lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <446FCBF0.30007@kc.rr.com>
Date: Sun May 21 03:08:28 2006
From: mattmurphy at kc.rr.com (Matthew Murphy)
Subject: Mitigating Newly-Reported Microsoft Word
	Vulnerability

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

For those who don't usually read the SecuriTeam blog, I've posted some 
instructions on how to defeat the *current* in-the-wild exploits for the 
newly-reported Microsoft Word vulnerability:

     http://blogs.securiteam.com/index.php/archives/421

-----BEGIN PGP SIGNATURE-----
Version: PGP Desktop 9.0.6 (Build 6060)
Comment: New (15 May '06) Key: Fetch from pgp.mit.edu; ID=0x2257C33F
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=mFwb
-----END PGP SIGNATURE-----

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ