Book Mark

Ike.ninja

Linux Fun
  • Home
  • How to
  • Reference Links
  • Categories
    • Releases
    • Plesk
    • Community
    • CMS
    • security
    • MYSQL
    • cPanel
  • Tools
    • IP Checker
    • Byte Converter
RSS

Joomla! 3.2 Beta 2 Released

Oct24
by Ike on October 24, 2013 at 6:15 pm
Posted In: CMS, Community, Joomla, Project Release News, Releases


Joomla BetaThe Joomla! Project is pleased to announce the availability of Joomla! CMS 3.2 Beta 2. Community members are asked to download and install the package in order to provide quality assurance for Joomla 3.2. Joomla 3.2 is scheduled for release on or around November 6th, 2013.

A big thank you goes out to everyone that contributed to Joomla 3.2! Joomla 3.2 will be our largest release ever, in terms of bug fixes and new features. Right now we’re at about 960 commits since 3.1.5’s release with 50 different people contributing to commits (not including testers and other non-coding activities). And best of all is that the new features are awesome!

└ Tags: Joomla, Project Release News
 Comment 

Parallels Plesk Panel 10.4.4 MU#57

Oct24
by Ike on October 24, 2013 at 2:55 pm
Posted In: Plesk, Releases

The following feature has been added:

[+] Backup signing. Panel signs backup files when they are downloaded or exported to external FTP repositories. The signature lets administrators distinguish trustworthy backups in the list of backups available for restoration. Learn more at http://kb.parallels.com/118188.

└ Tags: backup, FTP, learn, Parallels Plesk Panel
 Comment 

PHP.net blocked by Google: False positive or not?

Oct24
by Ike on October 24, 2013 at 11:32 am
Posted In: security

Rasmus Lerdorf – the creator of PHP – is currently trying to get Google to stop blocking the whole php.net website after it was suspected of containing malware. In a tweet earlier this morning, Rasmus posted a screenshot and suggested that the block was caused by a false positive:

It appears Google has found a false positive and marked all of http://t.co/yKzgbWewmH as suspicious. pic.twitter.com/YDlHcUnCK6

— Rasmus Lerdorf (@rasmus) October 24, 2013

Google’s Webmaster Tools flag the inclusion of the script at http://static.php.net/www.php.net/userprefs.js as suspicious, although this file currently appears benign. However, Google’s Safe Browsing diagnostics for php.net do suggest that malware has been present on the site in the last 90 days:

“Of the 1513 pages we tested on the site over the past 90 days, 4 page(s) resulted in malicious software being downloaded and installed without user consent.”

The block was added to add chunk 127721 in the Google Safe Browsing goog-malware-shavar list. At the time of writing, php.net is still blocked in Firefox and Chrome, both of which make use of Google’s blocklist. Visiting php.net from a Google search results page or the bitly URL shortener causes an interstitial warning page to be displayed.

A seemingly benign, yet obfuscated, JavaScript file called functions.js was removed from the PHP website repository this morning. The developer behind this change speculated that the file “Could be the reason why Google is blocking us today..”

However, a short moment ago, a Hacker News user posted some obfuscated JavaScript that was found appended to a possibly cached version of the userprefs.js script, suggesting that the PHP.net website may have been compromised recently. The obfuscated JavaScript inserts an iframe into the webpage, which loads content from an external site known for distributing malware. Google Chrome blocks the inclusion of any content from known malware domains, although the injected content in this case no longer appears to be accessible.

Using Firebug to display the injection point of the iframe (iframe has been moved to a visible location)

└ Tags: Google Safe Browsing, PHP, security, site, Using Firebug
 Comment 

Parallels Plesk Panel 11.5.30 MU#20

Oct24
by Ike on October 24, 2013 at 9:56 am
Posted In: Plesk, Releases

The following features have been added:

 
[+] Support for CentOS 5.10
[+] Support for Debian 7.2

The following issues have been fixed:

[-] Panel did not apply automatic updates to the Migration & Transfer Manager in some cases.
[-] Administrators could not change the ASP.NET version on a subscription by means of the ‘subscription’ command-line utility. (PPPM-974)
[-] Administrators could not create subscriptions by means of the ‘subscription’ command-line utility if the webmail software was not installed on the server. (142956)
[-] The Postfix mail queue contained messages with the value “Not Found” in the “From” field. (PPPM-968)

└ Tags: command, Migration Transfer Manager, Parallels Plesk Panel, PPPM
 Comment 

Debian: 2784-1: xorg-server: use-after-free

Oct24
by Ike on October 24, 2013 at 5:28 am
Posted In: Other

(Oct 22) Pedro Ribeiro discovered a use-after-free in the handling of ImageText requests in the Xorg Xserver, which could result in denial of service or privilege escalation. [More…]

└ Tags: free, Pedro Ribeiro, Xorg Xserver
 Comment 
  • Page 2,556 of 2,967
  • « First
  • «
  • 2,554
  • 2,555
  • 2,556
  • 2,557
  • 2,558
  • »
  • Last »

What’s New?

  • Fedora 42: tinygltf Update 2.9.7 Advisory FEDORA-2025-ac8ed4a110
  • Fedora 43: webkitgtk Critical Update for CVE-2025-13947, 43458, 66287
  • Fedora 42: abrt Critical Command Injection Vulnerability CVE-2025-12744
  • Fedora 42: Chromium High CVE-2025-13630, 13631, 13632 Advisory
  • Ubuntu 22.04: Linux Kernel Azure Important Security Flaws USN-7910-2
  • Ubuntu 22.04: Important Linux Kernel Updates Addressing Security Flaws
  • Ubuntu 22.04 LTS: Linux Kernel Critical Security Vulnerability USN-7889-5
  • Ubuntu 25.10: Linux GCP Kernel Critical Security Issues USN-7906-2
  • Debian: Chromium Critical Exec Abuse DoS Info Disclosure DSA-6072-1
  • Debian: Unbound Critical Cache Poisoning Fix DSA-6071-1 CVE-2025-11411
  • Ubuntu 20.04 LTS: Important CUPS Denial of Service Advisory USN-7912-2
  • Ubuntu 25.10: MAME Critical Heap Overflow Attacks USN-7913-1
  • Fedora 42: usd Important Security Update for 3D Format 2025-073e4f7991
  • Ubuntu 23.04: xyz Enhanced Security Vulnerabilities Update 2025-4bd12a45g3
  • Debian: WebKitGTK Critical CVE-2025-43392 Exfiltration and Crash DSA-6070-1
  • Debian: OpenVPN Critical HMAC Flaw Bypass CVE-2025-13086 DSA-6069-1
  • State of the Word 2025: Innovation Shaped by Community
  • Ubuntu 20.04: Ghostscript Important DoS Vulnerability USN-7904-1
  • Ubuntu 25.10: PostgreSQL Critical Denial of Service Fix USN-7908-1
  • Fedora 41: openbao 2.4.4 Important Security Issues DoS 2025-45a7dd8f10
  • Fedora 41: restic 0.18.1 Advisory – Urgent Security Concerns Identified
  • Debian: Critical Denial of Service & Privilege Escalation DSA-6067-1
  • Debian 11: Xen Critical Privilege Escalation DSA-6068-1 CVE-2024-28956
  • WordPress 6.9 “Gene”
  • Ubuntu 25.10: Django Important SQL Exec DoS Vulnerabilities 2025:7903-1

Search

Translator

Tags

Business and industry code Community cPanel CVE Debian Debian Linux Distribution - Security Advisories Development Events Fedora Fedora Linux Distribution - Security Advisories General Hosting Important Advisory Linux Moderate Advisory Month in WordPress news Parallels Plesk Parallels Plesk Panel Performance PHP Plesk news and announcements Plesk Panel Podcast ProdDevSec Product and technology Products Project Release News Red Hat Red Hat Linux Distribution - Security Advisories Releases security Security Centre sensitive site Ubuntu Ubuntu Linux Distribution - Security Advisories update updates Various vulnerability Web Server Survey Wordpress wp-briefing

Posts

Helpful Links

  • Liquidweb.com
  • MYSQL Dev Documentation
  • Plugins
  • Source forge SED command
  • Themes
  • WordPress Documentation
  • You Tube
December 2025
M T W T F S S
« Nov    
1234567
891011121314
15161718192021
22232425262728
293031  
  • Google
  • Yahoo
  • Liquid Web
  • Storm
  • YouTube

©1999-2025 Ike.ninja | Powered by WordPress with Easel | Subscribe: RSS | Back to Top ↑

52 queries. 8.75 mb Memory usage. 0.349 seconds.