Just found this fairly challenging javascript game escape. You control a square and try to avoid touching 4 moving blocks (and the walls). It’s fairly tricky – I made it to 32.something seconds after a couple tries though. Just what I needed for a few moments this afternoon.
Tag: javascript
-
Microsoft December 2005 Security updates
Sans has the tip that information on the critical Windows updates expected tomorrow from Microsoft has started to be released.
MS 05-54: Cumulative Security Update for Internet Explorer
This will hopefully patch the javascript issues…
MS 05-55: Vulnerability in Windows Kernel Could Allow Elevation of Privilege.
-
Two critical fixes from Microsoft on December patch Tuesday
December’s rendition of Microsoft’s monthly Patch Tuesday will feature two critical security fixes. The malicious software removal tool will also be updated…
Additionally, Microsoft will issue two non-security high-priority updates through Windows Update and Software Update Services, and three non-security high-priority updates through Microsoft Update and Windows Server Update Services. It is standard Microsoft procedure to not disclose the nature of the updates beforehand for security reasons.
-
Risk using Google Maps shut down.
I’m afraid it was something I expected would happen, *(although you always hope a company will look on such imitation as a form of flattery and be cooperative/excited about the new application of an old game idea…), but the implementation of the strategy game Risk using Google Maps has been shut down by a cease and desist letter from lawyers retained by Hasbro.
-
More neat javascript stuff.
A lot of things javascript have made the “web 2.0” idea what it is (Ajax and all), well, the new Mozilla-Firefox supports a canvas tag. To my limited understanding of it (at this point), allows some javascript interactions with the web page. For example…. one demo is of a first person shooter game (well… first person walking around carrying a weapon game… no shooting), another is of a web based paint program.
-
MS IE Javascript exploit for zero-day (0-day) vulnerability
An exploit for last weeks zero-day (0-day) javascript vulnerability in Microsoft’s Internet Explorer is in the wild. I saw this post from Sunbelt a couple nights ago go up and disappear, at the time I didn’t have long enough to read it… It’s back today and there are instructions for mitigating the risk. However, there is still no patch from Microsoft and no word on when to expect one. According to the Sunbelt post the exploit in the wild is being used for browser hijacking/spyware install stuff.
-
DoS Exploit for MS-053
Incidents.org has the story on an “in the wild” exploit for MS-053 vulnerability. The patch is out, so if you haven’t already – go ahead with the patching. The vulnerability is entitled “Vulnerabilities in Graphics Rendering Engine Could Allow Code Execution (896424)”. The exploit causes 100% cpu utilitzation on visiting a page with a specially crafted file using Internet Explorer. The “attacking” page could essentially cause a system freeze.
-
Serving up web ads to users with javascript disabled
Well, with all the news on the Explorer bug, I started wondering what affect this would have on people browsing sites with adsense. I mean, adsense relies on javascript, so if it’s disabled, no adsense right? Right… Of course, adsense is not the only advertising program that uses javascript. (Of course, there are a number of other things, web counters like google analytics, etc….)
-
More on Explorer vulnerability
Among other things… Sans has lowered the infocon to green, NOT that the threat is diminished, but there have been no new developments with regards to the announcement yesterday of a major Internet Explorer security vulnerability. Sans recommends browsing the web with firefox (with the noscript extension, so you can enable/disable javascript where you wish). There has not yet been evidence of an active attempt at exploiting the vulnerability, but the proof of concept code could be relatively easily changed.
-
Exploit for Unpatched Internet Explorer vulnerability
Well…. buckle your seatbelts it’s going to be a bumpy start to the week.
the securityfix as well as incidents.org are reporting on exploit code that has been released that takes advantage of an unpatched Internet Explorer vulnerability. According to the Sans institute diary entry… they have tested the exploit code and it remotely launched the calculator application, so this is a remote code execution vulnerability and can have SERIOUS consequences.