Please Scroll Down to See Forums Below
How to install the app on iOS

Follow along with the video below to see how to install our site as a web app on your home screen.

Note: This feature may not be available in some browsers.

napsgear
genezapharmateuticals
domestic-supply
puritysourcelabs
Research Chemical SciencesUGFREAKeudomestic
napsgeargenezapharmateuticals domestic-supplypuritysourcelabsResearch Chemical SciencesUGFREAKeudomestic

OK, WTF is up with this??? EF trying to hack into my computer and sending a virus???

Status
Not open for further replies.
I checked that thread and all I'm getting in the way of a warning is "Pintoca's Darwin fish is hosted on a site that doesn't have a compact Privacy Policy." Not even a nibble. If you see it again, hit me with a PM and please accept my apologies for the annoyance.
 
digger said:
I checked that thread and all I'm getting in the way of a warning is "Pintoca's Darwin fish is hosted on a site that doesn't have a compact Privacy Policy." Not even a nibble. If you see it again, hit me with a PM and please accept my apologies for the annoyance.
Dood...no need to apologize...for anything.

Was wondering, since the issue seems to have disappeared...could someone have came in shortly after I got hit and cleaned up the dirty code before you had a chance to flush it out?

Weird chit.
 
great to see good bros helping out other good bros in this thread
 
IvanOffelitch said:
This is the 2nd time today this has happened...first I get the following prompt from Norton:

Time: 1:10 p.m.
Date: 8/14/2005
Intrusion: ICC Profile TagData Overflow
Intruder: www.elitefitness.com (69.90.197.215)
Risk Level: High
Protocol: TCP
Attacked IP: local host
Attacked Port: 1374


IMMEDIATELY after this happens, I get a NAV warning that my system was infected with Bloodhound.Exploit.38

Someone??

Anyone???

Powdered Toast Man???

Digger???

Help???

Whiskey
Tango
Foxtrot :confused:


Here's what I read about this. If it happens again, please post the address of the page you were looking at when it happend.

Microsoft Windows color management module ICC profile buffer overflow vulnerability

Description:
Microsoft Windows is prone to a buffer overflow vulnerability in the Color Management Module. The issue is due to a boundary condition error related to the parsing of ICC (International Color Consortium) Profile tags in various supported image and document formats.

ICC Profile data may possibly be embedded in various file formats, including JPEG, GIF, EXIF, TIFF, PNG, PICT, PDF, PostScript, SVG, JDF, and CSS3. Some of these formats may not provide an attack vector, especially if Microsoft does not provide native support or does not call the vulnerable functionality when handling certain formats.

Successful exploitation may result in execution of arbitrary code in the context of the currently logged in user. This vulnerability could be exploited through a Web site that hosts a malicious document, by previewing or opening malicious content in email, or through other means that will allow an attacker to send the victim a malicious document.

There is also a risk that other Microsoft or third-party applications that rely on the affected functionality may be vulnerable. A number of third-party applications may ship with vulnerable libraries, so may remain vulnerable despite having applied the Microsoft patch.

Remediation:
Microsoft has released patches to address this vulnerability in supported platforms.

Referring URL: http://www.securityfocus.com/bid/14214/info
 
Status
Not open for further replies.
Top Bottom