Book Mark

Ike.ninja

Linux Fun
  • Home
  • How to
  • Reference Links
  • Categories
    • Releases
    • Plesk
    • Community
    • CMS
    • security
    • MYSQL
    • cPanel
  • Tools
    • IP Checker
    • Byte Converter
RSS

Debian: 2797-1: icedove: Multiple vulnerabilities

Nov15
by Ike on November 15, 2013 at 7:35 am
Posted In: Other

(Nov 13) Multiple security issues have been found in Icedove, Debian’s version of the Mozilla Thunderbird mail and news client. Multiple memory safety errors, and other implementation errors may lead to the execution of arbitrary code. [More…]

└ Tags: code, Mozilla Thunderbird, news
 Comment 

Red Hat: 2013:1518-01: flash-plugin: Critical Advisory

Nov15
by Ike on November 15, 2013 at 6:38 am
Posted In: Other

(Nov 13) An updated Adobe Flash Player package that fixes two security issues is now available for Red Hat Enterprise Linux 5 and 6 Supplementary. The Red Hat Security Response Team has rated this update as having critical [More…]

└ Tags: Adobe Flash Player, Red Hat, security, update
 Comment 

Red Hat: 2013:1519-01: kernel: Important Advisory

Nov15
by Ike on November 15, 2013 at 6:38 am
Posted In: Other

(Nov 13) Updated kernel packages that fix two security issues and several bugs are now available for Red Hat Enterprise Linux 6.2 Extended Update Support. The Red Hat Security Response Team has rated this update as having [More…]

└ Tags: Important Advisory, Red Hat, security, update
 Comment 

Incentives for Phishing Site Reporters

Nov14
by Ike on November 14, 2013 at 4:51 pm
Posted In: Netcraft Services, Other, security

As of the 1st November 2013, the Netcraft Anti-Phishing community has helped to block over 6.9 million phishing attacks worldwide. We incentivise phishing reports from the community, and have now added a Netcraft USB Flash Drive to our list of incentives:

Prize When
Netcraft USB Flash Drive after 100 validated phishing reports
Netcraft Mug after 250
Netcraft Polo Shirt after 500
Targus Laptop Backpack after 1,000
iPad after 5,000

On reaching 5,000 validated reports you become eligible for a monthly competition to incentivise large reporters.

To report phishing sites to us, please use the form at http://toolbar.netcraft.com/report_url, or forward any phishing URLs or emails you receive to [email protected].

The Netcraft Extension, which is available for Firefox and Google Chrome™, serves as a giant neighbourhood watch scheme for the Internet. Members who encounter a phishing site can act to defend the larger community of users against the attack. Once the first recipients of a phishing mail have reported the attack URL, it is blocked for community members as they subsequently access the URL. Widely disseminated attacks simply mean that the phishing attack will be reported and blocked sooner.

Anti-Phishing Chrome Extension
Netcraft Toolbar for Firefox
└ Tags: Netcraft Anti Phishing, Netcraft Mug, Netcraft Services, other, security, site, URL
 Comment 

Parallels Plesk Panel 11.5.30 MU#23

Nov14
by Ike on November 14, 2013 at 8:54 am
Posted In: Plesk, Releases
The following features were added:
 
[+]Administrators can restore backups from the command line and retrieve the status of the restoration process.

On Linux:

plesk bin pleskrestore --restore .... -async

On Windows:

"%plesk_dir%inpleskrestore.exe" --restore .... -async

-async Restore a backup asynchronously. Works with “–restore” only. This will return the task ID to stdout.

Use –get-restore-task-status to check the task status:

On Linux:

plesk bin pleskrestore --get-restore-task-status &lt;task-id&gt;<br><br>&lt;task-status task-id="9516"&gt;<br>&lt;mixed status=""&gt;<br>&lt;restore status=""&gt;<br>&lt;conflict-resolve task-id="2147483640"&gt;<br>&lt;finished status="success"&gt;<br>&lt;execution-result status="success"/&gt;<br>&lt;/finished&gt;<br>&lt;/conflict-resolve&gt;<br>&lt;deploy task-id="9570"&gt;<br>&lt;working&gt;<br>&lt;deploy total-domains="1" total-accounts="0" completed-domains="0" completed-accounts="0"&gt;<br>&lt;current-object type="domain"&gt;&lt;![CDATA[<br>domain.com]]&gt;&lt;/current-object&gt;<br>&lt;/deploy&gt;<br>&lt;/working&gt;<br>&lt;/deploy&gt;<br>&lt;/restore&gt;<br>&lt;/mixed&gt;<br>&lt;/task-status&gt;

pleskrestore –get-restore-task-status exit codes:

Code Description
200 Restore in progress
201 Restore is failed (any task has error status)
202 Restore is finished with warnings (any task has warnings status)
203 Restore is finished with infos
204 Restore is successfully finished

[+] Roundcube webmail was updated to version 0.9.5.

The following issues were resolved:

[-] Domain backups did not work if web server configuration files contained German umlaut characters. (PPPM-867)
[-] Users were unable to log in to Plesk because of issues with the apskeyhandler.exe process.
[-] Administrators received duplicate subscription expiration notices. (PPPM-1002)
[-] Server restart could take about 10-20 minutes due to recreation of web server configuration files for all sites. (PPPM-896)

└ Tags: code, Code Description, Parallels Plesk Panel, PPPM
 Comment 
  • Page 2,545 of 2,972
  • « First
  • «
  • 2,543
  • 2,544
  • 2,545
  • 2,546
  • 2,547
  • »
  • Last »

What’s New?

  • Debian: Important DoS Vulnerabilities in FFmpeg DSA-6080-1 Advisory
  • Ubuntu 20.04 LTS: USN-7922-1 Linux Kernel Important Security Issues
  • Ubuntu 24.04 LTS: Kernel Important Security Fixes USN-7921-1 CVE-2025-39946
  • Debian: firefox-esr Critical Privilege Escalation DSA-6078-1 CVE-2025-14321
  • 2026 Global Partner Program Announcement
  • Fedora 43: python3-docs Update 2025-e235793f10 – Maintenance Release
  • Fedora 43: python3.14 Critical Update Addresses Quadratic Complexity Bug
  • Debian: WordPress Important XSS and Info Disclosure DSA-6075-1
  • Ubuntu 22.04 LTS: fontTools Important Path Traversal Risk CVE-2025-66034
  • Debian: webkit2gtk Critical Info Exfiltration DSA-6074-1 CVE-2025-13947
  • Ubuntu 25.10: Radare2 Critical Memory Leak Security Advisory USN-7915-1
  • Fedora 41 ABRT Critical Command Injection Vulnerability Fix CVE-2025-12744
  • Fedora 42: mingw-libpng Important Heap Buffer Overflow Vuln 2025-9d0f04f316
  • Ubuntu: WebKitGTK High Remote Code Execution Threat USN-7914-1
  • Debian Trixie: FFmpeg Critical Denial of Service and Code Exec DSA-6073-1
  • Fedora 42: tinygltf Update 2.9.7 Advisory FEDORA-2025-ac8ed4a110
  • Fedora 43: webkitgtk Critical Update for CVE-2025-13947, 43458, 66287
  • Fedora 43: TinyGLTF 2.9.7 Security Advisory FEDORA-2025-47bff6f74d
  • Fedora 42: abrt Critical Command Injection Vulnerability CVE-2025-12744
  • Fedora 42: Chromium High CVE-2025-13630, 13631, 13632 Advisory
  • Fedora 42: cef High Type Confusion Vuln CVE-2025-13223,13224 Advisory
  • Fedora 43: chromium High CVE-2025-13630 Type Confusion and more
  • Fedora 43: abrt Critical Command Injection Fix CVE-2025-12744
  • Ubuntu 22.04: Linux Kernel Azure Important Security Flaws USN-7910-2
  • Ubuntu 22.04: Important Linux Kernel Updates Addressing Security Flaws

Search

Translator

Tags

Business and industry code Community cPanel CVE Debian Debian Linux Distribution - Security Advisories Development Events Fedora Fedora Linux Distribution - Security Advisories General Hosting Important Advisory Linux Moderate Advisory Month in WordPress news Parallels Plesk Parallels Plesk Panel Performance PHP Plesk news and announcements Plesk Panel Podcast ProdDevSec Product and technology Products Project Release News Red Hat Red Hat Linux Distribution - Security Advisories Releases security Security Centre sensitive site Ubuntu Ubuntu Linux Distribution - Security Advisories update updates Various vulnerability Web Server Survey Wordpress wp-briefing

Posts

Helpful Links

  • Liquidweb.com
  • MYSQL Dev Documentation
  • Plugins
  • Source forge SED command
  • Themes
  • WordPress Documentation
  • You Tube
December 2025
M T W T F S S
« Nov    
1234567
891011121314
15161718192021
22232425262728
293031  
  • Google
  • Yahoo
  • Liquid Web
  • Storm
  • YouTube

©1999-2025 Ike.ninja | Powered by WordPress with Easel | Subscribe: RSS | Back to Top ↑

51 queries. 8.5 mb Memory usage. 0.256 seconds.