by Visakh S | May 5, 2016 | cPanel, DirectAdmin, Plesk, Server Administration
On May 3rd, ImageMagick disclosed a serious Remote Code Execution vulnerablity (CVE-2016–3714) that allows attackers to execute malware hidden in image uploads. ImageMagick is widely used to process images, and is a part of PHP, Ruby, Node.Js, Python and many other...
by Visakh S | Jul 31, 2015 | cPanel, DirectAdmin, Plesk, Server Management
On 28th July Internet Systems Consortium announced a critical vulnerability (CVE-2015-5477) in all BIND DNS server versions from 9.1.0 to 9.9.7-P1 and 9.10.2-P2. It allows a remote attacker to exploit an error in handling TKEY queries to launch a Denial of Service...
by Visakh S | Jul 30, 2015 | Apache, cPanel, DirectAdmin, Plesk, Technical Support
In cPanel, Plesk and DirectAdmin servers that have WordPress websites, high server load is sometimes reported with “xmlrpc.php” showing up as the top CPU hog. xmlrpc.php is a file in WordPress websites used for remote publishing and ping-back tracking....
by Visakh S | Jul 24, 2015 | cPanel, DirectAdmin, Plesk, Server Administration
Qualys reported on 23rd July an important root privilege escalation vulnerability (CVE-2015-3246), and DoS attack vulnerability (CVE-2015-3245) for Linux servers using RedHat’s libuser package. Here’s how you can protect your cPanel, Plesk and DirectAdmin...
by Visakh S | Nov 28, 2014 | cPanel, DirectAdmin, Drupal, Plesk, Server Administration, WordPress
CryptoPHP is a well developed backdoor malware that is spread through themes for popular CMS like WordPress, Joomla and Drupal, etc. It runs a bot in your server, and allows remote control for the attacker controlling the botnet. The attacker can then use your server...
by Visakh S | Oct 25, 2014 | DirectAdmin, Sender Verify Failed, Technical Support
SMTP error from remote mail server after RCPT TO:<user2@domain2.com>: host mx.server.com [xxx.xxx.xxx.xxx]: 550-Verification failed for <user1@domain1.com> 550-No Such User Here 550 Sender verify failed If you are a DirectAdmin web host, you would...
Recent Comments