Ir para conteúdo
  • Cadastre-se

Falha de segurança no CSF


Alexandre Duran

Posts Recomendados

Recebi deles tb via email:

Dear ConfigServer eXploit Scanner Customer,

Due to exceptional circumstances we have taken the decision to email all

customers of our cxs application. We will only take this step in such

circumstances and would not normally send emails to our customers.

We have recently discovered several security vulnerabilities in the cxs

quarantine procedure and would like to encourage everybody to upgrade to

the latest version of cxs immediately. You can do this via the WHM

interface (Upgrade button will appear at the bottom of the page) or by

running the following command at the root shell:

cxs -U

More information about new cxs releases can be found here:

http://blog.configserver.com/

We would strongly recommend that you subscribe to the blog via RSS to

ensure you remain informed about any updates to cxs.

If you also have the csf firewall installed on your server, you should

also upgrade immediately to the latest version of that application which

was also found to have a security vulnerability. This can also be done

from the WHM interface or at the root shell with the following command:

csf -u

If you have received this email in error, please accept our apologies

and reply to this mailing and we will remove you from any future contact.

Regards,

Sarah Michaelson

Way to the Web Ltd

http://www.configserver.com

http://www.waytotheweb.com

Para quem usa o eXploit Scanner tb tem atualização.

Link para o comentário
Compartilhar em outros sites

Visitante
Este tópico está impedido de receber novos posts.
  • Quem Está Navegando   0 membros estão online

    • Nenhum usuário registrado visualizando esta página.
×
×
  • Criar Novo...

Informação Importante

Concorda com os nossos termos?