https://resources.sei.cmu.edu/asset_files/WhitePaper/2003_019_001_496200.pdf#page=20 CA-2003-07 Remote Buffer Overflow in Sendmail http://www.cert.org/advisories/CA-2003-07.html https://web.archive.org/web/20030806195539/http://www.cert.org/advisories/CA-2003-07.html https://resources.sei.cmu.edu/asset_files/WhitePaper/2003_019_001_496200.pdf#page=40 CA-2003-12 Buffer Overflow in Sendmail http://www.cert.org/advisories/CA-2003-12.html https://web.archive.org/web/20030602094321/http://www.cert.org/advisories/CA-2003-12.html https://resources.sei.cmu.edu/asset_files/WhitePaper/2003_019_001_496200.pdf#page=70 CA-2003-20 W32/Blaster worm http://www.cert.org/advisories/CA-2003-20.html https://web.archive.org/web/20031008182946/http://www.cert.org/advisories/CA-2003-20.html https://resources.sei.cmu.edu/asset_files/WhitePaper/2003_019_001_496200.pdf#page=99 CA-2003-25 (VU#108964) Buffer Overflow in Sendmail http://www.cert.org/advisories/CA-2003-25.html https://web.archive.org/web/20031205060231/http://www.cert.org/advisories/CA-2003-25.html https://resources.sei.cmu.edu/asset_files/WhitePaper/2003_019_001_496200.pdf#page=122 TA06-081A Sendmail Race Condition Vulnerability https://www.us-cert.gov/ncas/archives/alerts/TA06-081A