summaryrefslogtreecommitdiff
path: root/old/published/Webmonkey/Monkey_Bites/2007/08.20.07/Fri/yahoo.txt
diff options
context:
space:
mode:
authorluxagraf <sng@luxagraf.net>2020-04-28 10:24:02 -0400
committerluxagraf <sng@luxagraf.net>2020-04-28 10:24:02 -0400
commitf343ef4d92352f9fc442aeb9c8b1abee27d74c62 (patch)
tree4df5c497e7caeab1f8932df98ad3d00fef228a3e /old/published/Webmonkey/Monkey_Bites/2007/08.20.07/Fri/yahoo.txt
parenta222e73b9d352f7dd53027832d04dc531cdf217e (diff)
cleaned up wired import
Diffstat (limited to 'old/published/Webmonkey/Monkey_Bites/2007/08.20.07/Fri/yahoo.txt')
-rw-r--r--old/published/Webmonkey/Monkey_Bites/2007/08.20.07/Fri/yahoo.txt10
1 files changed, 0 insertions, 10 deletions
diff --git a/old/published/Webmonkey/Monkey_Bites/2007/08.20.07/Fri/yahoo.txt b/old/published/Webmonkey/Monkey_Bites/2007/08.20.07/Fri/yahoo.txt
deleted file mode 100644
index 0e30027..0000000
--- a/old/published/Webmonkey/Monkey_Bites/2007/08.20.07/Fri/yahoo.txt
+++ /dev/null
@@ -1,10 +0,0 @@
-A quick note for fans of Yahoo Messenger: the company has released an update which [patches a vulnerability][1] in Yahoo's webcam video chat feature. This is the second time Yahoo has updated Messenger in recent months.
-
-The exploit, which was revealed last week and already exists in the wild, triggers a heap overflow if you accepts a webcam invitation from a malicious party.
-
-Once initiated the remote attacker could execute malicious code your machine.
-
-If you use Yahoo Messenger and haven't [downloaded the latest version][2], we recommend doing so, though we can't help wondering just who exactly accepts an unsolicited video chat request in the first place?
-
-[1]: http://messenger.yahoo.com/security_update.php?id=082107
-[2]: http://messenger.yahoo.com/download.php \ No newline at end of file