[linux-elitists] Another opportunity to overload deCSS
Fri Mar 17 10:30:50 PST 2000
This is a regular security announce list I'm on, I figured you folks would
enjoy the indulgence in 3LA-itis.
-* Heather Stern -*- Use of MSwin systems might be considered a security risk
because you can't secure that they'll even stay working.
----- Forwarded message from The SANS Institute -----
From: The SANS Institute <email@example.com>
Subject: NWC/SANS SAC Newsletter #36
To: Heather Stern (SD107773)
Re: Your personalized Security Alert Consensus
-- Security Alert Consensus --
Number 036 (00.12)
Friday, March 17, 2000
Created for you by
Network Computing and the SANS Institute
-------- sponsor ad zapped ---------------------------------------------
Welcome to the latest edition of Security Alert Consensus. If you have
any problems or questions, please e-mail us at <firstname.lastname@example.org>.
* Many more reports of applications "vulnerable to CSS (cross-site
scripting)" have appeared this week. The gist of the problem is that
HTML reports, etc. The possibilities are endless, and therefore we
will not keep reporting the individual applications that allow for a
scripting on the client. More information on CSS can be found at
* The Apache Group has officially announced the release of Apache 2.0
* Sendmail version 8.10.0 has been released, and it includes more UCE
(spam) filtering and control.
More information about the linux-elitists