Incidents
RE: Active Exploitation of a Vulnerability in Microsoft Windows Aug 08 2006 04:11PM
auto494388 hushmail com
This was originally linked as:

Active Exploitation of a Vulnerability in Microsoft Remote
Procedure Call
http://www.us-cert.gov/current/current_activity.html#msrpcexp

But this was quickly changed to "in Microsoft Windows" and
"#msvuls", well not quick enough ;)

Thanks for the heads up, cheers

Concerned about your privacy? Instantly send FREE secure email, no account required
http://www.hushmail.com/send?l=480

Get the best prices on SSL certificates from Hushmail
https://www.hushssl.com?l=485

------------------------------------------------------------------------
------
This List Sponsored by: Black Hat

Attend the Black Hat Briefings & Training USA, July 29-August 3 in Las Vegas.
World renowned security experts reveal tomorrow's threats today. Free of
vendor pitches, the Briefings are designed to be pragmatic regardless of your
security environment. Featuring 36 hands-on training courses and 10 conference
tracks, networking opportunities with over 2,500 delegates from 40+ nations.

http://www.blackhat.com
------------------------------------------------------------------------
------

[ reply ]


 

Privacy Statement
Copyright 2010, SecurityFocus