Snort mailing list archives
Snortreport remote command execution vuln
From: "Lay, James" <james.lay () wincofoods com>
Date: Thu, 13 Oct 2011 13:36:56 -0600
Not sure if those using this were aware: http://www.securityfocus.com/bid/50031 James
------------------------------------------------------------------------------ All the data continuously generated in your IT infrastructure contains a definitive record of customers, application performance, security threats, fraudulent activity and more. Splunk takes this data and makes sense of it. Business sense. IT sense. Common sense. http://p.sf.net/sfu/splunk-d2d-oct
_______________________________________________ Snort-users mailing list Snort-users () lists sourceforge net Go to this URL to change user options or unsubscribe: https://lists.sourceforge.net/lists/listinfo/snort-users Snort-users list archive: http://www.geocrawler.com/redir-sf.php3?list=snort-users Please visit http://blog.snort.org to stay current on all the latest Snort news!
Current thread:
- Snortreport remote command execution vuln Lay, James (Oct 13)
