==
Secunia Research 04/01/2010
- PDF-XChange Viewer Content Parsing Memory Corruption Vulnerability -
==
Table of Contents
Affected
Sorry if this has been posted (or even fixed) before, but my mom just
about got infected with something if it weren't for her anti-virus.
http://laryju.info/cgi-bin/qw will download and execute a trojan using
some sort of java-based vulnerability. AFAIK she's up-to-date on her
patches, so perhaps
Hi @ll,
Intel just released updated drivers for their ethernet network adaptors,
see
http://downloadcenter.intel.com/Detail_Desc.aspx?agr=YDwnldID=17906ProdId=3025lang=eng
and
http://downloadcenter.intel.com/Detail_Desc.aspx?agr=YDwnldID=18518ProdId=3025lang=eng
for example.
Unfortunately ALL
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Gentoo Linux Security Advisory GLSA 201001-02
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
http://security.gentoo.org/
- - - - -
Hi all,
I'm happy to announce the very first public release of the open source
project DeepToad, a tool for computing fuzzy hashes from files.
DeepToad can generate signatures, clusterize files and/or directories
and compare them. It's inspired in the very good tool ssdeep [1] and, in
fact, both
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Gentoo Linux Security Advisory GLSA 201001-01
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
http://security.gentoo.org/
- - - - -