From: Dustin Cook on 7 Jun 2010 16:00 http://www.findmysoft.com/news/Flash-Player-Adobe-Reader-and-Adobe-Acroba t-Plagued-by-Critical-Actively-Exploited-Vulnerability/ The following Adobe products are affected: - Adobe Flash Player 10.0.45.2, 9.0.262, and earlier 10.0.x and 9.0.x versions for Windows, Macintosh, Linux and Solaris. - Adobe Reader 9.3.2 and earlier 9.x versions for Windows, Macintosh and UNIX - Acrobat 9.3.2 and earlier 9.x versions for Windows, Macintosh and UNIX. Adobe Reader 8.x and Adobe Acrobat 8.X are not vulnerable. Flash Player 10.1 Release Candidate seems to be unaffected as well (Adobe said it �does not appear to be vulnerable�). Doesn't matter if your running linux on this one guys, best be visiting adobe. :) -- A fanatic is one who can't change his mind and won't change the subject -Winston Churchill
From: David H. Lipman on 7 Jun 2010 17:21 From: "Dustin Cook" <bughunter.dustin(a)gmail.com> | http://www.findmysoft.com/news/Flash-Player-Adobe-Reader-and-Adobe-Acroba | t-Plagued-by-Critical-Actively-Exploited-Vulnerability/ | The following Adobe products are affected: | - Adobe Flash Player 10.0.45.2, 9.0.262, and earlier 10.0.x and 9.0.x | versions for Windows, Macintosh, Linux and Solaris. - Adobe Reader 9.3.2 | and earlier 9.x versions for Windows, Macintosh and UNIX - Acrobat 9.3.2 | and earlier 9.x versions for Windows, Macintosh and UNIX. | Adobe Reader 8.x and Adobe Acrobat 8.X are not vulnerable. Flash Player | 10.1 Release Candidate seems to be unaffected as well (Adobe said it | �does not appear to be vulnerable�). | Doesn't matter if your running linux on this one guys, best be visiting | adobe. :) http://www.us-cert.gov/current/index.html#adobe_releases_security_advisory_for2 http://www.adobe.com/support/security/advisories/apsa10-01.html -- Dave http://www.claymania.com/removal-trojan-adware.html Multi-AV - http://www.pctipp.ch/downloads/dl/35905.asp
From: David H. Lipman on 7 Jun 2010 22:24 From: "Manatee Memories" <See(a)the.REPLYTO.entry> | On Mon, 07 Jun 2010 20:00:11 GMT, Dustin Cook | <bughunter.dustin(a)gmail.com> wrote, by way of | <Xns9D90A2D673A8EHHI2948AJD832(a)69.16.185.247>, in alt.comp.virus -->:: >>http://www.findmysoft.com/news/Flash-Player-Adobe-Reader-and-Adobe-Acroba >>t-Plagued-by-Critical-Actively-Exploited-Vulnerability/ | Perhaps Jobs is right after all? Actually, he's kind of left. -- Dave http://www.claymania.com/removal-trojan-adware.html Multi-AV - http://www.pctipp.ch/downloads/dl/35905.asp
From: ~BD~ on 8 Jun 2010 00:44 "Dustin Cook" <bughunter.dustin(a)gmail.com> wrote in message news:Xns9D90A2D673A8EHHI2948AJD832(a)69.16.185.247... > http://www.findmysoft.com/news/Flash-Player-Adobe-Reader-and-Adobe-Acroba > t-Plagued-by-Critical-Actively-Exploited-Vulnerability/ > > The following Adobe products are affected: > - Adobe Flash Player 10.0.45.2, 9.0.262, and earlier 10.0.x and 9.0.x > versions for Windows, Macintosh, Linux and Solaris. - Adobe Reader > 9.3.2 > and earlier 9.x versions for Windows, Macintosh and UNIX - Acrobat > 9.3.2 > and earlier 9.x versions for Windows, Macintosh and UNIX. > > Adobe Reader 8.x and Adobe Acrobat 8.X are not vulnerable. Flash > Player > 10.1 Release Candidate seems to be unaffected as well (Adobe said it > "does not appear to be vulnerable"). > > Doesn't matter if your running linux on this one guys, best be > visiting > adobe. :) Hi Dustin :) Just thought you might like to know that someone is copying your 'work' and posting it to another server. That must mean that at least *someone* trusts your advice nowadays! Here is the post in question:- A high risk security vulnerability has been identified in Adobe Flash Player The following Adobe products are affected: Adobe Flash Player 10.0.45.2, 9.0.262, and earlier 10.0.x and 9.0.x versions for Windows, Macintosh, Linux and Solaris. - Adobe Reader 9.3.2 and earlier 9.x versions for Windows, Macintosh and UNIX - Acrobat 9.3.2 and earlier 9.x versions for Windows, Macintosh and UNIX. http://www.adobe.com/support/security/advisories/apsa10-01.html Doesn't matter if your running linux on this one guys, best be visiting adobe. Read more about it http://www.us-cert.gov/current/index.html#adobe_releases_security_advisory_for2 -- Peter ************************ That's Peter Foldes btw. This is his header info:- Subject: Security Issue (Adobe) From: "Peter Foldes" <shanisean(a)Dfoldes.com> Date: Mon, 7 Jun 2010 18:54:34 -0400 Message-ID: <1275951266_231813(a)pegasus.annex.net> Bytes: 1190 Lines: 21 NNTP-Posting-Host: 96.23.118.86 Path: pegasus.annex.net!not-for-mail Newsgroups: annexcafe.general.user2user X-Authenticated-User: Derek X-Trace: pegasus.annex.net 1275951266 96.23.118.86 (7 Jun 2010 17:54:26 -0500) Reply-to: "Peter Foldes" <bounce(a)bounce> MIME-Version: 1.0 Content-Type: text/plain; format=flowed; charset="iso-8859-1"; reply-type=original Content-Transfer-Encoding: 7bit X-Priority: 3 X-MSMail-Priority: Normal X-Newsreader: Microsoft Outlook Express 6.00.3790.4657 X-MimeOLE: Produced By Microsoft MimeOLE V6.00.3790.4657 Xref: pegasus.annex.net annexcafe.general.user2user:274200 -- Dave
From: Dustin Cook on 8 Jun 2010 10:38 "~BD~" <.BoaterDave(a)hotmail.co.uk> wrote in news:hukhs2$iib$1(a)news.eternal-september.org: > Hi Dustin :) Hello Dave. > Just thought you might like to know that someone is copying your > 'work' and posting it to another server. That must mean that at least > *someone* trusts your advice nowadays! Heh, You don't actually think the anonymous remailer is hurting me with the old posts do you? I know that's what he's trying to do, but it's not working out so well for him. Those old posts of mine and now prove beyond any doubt that I've changed for the better. He may not like it, but he's really only helping me prove my case with each of his remailing posts. Alot of people *still* trust me Dave, they all knew of my past activities as a vxer; this anonymous guy isn't bringing anything new to the table. -- A fanatic is one who can't change his mind and won't change the subject -Winston Churchill
|
Next
|
Last
Pages: 1 2 3 4 5 6 Prev: Hacxx Anti Malware for Windows XP Next: Kadaitcha proved liar on own website |