Ravens PHP Scripts: Security



Search on This Topic:   
[ Go to Home | Select a New Topic ]
 

 

Google Chrome Skia 2D Integer Overflow Vulnerabilities More about

Posted on Thursday, May 07, 2009 @ 18:58:43 CDT in Security
by Raven

SECUNIA ADVISORY ID: SA35014

VERIFY ADVISORY: http://secunia.com/advisories/35014/

CRITICAL: Highly Critical

DESCRIPTION: Some vulnerabilities have been reported in Google Chrome, which can potentially be exploited by malicious people to compromise a user's system. Integer overflow errors in the Skia 2D graphics component can be exploited to corrupt memory and potentially execute arbitrary code when a user visits a malicious web site. The vulnerabilities are reported in versions prior to 1.0.154.64. NOTE: An error when validating input from a renderer process has also been reported.

SOLUTION: Update to version 1.0.154.64.

PROVIDED AND/OR DISCOVERED BY: Reported by the vendor.

ORIGINAL ADVISORY: http://googlechromereleases.blogspot.com/2009/05/stable-update-security-fix.html
 

 

IrfanView Formats Plug-in XPM Integer Overflow Vulnerability More about Read More...

Posted on Tuesday, April 07, 2009 @ 17:16:21 CDT in Security
by Raven

SECUNIA ADVISORY ID: SA34525

VERIFY ADVISORY: http://secunia.com/advisories/34525/

CRITICAL: Highly Critical

DESCRIPTION: Secunia Research has discovered a vulnerability in IrfanView's Formats plug-in, which can be exploited by malicious people to compromise a user's system. The vulnerability is confirmed in version 4.22. Other versions may also be affected.
 Read More...
 

 

WebHosting Talk website severely hacked/compromised More about

Posted on Friday, March 27, 2009 @ 12:56:06 CDT in Security
by Raven

From Dennis Johnson (WHT):

It's been pretty hectic around here, but I wanted to make sure as many members as possible know what's going on. At approximately 8:30 pm EST on Saturday, March 21 The malicious attacker deleted all backups from the backup servers within the infrastructure before deleting tables from our db server. We were alerted of the db exploitation and quickly shut down the site to prevent further damage.

We've tried to answer any questions or concerns in the following thread posted at http://www.webhostingtalk.com/showthread.php?t=729727. Be sure to subscribe if you want to stay informed.

WHT Data - Q&A Information
========================
What do we know about the damage done?

This attack was very deliberate, sophisticated and calculated. The attacker was able to circumvent our security measures and access via an arcane backdoor protected by additional firewall. We are still investigating the situation, but we know the attacker infiltrated and deleted the backups first and then deleted three databases: user/post/thread. We have no record or evidence that private message data was accessed. Absolutely no credit card or PayPal data was exposed.

Read the entire story
 

 

Why Windows Safe Mode Isn't So Safe More about

Posted on Wednesday, March 18, 2009 @ 12:03:43 CDT in Security
by Raven

nb1 writes:  
Windows has, for many years, come with a special mode you can load at boot called Safe Mode. The idea is that non-essential services and software don't load in safe mode and so it can be useful in diagnosing system problems.

You might assume that it can be useful in fixing malware infections and you'd be right, but not in all cases. As McAfee's Avert Labs points out in a blog entry, it's possible for malware to set itself up to load even in Safe Mode.

Full Article
 

 

ModSecurity Two Denial of Service Vulnerabilities More about Read More...

Posted on Thursday, March 12, 2009 @ 17:09:00 CDT in Security
by Raven

HorrorCode writes:  


SECUNIA ADVISORY ID: SA34256

VERIFY ADVISORY: http://secunia.com/advisories/34256/

DESCRIPTION: Two vulnerabilities have been reported in ModSecurity, which can be exploited by malicious people to cause a DoS (Denial of Service). Successful exploitation requires that PDF XSS protection is enabled (disabled by default).


 Read More...
 

 

Phishers hijack 750+ Twitter accounts More about

Posted on Saturday, March 07, 2009 @ 02:15:44 CST in Security
by Raven

nb1 writes:  

Trend Micro is reporting, and Twitter confirms, that Twitter users are once again under attack by people who need to upgrade their ethics. Targets receive a tweet from someone claiming to be female, 23, and in possession of a webcam. Click the link and you end up on an "adult" site that both attempts to phish your credit-card info and slathers your computer with ads for the same stuff.

twitter says it has changed the passwords and removed the spam from the 750-odd accounts, none of which were believed to actually be kept by anyone female, 23, and in possession of a webcam. Trend Micro notes tartly that though it's not clear how how the attack was undertaken, "with Twitterers' willingness to enter their Twitter username and password into any number of third-party websites offering Twitter-related services, the opportunities for cybercrime are many."
 



Page 18 of 102 (608 total stories) [ << | < | 13 | 14 | 15 | 16 | 17 | 18 | 19 | 20 | 21 | 22 | 23 | > | >> ]  

News ©

Site Info

Last SeenLast Seen
  • moekin
  • kguske
Server TrafficServer Traffic
  • Total: 504,720,336
  • Today: 138,830
Server InfoServer Info
  • Mar 13, 2025
  • 02:06 pm CDT