lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <9E97F0997FB84D42B221B9FB203EFA276E9036@dc1ms2.msad.brookshires.net>
From: toddtowles at brookshires.com (Todd Towles)
Subject: FW: New Security Patches from Microsoft

No IE patch, it would seem.

> -----Original Message-----
> From: Eric Schultze [mailto:eric.schultze@...vlik.com]
> Sent: Tuesday, January 11, 2005 12:09 PM
> To: Patch Management Mailing List
> Subject: New Security Patches from Microsoft
> 
> Three new security bulletins have been released
> 
> 
> MS05-001 (Critical)Vulnerability in the Indexing Service 
> Could Allow Remote Code Execution (871250) Vulnerability in 
> HTML Help Could Allow Code Execution (890175) 
> http://www.microsoft.com/technet/security/Bulletin/MS05-001.mspx
> 
> MS05-002 (Critical)
> Vulnerability in Cursor and Icon Format Handling Could Allow 
> Remote Code Execution (891711) 
> http://www.microsoft.com/technet/security/Bulletin/MS05-002.mspx
> 
> MS05-003 (Important)
> Vulnerability in the Indexing Service Could Allow Remote Code 
> Execution
> (871250)
> http://www.microsoft.com/technet/security/Bulletin/MS05-003.mspx
> 
> 
> 
> Happy Testing
> 
> Eric
> 
> 
> ---
> To unsubscribe send a blank email to
> leave-patchmanagement@...chmanagement.org
> 
> ---
> To unsubscribe send a blank email to 
> leave-patchmanagement@...chmanagement.org
> 


Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ