PC & Internet Security Blog
RSS for Posts
RSS for Comments
End of Support: Vista SP0,XP SP2 and Windows 2000
CoU IP Blocklist for Kaspersky is ready!
CoU IP Blocklist Updater available
Windows 7 on my Dell PCs
Installers Hall of Shame - Patchers Demand Security Updates Only
This blog has been
Do you use Online Armor Paid Edition? If so, take advantage of
free IP Blocklist for OA Firewall
Do you use Twitter?
Find out who's in the "
Installers Hall of Shame (Unwanted add-on)"
Windows 7...your initial thoughts
Are you using Outpost Firewall Pro or Suite?
Get CoU IP Blocklist for Outpost then
- it's free
Validate Windows and Office using Opera and Firefox
Tools to scan for missing patches and insecure versions
What to do before “Patch Tuesday”?
OpenDNS DNS servers: 220.127.116.11
Blog Search Form
New Activity in Bright Hub
My Bright Hub Articles
My CoU Blog
Apple iLife, Opera Browser, OpenOffice, StarOffice & WordPress Vulnerabilities
Apple iLife iPhoto Photocast XML "title" Format String Vulnerability
- a vulnerability in iLIfe iPhoto, which potentially can be exploited by malicious people to compromise a user's system has been discovered by Kevin Finisterre. Possible solution is do not follow or subscribe to untrusted links to Photocast feeds. Affected software is Apple iLife iPhoto 6.x. View the advisory
Opera Browser Two Vulnerabilities
- Two vulnerabilities have been reported in Opera, which can be exploited by malicious people to compromise a user's system. iDefense Labs discovered the vulnerabilities. Solution is upgrade to latest version. Advisory is
(Secunia) and Opera -
and then another
OpenOffice WMF/EMF Processing Buffer Overflow Vulnerabilities
- John Heasman has reported some vulnerabilities in OpenOffice, which can be exploited by malicious people to compromise a user's system. Solution is apply fixes or upgrade to v2.1.0. Advisory
StarOffice WMF/EMF Processing Buffer Overflow Vulnerabilities
- John Heasman has reported some vulnerabilities in StarOffice, which can be exploited by malicious people to compromise a user's system. This is solved if you apply the patches.
WordPress User Account Enumeration Weakness
- Kad has discovered a weakness in WordPress, which can be exploited by malicious people to identify valid user accounts. Possible work-around is edit the source code to ensure that a single general error message is returned on a failed login or restrict access to the "wp-login.php" script (e.g. with ".htaccess"). Advisory
A vulnerability has been reported in
, which has unknown impacts but solved by upgrading to lastest version. View the advisory
Sat, Jan 6 2007 0:23 by
Questions? Contact Susan at Susan-at-msmvps.com. Each post's copyright held by the original author. All rights reserved. Blog site is an independent site not sponsored by Microsoft.
Our servers would like to thank www.ownwebnow.com and www.exchangedefender.com. We wouldn't be here without the generosity of Vlad Mazek and his companies.