![]() W32/Agobot-AE - This worm attempts to exploit the DCOM RPC vulnerabilities in Windows. Troj/Ircbot-M - Yet another Trojan horse program that attempts to connect to a specific IRC channel, which an attacker can use to control the infected machine. Troj/Bdoor-AAG - A Trojan horse program that allows an attacker access to an infected machine via IRC. An attacker could exploit this to gain access to the affected machine with the privileges of the user requesting the media file. For more, go to:Ĭonectiva's mplayer, a multimedia application that plays multiple formats of audio and video, contains a bug in the way ASX metafiles are parsed. For more, go to:Īn "off-by-one" flaw in the wu-ftpd code for SCO OpenLinux could be exploited by a local or remote user to gain root privileges on the affected machine. For more, go to:Ī number of bugs and potential security vulnerabilities were found in sane, a package used with document scanners. According to Red Hat, an attacker could exploit this to run any code on the affected machine. For more, go to:Ī buffer overflow has been found in the MySQL password table. The new Perl packages from Red Hat fix security problems in safe.pm and a cross-scripting vulnerability in CGI.pm. And a third flaw could be used to redirect users to the attacker's URL of choice. Another flaw could be exploited by an attacker to read any file on the affected system. One flaw helps bypass a disabled Active Scripting setting in Internet Explorer. GreyMagic Software is reporting it has found three vulnerabilities Adobe's SVG Viewer, used for parsing Scalable Vector Graphics.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |