Ravens PHP Scripts: Security



Search on This Topic:   
[ Go to Home | Select a New Topic ]
 

 

Tips for Cleaning and Securing Your Website More about

Posted on Monday, October 04, 2010 @ 01:06:34 CDT in Security
by Raven

Southern writes:  
This page provides information about identifying, removing, and preventing badware on your website. It does not cover every situation, only the most common cases that we see at StopBadware. Some cases may require further assistance from security professional. You may also find additional information and volunteer assistance in our online community. We provide this advice as-is and cannot guarantee the results of following it. Like you, we do the best we can.

More: StopBadware
 

 

Tech Insight: SQL Injection Demystified More about

Posted on Sunday, September 26, 2010 @ 00:45:58 CDT in Security
by Raven

Southern writes:  
Several high-profile hacks over the past year including those at Heartland, Hannaford Bros., and 7-11, all have had one thing in common: they were launched with a SQL injection attack.

Cross-site scripting (XSS) had been the king of Web attack techniques for some time, and for good reason -- the ability to steal user credentials, hijack active Web sessions and take action on behalf of a user without their knowledge is particularly nasty. But the classic SQL injection attack has regained the lead as the most popular of Web attacks. Most of all reported Web breaches the first half of this year, according to the new Web Hacking Incidents Database (WHID) report, were conducted via SQL injection. And SQL injection is one of the most common vulnerabilities in Web applications today.

SQL injection attacks take advantage of an application not validating input (like on Twitter and Facebook), or input into a form, such as a site search. The user's input is then incorrectly executed by the backend database server and can have a myriad of results. The simplest example is entering a single quote (') into a search field or login form, and receiving an error message that the SQL query failed.

The attack basically lets the bad guy take an ordinary input field and abuse it in ways that allows him to bypass authentication into the Website, manipulate the database to disclose large amounts of data, or access and control the database server itself.

More: Dark Reading
 

 

Google Chrome Multiple Vulnerabilities More about Read More...

Posted on Monday, July 05, 2010 @ 22:49:12 CDT in Security
by Raven

SECUNIA ADVISORY ID: SA40479

VERIFY ADVISORY: Secunia.com: http://secunia.com/advisories/40479/

RELEASE DATE: 2010-07-06

CRITICAL: Highly Critical!

DESCRIPTION: Multiple vulnerabilities have been reported in Google Chrome, where some have an unknown impact and others can potentially be exploited by malicious people to compromise a vulnerable system.
 Read More...
 

 

TortoiseSVN Spoofing Vulnerability More about Read More...

Posted on Saturday, July 03, 2010 @ 18:05:02 CDT in Security
by Raven

SECUNIA ADVISORY ID: SA40355

VERIFY ADVISORY: http://secunia.com/advisories/40355/

RELEASE DATE: 2010-07-01

DISCUSS ADVISORY: http://secunia.com/advisories/40355/#comments

DESCRIPTION: A vulnerability has been reported in TortoiseSVN, which can be exploited by malicious people to conduct spoofing attacks. The vulnerability is caused due to the use of a vulnerable version of the neon library.

For more information: SA36371. Note: This also fixes a Denial of Service when processing certain XML entities.
 Read More...
 

 

HTML 5 Comes With SQL Injection Risks More about

Posted on Thursday, May 13, 2010 @ 09:18:05 CDT in Security
by Raven

nb1 writes:  

Internet Explorer 9 and Firefox 4 will support it, and Microsoft recently touted its advantages. But the upcoming version of HTML, which builds rich Internet application features into the Web programming language and shifts more Web functions to the client machine, also could open up new Web attack vectors.
Read the full article
 

 

MySQL Multiple Vulnerabilities More about Read More...

Posted on Wednesday, May 12, 2010 @ 19:56:02 CDT in Security
by Raven

SECUNIA ADVISORY ID: SA39792

VERIFY ADVISORY: http://secunia.com/advisories/39792/

DESCRIPTION: Some vulnerabilities have been reported in MySQL, which can be exploited by malicious users to bypass certain security restrictions or potentially compromise a vulnerable system and by malicious people to cause a DoS (Denial of Service). Successful exploitation of this vulnerability may allow execution of arbitrary code. The vulnerabilities are reported in versions prior to 5.1.47.
 Read More...
 



Page 11 of 102 (608 total stories) [ << | < | 6 | 7 | 8 | 9 | 10 | 11 | 12 | 13 | 14 | 15 | 16 | > | >> ]  

News ©

Site Info

Last SeenLast Seen
  • moekin
  • kguske
Server TrafficServer Traffic
  • Total: 504,669,646
  • Today: 88,140
Server InfoServer Info
  • Mar 13, 2025
  • 08:56 am CDT