lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <649CDCB56C88AA458EFF2CBF494B6204048427DC@USILMS12.ca.com>
Date: Thu, 20 Mar 2008 10:08:42 -0400
From: "Williams, James K" <James.Williams@...com>
To: <bugtraq@...urityfocus.com>
Subject: Note about recently publicized CA BrightStor ActiveX exploit code


CA is reviewing exploit code that was posted on 2008-03-16 to the 
Milw0rm exploit archive web site.  This exploit code is 
potentially associated with vulnerabilities that may exist in CA 
BrightStor ARCserve Backup for Laptops and Desktops and/or related 
products.  CA will issue an advisory after we have completed our 
initial investigation.

Regards,                                                    
Ken Williams ; 0xE2941985
Director, CA Vulnerability Research

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ