![]() |
![]() |
![]() |
||||
Welcome to the GoFuckYourself.com - Adult Webmaster Forum forums. You are currently viewing our boards as a guest which gives you limited access to view most discussions and access our other features. By joining our free community you will have access to post topics, communicate privately with other members (PM), respond to polls, upload content and access many other special features. Registration is fast, simple and absolutely free so please, join our community today! If you have any problems with the registration process or your account login, please contact us. |
![]() ![]() |
|
Discuss what's fucking going on, and which programs are best and worst. One-time "program" announcements from "established" webmasters are allowed. |
|
Thread Tools |
![]() |
#1 | |
So Fucking Banned
Join Date: Feb 2007
Posts: 1,790
|
MPA3 compromised ?
Quote:
Link to full story |
|
![]() |
![]() ![]() ![]() ![]() ![]() |
![]() |
#2 |
Now choke yourself!
Industry Role:
Join Date: Apr 2006
Posts: 12,085
|
That's an oops.
__________________
|
![]() |
![]() ![]() ![]() ![]() ![]() |
![]() |
#3 |
Sofa King Band
Join Date: Jul 2002
Location: Outside the box
Posts: 29,903
|
Yeah, they "fixed" it by telling programs to restrict IP's to the admin section.
There are ways around that as well. What all else has been fixed since then, I don't know. The entire exploit has been posted on a bunch of places around the net. So fixing it as soon as they were informed about it likely didn't avoid much damage since it could have been around for some time before that. I wonder if minuseonebit will/would go after them with the same vigor he did for NATS. |
![]() |
![]() ![]() ![]() ![]() ![]() |
![]() |
#4 |
Shooter Pinks
Industry Role:
Join Date: Mar 2008
Location: My wife's website. In bed. She's naked ;)
Posts: 150
|
Anything plugged in to fiber is vulnerable.
Coding core using safe practices is the best safeguard against PHP and MySql injections, but that doesn't just secure anything and everything. The important part is recognizing and correcting and weak points in potentially vulnerable scripts. People try to inject my scripts all the time, it's a fact out here. The best thing I can do to protect myself is to use safe coding practices instead of shortcuts, and to buy safe coded commercial scripts and even check them myself if there's any doubt as to their security. If Oystein is fixing it/has fixed it, then great. It's still vulnerable. It's plugged in. So is my bank. My bank had good software, so does Oystein. YP |
![]() |
![]() ![]() ![]() ![]() ![]() |
![]() |
#5 |
The Dupre Pimp
Join Date: Feb 2008
Location: Koh Samui
Posts: 6,677
|
and you guys still wonder where all the passwords in password forums come from..?
__________________
Read TOS for signature rules |
![]() |
![]() ![]() ![]() ![]() ![]() |
![]() |
#6 |
Confirmed User
Join Date: May 2005
Posts: 2,737
|
It happens. The best of developers can screw up. All it takes is a long day of coding or lack of sleep to accidentally skip over sanitizing user submitted data.
Atleast he had it fixed (in some form) ![]() |
![]() |
![]() ![]() ![]() ![]() ![]() |
![]() |
#7 |
Confirmed IT Professional
Industry Role:
Join Date: Nov 2005
Location: Hollywood, CA
Posts: 3,744
|
One of the easiest flaws to deal with yet thousands of developers (or I should say amateurs, rather) continue to not protect their sql scripts. I find it simply amazing.
![]()
__________________
The Best Affiliate Software, Ever. |
![]() |
![]() ![]() ![]() ![]() ![]() |
![]() |
#8 |
Confirmed User
Industry Role:
Join Date: Jan 2002
Location: Huntington Beach, CA
Posts: 8,584
|
MPA is solid and they are very proactive.
Mitch
__________________
![]() Mitch Farber CEO - NETbilling, Inc. Email / Phone: 888-357-8166 / 661-252-2456 Transaction processing & 24/7 call center services with exceptional rates and flexibility, since 1998! |
![]() |
![]() ![]() ![]() ![]() ![]() |