Security Incidents mailing list archives
RE: Active Exploitation of a Vulnerability in Microsoft Windows
From: <auto494388 () hushmail com>
Date: Tue, 08 Aug 2006 10:11:16 -0600
This was originally linked as: Active Exploitation of a Vulnerability in Microsoft Remote Procedure Call http://www.us-cert.gov/current/current_activity.html#msrpcexp But this was quickly changed to "in Microsoft Windows" and "#msvuls", well not quick enough ;) Thanks for the heads up, cheers Concerned about your privacy? Instantly send FREE secure email, no account required http://www.hushmail.com/send?l=480 Get the best prices on SSL certificates from Hushmail https://www.hushssl.com?l=485 ------------------------------------------------------------------------------ This List Sponsored by: Black Hat Attend the Black Hat Briefings & Training USA, July 29-August 3 in Las Vegas. World renowned security experts reveal tomorrow's threats today. Free of vendor pitches, the Briefings are designed to be pragmatic regardless of your security environment. Featuring 36 hands-on training courses and 10 conference tracks, networking opportunities with over 2,500 delegates from 40+ nations. http://www.blackhat.com ------------------------------------------------------------------------------
Current thread:
- Active Exploitation of a Vulnerability in Microsoft Windows modincidents (Aug 08)
- <Possible follow-ups>
- RE: Active Exploitation of a Vulnerability in Microsoft Windows auto494388 (Aug 08)