Ravens PHP Scripts: Security



Search on This Topic:   
[ Go to Home | Select a New Topic ]
 

 

Trend Micro falls victim to Web hack More about

Posted on Monday, March 17, 2008 @ 13:01:03 CDT in Security
by Raven


From Trend Micro falls victim to Web hack

It’s not much fun when one of your security vendors falls to a Web attack. Infoworld reports that TrendMicro was a victim of a recent Web attack that used legit sites to deliver malware.

According to InfoWorld Trend Micro removed the infected pages from its Web site. While the attack is unfortunate for Trend Micro at least it had company.

McAfee says almost 200,000 Web pages have been compromised in a little more than a week.

Here’s what McAfee had to say:

The attack seems to have started more than a week ago, and nearly 200,000 web pages have been found to be compromised, most of which are running phpBB. This contrasts yesterday’s attack in that the vast majority of those were active server pages (.ASP). The ASP attacks are different than the phpBB ones in that the payload and method are quite different. Various exploits are used in the ASP attacks, where the phpBB ones rely on social engineering. phpBB mass hacks have occurred in the past, including those done by the Perl/Santy.worm back in 2004.

Read the rest of the story
 

 

Free PHP Encoder and Obfuscator Online! More about

Posted on Sunday, March 09, 2008 @ 03:45:01 CDT in Security
by Raven

kenetix writes:  
Hi everyone, I'm pleased to announce the opening of a new site and a free script here at http://www.freephpencoder.com. The site offers a free php code obfuscation and encoding service that allows people to distribute workable encoded php files for free.

Steps to encoding are extremely simple, simply upload the unencrypted file, download the encoded file, and you are ready to use the file (with the decryptor).

Many more features are planned to implemented with different encoding algorithms, but currently the free service currently utilizes the Zend engine for decoding. A byte encoding feature is currently being developed, and will be released shortly.

More information regarding this can be obtained from my community site:
www.kenetix.net
 

 

Cryogenically frozen RAM bypasses all disk encryption methods More about

Posted on Friday, February 22, 2008 @ 11:51:46 CST in Security
by Raven

Computer encryption technologies have all relied on one key assumption that RAM (Random Access Memory) is volatile and that all content is lost when power is lost. That key assumption is now being fundamentally challenged with a $7 can of compressed air and it’s enough to give every security professional heart burn.

Read the rest of the article at zdnet.com Cryogenically frozen RAM bypasses all disk encryption methods
 

 

Opera Multiple Vulnerabilities More about Read More...

Posted on Wednesday, February 20, 2008 @ 23:15:58 CST in Security
by Raven

SECUNIA ADVISORY ID: SA29029

VERIFY ADVISORY: http://secunia.com/advisories/29029/

CRITICAL: Moderately critical

IMPACT: Security Bypass, Cross Site Scripting, Exposure of sensitive information

SOFTWARE:
Opera 5.x http://secunia.com/product/82/
Opera 6.x http://secunia.com/product/81/
Opera 7.x http://secunia.com/product/761/
Opera 8.x http://secunia.com/product/4932/
Opera 9.x http://secunia.com/product/10615/

DESCRIPTION: Some vulnerabilities have been reported in Opera, which can be exploited by malicious people to conduct cross-site scripting attacks, disclose sensitive information, or to bypass certain security restrictions. The vulnerabilities are reported in versions prior to 9.26.
 Read More...
 

 

WordPress WP Photo Album Plugin *photo* SQL Injection More about Read More...

Posted on Wednesday, February 20, 2008 @ 18:15:38 CST in Security
by Raven

SECUNIA ADVISORY ID: SA28988

VERIFY ADVISORY: http://secunia.com/advisories/28988/

CRITICAL: Moderately critical

IMPACT: Manipulation of data

SOFTWARE: WP Photo Album (WPPA) 1.x (plugin for WordPress) http://secunia.com/product/17641/

DESCRIPTION: A vulnerability has been reported in the WP Photo Album (WPPA) plugin for WordPress, which can be exploited by malicious people to conduct SQL injection attacks.
 Read More...
 

 

Microsoft WebDAV Mini-Redirector Code Execution Vulnerability More about Read More...

Posted on Tuesday, February 12, 2008 @ 16:34:19 CST in Security
by Raven

SECUNIA ADVISORY ID: SA28894

VERIFY ADVISORY: http://secunia.com/advisories/28894/

CRITICAL: Highly critical

IMPACT: System access

OPERATING SYSTEM:
Microsoft Windows XP Home Edition http://secunia.com/product/16/
Microsoft Windows XP Professional http://secunia.com/product/22/
Microsoft Windows Server 2003 Datacenter Edition http://secunia.com/product/1175/
Microsoft Windows Server 2003 Enterprise Edition http://secunia.com/product/1174/
Microsoft Windows Server 2003 Standard Edition http://secunia.com/product/1173/
Microsoft Windows Server 2003 Web Edition http://secunia.com/product/1176/
Microsoft Windows Storage Server 2003 http://secunia.com/product/12399/
Microsoft Windows Vista http://secunia.com/product/13223/

DESCRIPTION: A vulnerability has been reported in Microsoft Windows, which can be exploited by malicious people to compromise a vulnerable system. The vulnerability is caused due to an error in the WebDAV Mini-Redirector (a.k.a Web Client service) when handling long pathnames in WebDAV responses. This can be exploited to cause a heap-based buffer overflow via a specially crafted WebDAV response. Successful exploitation allows execution of arbitrary code.
 Read More...
 



Page 31 of 102 (608 total stories) [ << | < | 26 | 27 | 28 | 29 | 30 | 31 | 32 | 33 | 34 | 35 | 36 | > | >> ]  

News ©

Site Info

Last SeenLast Seen
  • vashd1
  • neralex
Server TrafficServer Traffic
  • Total: 513,556,060
  • Today: 12,516
Server InfoServer Info
  • Apr 26, 2025
  • 03:22 am CDT