The second buffer overflow vuln exists in the bulk insert procedure, which allows data files to be copied into a table. |
|
Through this vuln an attacker who is able to compromise a CVS server can contaminate source-code repositories with Trojan code. |
|
The networking giant says the vuln is yet to be maliciously exploited, to the best of its knowledge. |
|
Next up, there's a moderate vuln in Microsoft MSN Messenger. |
|
There is a potentially troublesome denial of service risk linked to a vuln in the Linux 2.4 kernel, concerning the cacheing of routing information. |
|
Mr Wheatley dismissed fears that any securitisation deal would leave Liverpool vuln erable to the problems experienced at Leeds United. |
|