BRANIX Postado Maio 26, 2011 Compartilhar Postado Maio 26, 2011 Obrigado por compartilhar!!! Link para o comentário Compartilhar em outros sites More sharing options...
Alexandre Duran Postado Maio 26, 2011 Autor Compartilhar Postado Maio 26, 2011 Recebi deles tb via email: Dear ConfigServer eXploit Scanner Customer, Due to exceptional circumstances we have taken the decision to email all customers of our cxs application. We will only take this step in such circumstances and would not normally send emails to our customers. We have recently discovered several security vulnerabilities in the cxs quarantine procedure and would like to encourage everybody to upgrade to the latest version of cxs immediately. You can do this via the WHM interface (Upgrade button will appear at the bottom of the page) or by running the following command at the root shell: cxs -U More information about new cxs releases can be found here: http://blog.configserver.com/ We would strongly recommend that you subscribe to the blog via RSS to ensure you remain informed about any updates to cxs. If you also have the csf firewall installed on your server, you should also upgrade immediately to the latest version of that application which was also found to have a security vulnerability. This can also be done from the WHM interface or at the root shell with the following command: csf -u If you have received this email in error, please accept our apologies and reply to this mailing and we will remove you from any future contact. Regards, Sarah Michaelson Way to the Web Ltd http://www.configserver.com http://www.waytotheweb.com Para quem usa o eXploit Scanner tb tem atualização. Link para o comentário Compartilhar em outros sites More sharing options...
Posts Recomendados