Pardus: Flashplugin System access Vulnerability


 
Thread Tools Search this Thread
Special Forums Cybersecurity Security Advisories (RSS) Pardus: Flashplugin System access Vulnerability
# 1  
Old 12-23-2008
Pardus: Flashplugin System access Vulnerability

LinuxSecurity.com: A vulnerability has been reported in Adobe Flash Player, which potentially can be exploited by malicious people to compromise a user's system.

More...
Login or Register to Ask a Question

Previous Thread | Next Thread

3 More Discussions You Might Find Interesting

1. Cybersecurity

System access.

As system admin i decided not to give shell access to users and even application admins on production systems. I give them access via a simple (menu)webpage and the menus are suid capable. So, even root commands can be granted to someones menu. I like the fact that no commandline trying or... (1 Reply)
Discussion started by: FerryJD
1 Replies

2. Solaris

HELP cant get access to the system.

I mistakenly edited /etc/vfstab and added an invalid option for the / so now i cant access the system and its hang just when its start to boot, how can i get access to the harddisk to edit the vfstab ? can i use solaris CD ? (1 Reply)
Discussion started by: XP_2600
1 Replies

3. UNIX for Dummies Questions & Answers

Need help to access/mount so to access folder/files on a Remote System using Linux OS

Hi I need to access files from a specific folder of a Linux system from an another Linux System Remotely. I know how to, Export a folder on One SCO System & can access the same by using Import via., NFS in the Sco Unix SVR4 System using the scoadmin utility. Also, I know to use mount -t ... (2 Replies)
Discussion started by: S.Vishwanath
2 Replies
Login or Register to Ask a Question
userdbck(1M)															      userdbck(1M)

NAME
userdbck - verify or fix information in the user database, /var/adm/userdb SYNOPSIS
[file] DESCRIPTION
verifies the information in the user database reports inconsistencies, and fixes problems. If no options and no arguments are specified, reports all data corruption problems in all files in If the option is also specified, each reported problem is repaired. If a file argument (hex 00-ff) is specified, only that file in the directory is verified. Options The following options are recognized: Verify attributes. Information in is used to report any attribute that is not valid, not allowed in the user database, has an invalid value, or is allowed only for a local user and the user is not in Normally when the user database is disabled (see userdb(4)), immediately exits without verifying or repairing the database. The option overrides this and forces to verify or repair the database. Verify user names. User names found in the database are reported if they do not exist in any of the repositories defined in This option could take a long time on a system with many users. Repair all data corruption problems that are found. If this option is not specified, problems are reported but not repaired. Notes Only users who have read and write access to can run RETURN VALUE
exits with one of the following values: success: no inconsistencies were found inconsistencies were found and fixed invalid usage database is disabled; see userdb(4) inconsistencies were found but not fixed, because the option was not specified a problem was found that could not be fixed EXAMPLES
In the following example, all problems in the user database are reported but not repaired. In the following example, all problems in file are reported and repaired. FILES
user database security defaults configuration file security attributes description file SEE ALSO
userdbget(1M), userdbset(1M), userdb_read(3), security(4), userdb(4). userdbck(1M)