Security Incidents mailing list archives

RE: Active Exploitation of a Vulnerability in Microsoft Windows


From: <auto494388 () hushmail com>
Date: Tue, 08 Aug 2006 10:11:16 -0600

This was originally linked as:

Active Exploitation of a Vulnerability in Microsoft Remote 
Procedure Call
http://www.us-cert.gov/current/current_activity.html#msrpcexp

But this was quickly changed to "in Microsoft Windows" and 
"#msvuls", well not quick enough ;)

Thanks for the heads up, cheers



Concerned about your privacy? Instantly send FREE secure email, no account required
http://www.hushmail.com/send?l=480

Get the best prices on SSL certificates from Hushmail
https://www.hushssl.com?l=485


------------------------------------------------------------------------------
This List Sponsored by: Black Hat

Attend the Black Hat Briefings & Training USA, July 29-August 3 in Las Vegas. 
World renowned security experts reveal tomorrow's threats today. Free of 
vendor pitches, the Briefings are designed to be pragmatic regardless of your 
security environment. Featuring 36 hands-on training courses and 10 conference 
tracks, networking opportunities with over 2,500 delegates from 40+ nations. 

http://www.blackhat.com
------------------------------------------------------------------------------


Current thread: