Tuesday, July 31, 2012
Microsoft to patch three critical vulnerabilities on Tuesday
Published :
9:26 PM
Author :
shwekoyantaw
ျပီးခဲ့တဲ့ တစ္ပတ္ အဂၤါေန႕ က Microsoft Security TechCenter ထိပ္တန္းအဆင့္ ရိွ vulnerabilities (ယိုေပါက္မ်ား၊အားနည္းခ်က္ေနရာမ်ား) ကိုတရား၀င္ ေက်ညာခ်က္ထုတ္ျပန္ ခဲ့ပါတယ္..ထိုသို႕ေက်ညာခ်က္ထုတ္ျပန္ရာတြင္..အထူးအေရးၾကီးေသာထိပ္ထန္းအဆင့္ယိုေပါက္ မ်ားအျပင္…ေနာက္ထပ္အေရးၾကီးေသာ အားနည္းခ်က္ယိုေပါက္ (၆) ခုကိုလဲတစ္ခါထဲ ထုတ္ျပန္ေက်ညာခ်က္ေပးခဲ့ပါတယ္…။ထိုသို႕ထုတ္ျပန္ရာတြင္ အားနည္းခ်က္ (၉) ခုစလံုးကိုတစ္ခါတည္းေဖာ္ျပထားျပီးေတာ့ ..အဲဒီ ထဲ က(၃)ခုဟာ…Critical အဆင့္ရိွေၾကာင္းႏွင့္ က်န္(၆) ခုမွာ Important အဆင့္ျဖစ္ေၾကာင္း တရာ၀င္ေၾကညာ စာတမ္း ထုတ္ျပန္ခဲ့တာျဖစ္ပါတယ္…။
ထိုကဲ့သို႕ (Critical) အဆင့္ရိွ အထူးအေရးၾကီးေသာအားနည္းခ်က္ ယိုေပါက္(၃) ခုထဲတြင္ စိတ္၀င္စားစရာအေကာင္းဆံုးအခ်က္မွာ..ထိုယိုေပါက္အားနည္းခ်က္(၃) တစ္ခုေသာယိုေပါက္ ဟာ Explorer 9 တြင္ပါ၀င္ေနျခင္းျဖစ္ပါတယ္…။ဒိထက္ပိုျပီးစိတ္၀င္စားစရာေကာင္းတာတစ္ခ်က္က ဒီအားနည္းခ်က္ယိုေပါက္ဟာ Microsoft ထုတ္ကုန္ Browser ေတြထဲက အရင္ တုန္းက ထုတ္လုပ္ခဲ့တဲ့ version ေတြထဲမွာမရိွခဲ့ဘူးဆိုတာပါပဲ..။ဒီယိုေပါက္ဟာ ခုမွေရႊထီးေဆာင္းျပီးေရာက္လာတဲ့အတြက္ နည္းနည္းေတာ့ ေမးခြန္း ထုတ္ခ်င္ စရာေတာ့ေကာင္းပါတယ္…။
ေနာက္ထပ္ (Critical) အဆင့္ရိွအားနည္းခ်က္ယိုေပါက္ ႏွစ္ခုကေတာ့ အရမ္း အႏၱရာယ္မ်ားတဲ့ malicious user ေတြကို Windows operating systems ထဲကို execute code မ်ားကို ထည့္သြင္း ၀င္ေရာက္ခြင့္ျပဳျပီးေတာ့ ထိန္းခ်ဳပ္ခြင့္ ျပဳေစျခင္းျဖစ္တယ္လို႕ အဲဒီ ထုတ္ျပန္ေက်ညာ စာတမ္းမွာေဖာ္ျပထားပါတယ္…။အဲဒီယိုေပါက္ေတြဟာ Window OS မွာ server ( ထိန္ခ်ဳပ္သူ) ႏွင့္ client ( ထိန္ခ်ဳပ္ခံရျခင္း/သူ) တို႕ကို ပါ support ျပဳလုပ္ေပးထားပါတယ္…။
“အမ်ားေမွ်ာ္လင့္ထားတဲ့အတိုင္း ယခုအခ်ိန္မွာျပင္းထန္ယိုေပါက္တစ္ခုျဖစ္လာတဲ့ Microsoft XML Core Services မွ အားနည္းခ်က္ ယိုေပါက္ဟာ CVE-2012-1889 ( CVE =Common Vulnerabilities and Exposures ) ,( CVE-2012-1889 ဆိုတာ CVE ID တစ္ခုျဖစ္) မွာထင္ေပၚလာကာ ျပဳျပင္ ဖာေထးရမယ့္အခ်က္ တစ္ခ်က္ျဖစ္လာ ျပီလို႕ “Vulnerability Management and Penetration Testing service တစ္ခုျဖစ္ေသာ Rapid7 မွသုေတသနျပဳလုပ္သူတစ္ေယာက္ျဖစ္တဲ့ Marcus Carey ကထုတ္ေဖာ္ေျပာၾကားခဲ့ပါတယ္…။
ျပည့္ စံုစြာေလ့လာခ်င္သူမ်ားအတြက္ အခ်က္အလက္အျပည့္အစံုကို Microsoft ရဲ႕ တရား၀င္ security ပိုင္းဆိုင္ရာထုတ္ျပန္ခ်က္မ်ားကို အပတ္စဥ္ အဂၤါေန႕တိုင္းသြားေရာက္ ေလ့လာႏိုင္ပါတယ္…။
Go Here
posted by Me
You also see in ghostarea.net
ref: thehackernew
Pageviewers
CBOX
Manutd-Results
LINK
Label
Android
(3)
autorun
(3)
Backtrack
(8)
batch file
(19)
blogger
(10)
Botnet
(2)
browser
(5)
Brute Force
(6)
cafezee
(2)
cmd
(5)
Cookies
(2)
crack
(12)
Cracking
(2)
crypter
(7)
DDos
(20)
deepfreeze
(4)
defacing
(1)
defence
(16)
domain
(4)
Dos
(9)
downloader
(4)
ebomb
(2)
ebook
(48)
Exploit
(26)
firewall
(3)
game
(2)
gmail
(11)
google hack
(16)
Hacking Show
(3)
Hash
(4)
hosting
(1)
icon changer
(1)
ip adress
(6)
Keygen
(1)
keylogger
(8)
knowledge
(67)
locker
(1)
maintainence
(8)
network
(17)
news
(31)
other
(35)
passwoard viewer
(7)
password
(12)
Philosophy
(6)
Phishing
(8)
premium account
(2)
proxy
(7)
RAT
(10)
run commands
(4)
script
(27)
Shell code
(10)
shortcut Key
(2)
SMTP ports
(1)
social engineering
(7)
spammer
(1)
SQL Injection
(30)
Stealer.crack
(5)
tools
(125)
Tools Pack
(4)
tutorial
(107)
USB
(3)
virus
(32)
website
(84)
WiFi
(4)
word list
(2)
HOW IS MY SITE?
Powered by Blogger.
Blog Archive
-
▼
2012
(210)
-
▼
July
(23)
- Myanmar Hacker Evolution
- Microsoft to patch three critical vulnerabilities ...
- Iranian nuclear program hit by AC/DC virus
- Remote Command Execution
- Remote Code Execution
- Insecure Cookie Handling
- Phone Phreaking
- MSSQL Injection
- Desktop phishing part:2
- VMware installation with backtrack5 on Window 7
- Desktop Phishing Part I : Introduction & Attacking...
- Confessions of Teenage Hackers:Part I :Mafia Boy
- Hackers and Hacking Games
- How To Install Backtrack 5 from USB Drive
- Things need to do after installing Backtrack 5
- Using Fcrackzip on Backtrack 5
- Dual Boot install Backtrack 5
- What is SSL?
- Ways of Redirection!!!
- helpmandruk - SQL Injection Vulnerability
- Top 4 Android Apps To Turn Your SmartPhone Into Ha...
- Kevin Mitnick - The Art of Intrusion(ebook)
- Deeping in Social Engineering
-
▼
July
(23)
Followers
About Me
Popular Posts
-
--- မိတ္ဆက္--- Injection နဲ႔ပက္သက္တဲ႔အပုိင္းကုိ အေတြ႔အၾကံဳ မရင့္က်က္ေသးတဲ႔သူေတြ၊ အေတြ႔အၾကံဳရွိၿပီးတဲ႔သူေတြပါ နားလည္ႏုိင္ေအာင္ ကၽြန္ေတာ့္...
-
အေကာင္းစားမွန္ဘီလူး (မ်တ္ခ်က္။ ။ရွားေလာ့ဟုန္းဆီကမဟုတ္ပါ) ကၽြန္ေတာ္မွန္ဘီလူးေလးတစ္လက္ရထားတယ္။ ဘယ္ႏွယ္ဗ်ာ ကၽြန္ေတာ့္မွန္ဘီလူးကိုမ်ာ...
-
အဓိက က ေတာ့ forums ေတြပဲ. Register လုပ္မွ ၀င္ေရာက္ၾကည့္ရွဳ ႏိုင္မယ္.. bypass လုပ္ဖုိ႔ ကေတာ့ SQL injection ကေတာ့ အေကာင္းဆံုးေပါ့.. အခုေတာ့ ...
-
အသိပညာ ဗဟုသုတသည္ ဟက္ကာတုိ႔ရန္မွ ကာကြယ္ရန္ စြမ္းအားတစ္ခုၿဖစ္ေပသည္။ ယေန႔ေခတ္ အုိင္တီနယ္ပယ္ဆုိင္ရာ စီမံခန္႔ခြဲမႈတြင္ တာ၀န္ရွိသူမ်ားသည္ ၄င္းတ...
-
SQL Dorks အသစ္ေလးေတြလို႔ထင္ပါတယ္..ဒီက ဟက္ကာေတြအတြက္ေတာ့ ေဟာင္းခ်င္ေဟာင္းေနမွာေပါ့..ကၽြန္ေတာ့္ဆီရွိတာေလးေတြပါ..မၾကိဳက္လဲ ေနေပါ့. :P inurl...
-
ဘာရယ္လို႕မဟုတ္ပါဘူး ဒီေန႕ဘာတင္ရ မလဲစဥ္းစားရင္း အေျခခံကစၾကတာေပါ့။ ပထမဆံုး notepad ကိုေခၚပါ။batch file ေရးနည္းက programmingအာလံုး .bat...
-
ကဲဆိုက္တစ္ခုကရတာျပန္ျပီးေတာ့ေ၀မွ်လိုက္ပါတယ္။စမ္းသပ္ခ်င္သူေတြအတြက္ပါ။ သံုးခ်င္ရင္ သံုးပါ။စည္ကမ္းေတာ့ရိွပါေစ။ code: http://13campaign.org...
-
LFI Local File Inclusion ေလး အေၾကာင္းေျပာခ်င္ပါတယ္ ညီကိုတို႔.... Online မွာ LFI ေပါက္ေနတဲ့ဆိုက္ေတြ သန္းခ်ီပီးရွိေနပါတယ္.... Web Hacking ေ...
-
ဒီပိုစ့္ေလးဟာ LFI ေပၚမွာဆင့္ကဲေျပာင္းလဲထားတာျဖစ္ျပီးေတာ့ BASE 64 php filter ကိုအသံုးျပဳမွာျဖစ္ပါတယ္....။ဆာဗာမွာရိွတဲ့ connect.php / conf...
-
Fg Power DDOSER This tool is primarily a “hostbooter” and is aimed at giving unscrupulous gamers an advantage by flooding oppon...
Labels
- Android (3)
- autorun (3)
- Backtrack (8)
- batch file (19)
- blogger (10)
- Botnet (2)
- browser (5)
- Brute Force (6)
- cafezee (2)
- cmd (5)
- Cookies (2)
- crack (12)
- Cracking (2)
- crypter (7)
- DDos (20)
- deepfreeze (4)
- defacing (1)
- defence (16)
- domain (4)
- Dos (9)
- downloader (4)
- ebomb (2)
- ebook (48)
- Exploit (26)
- firewall (3)
- game (2)
- gmail (11)
- google hack (16)
- Hacking Show (3)
- Hash (4)
- hosting (1)
- icon changer (1)
- ip adress (6)
- Keygen (1)
- keylogger (8)
- knowledge (67)
- locker (1)
- maintainence (8)
- network (17)
- news (31)
- other (35)
- passwoard viewer (7)
- password (12)
- Philosophy (6)
- Phishing (8)
- premium account (2)
- proxy (7)
- RAT (10)
- run commands (4)
- script (27)
- Shell code (10)
- shortcut Key (2)
- SMTP ports (1)
- social engineering (7)
- spammer (1)
- SQL Injection (30)
- Stealer.crack (5)
- tools (125)
- Tools Pack (4)
- tutorial (107)
- USB (3)
- virus (32)
- website (84)
- WiFi (4)
- word list (2)
Labels
- Android (3)
- autorun (3)
- Backtrack (8)
- batch file (19)
- blogger (10)
- Botnet (2)
- browser (5)
- Brute Force (6)
- cafezee (2)
- cmd (5)
- Cookies (2)
- crack (12)
- Cracking (2)
- crypter (7)
- DDos (20)
- deepfreeze (4)
- defacing (1)
- defence (16)
- domain (4)
- Dos (9)
- downloader (4)
- ebomb (2)
- ebook (48)
- Exploit (26)
- firewall (3)
- game (2)
- gmail (11)
- google hack (16)
- Hacking Show (3)
- Hash (4)
- hosting (1)
- icon changer (1)
- ip adress (6)
- Keygen (1)
- keylogger (8)
- knowledge (67)
- locker (1)
- maintainence (8)
- network (17)
- news (31)
- other (35)
- passwoard viewer (7)
- password (12)
- Philosophy (6)
- Phishing (8)
- premium account (2)
- proxy (7)
- RAT (10)
- run commands (4)
- script (27)
- Shell code (10)
- shortcut Key (2)
- SMTP ports (1)
- social engineering (7)
- spammer (1)
- SQL Injection (30)
- Stealer.crack (5)
- tools (125)
- Tools Pack (4)
- tutorial (107)
- USB (3)
- virus (32)
- website (84)
- WiFi (4)
- word list (2)
Archive
-
▼
2012
(210)
-
▼
July
(23)
- Myanmar Hacker Evolution
- Microsoft to patch three critical vulnerabilities ...
- Iranian nuclear program hit by AC/DC virus
- Remote Command Execution
- Remote Code Execution
- Insecure Cookie Handling
- Phone Phreaking
- MSSQL Injection
- Desktop phishing part:2
- VMware installation with backtrack5 on Window 7
- Desktop Phishing Part I : Introduction & Attacking...
- Confessions of Teenage Hackers:Part I :Mafia Boy
- Hackers and Hacking Games
- How To Install Backtrack 5 from USB Drive
- Things need to do after installing Backtrack 5
- Using Fcrackzip on Backtrack 5
- Dual Boot install Backtrack 5
- What is SSL?
- Ways of Redirection!!!
- helpmandruk - SQL Injection Vulnerability
- Top 4 Android Apps To Turn Your SmartPhone Into Ha...
- Kevin Mitnick - The Art of Intrusion(ebook)
- Deeping in Social Engineering
-
▼
July
(23)