Risks
Advisories
Browse
or
or
CentOS Errata and Security Advisory - Low CentOS 5 conga Update (CESA-2013:0128)
CentOS Errata and Security Advisory 2013:0128 Low

Upstream details at : https://rhn.redhat.com/errata/RHSA-2013-0128.html

The following updated files have been uploaded and are currently
syncing to the mirrors: ( sha256sum Filename )

i386:
1b58749c2b0c650032707033cc54a5fc9b18e3c5eccb2ca44907e5c19bce75da 
luci-0.12.2-64.el5.centos.i386.rpm
06d37486a3939551c99ff6a9633aef931ba3568c121df62627736f3efe3f2e77 
ricci-0.12.2-64.el5.centos.i386.rpm

x86_64:
7de6ae9bb1aac61a79f0dbce359407ae73897346f54c407b945368ce93880c2a 
luci-0.12.2-64.el5.centos.x86_64.rpm
fb0867dc6ed37feb187bd6d0b3b82d6a03675c538e033c01a9a8a7af574d91e3 
ricci-0.12.2-64.el5.centos.x86_64.rpm

Source:
30da20928f72a92ff0d9369cb341f8be1285f9d13d1f3887b615448290023fc8 
conga-0.12.2-64.el5.centos.src.rpm




Spotlight

Attackers use reflection techniques for larger DDoS attacks

Posted on 17 April 2014.  |  Instead of using a network of zombie computers, newer DDoS toolkits abuse Internet protocols that are available on open or vulnerable servers and devices. This approach can lead to the Internet becoming a ready-to-use botnet for malicious actors.


Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.
  



Daily digest

Receive a daily digest of the latest security news.
  

DON'T
MISS

Fri, Apr 18th
    COPYRIGHT 1998-2014 BY HELP NET SECURITY.   // READ OUR PRIVACY POLICY // ABOUT US // ADVERTISE //