Ravens PHP Scripts: Security



Search on This Topic:   
[ Go to Home | Select a New Topic ]
 

 

Multi SEO phpBB *pfad* File Inclusion Vulnerability More about Read More...

Posted on Thursday, December 04, 2008 @ 15:40:13 CST in Security
by Raven

SECUNIA ADVISORY ID: SA32986

VERIFY ADVISORY: http://secunia.com/advisories/32986/

CRITICAL: Highly critical

IMPACT: System access

SOFTWARE: Multi SEO phpBB 1.x - http://secunia.com/advisories/product/20660/

DESCRIPTION: NoGe has discovered a vulnerability in Multi SEO phpBB, which can be exploited by malicious people to compromise a vulnerable system. This vulnerability is confirmed in version 1.1.0. Other versions may also be affected.
 Read More...
 

 

Fake Windows XP activation trojan goes 2.0 More about

Posted on Wednesday, November 19, 2008 @ 22:53:30 CST in Security
by Raven

Dancho Danchev writes: Known as Kardphisher and “in the wild” since April, 2007, last week the malware author of this trojan horse mimicking the Windows XP activation interface while collecting the credit card details the end user has submitted, has made significant changes to visual interface and usability of the trojan, consequently improving its authenticity. Guess what happens when a gullible end user falls victim into this social engineering attack?

Read the full article at blogs.zdnet.com
 

 

GeSHi Unspecified Code Execution Vulnerability More about Read More...

Posted on Monday, November 03, 2008 @ 17:54:01 CST in Security
by Raven

SECUNIA ADVISORY ID: SA32559

VERIFY ADVISORY: http://secunia.com/advisories/32559/

CRITICAL: Moderately critical

IMPACT: System access

SOFTWARE: GeSHi 1.x: http://secunia.com/advisories/product/5752/

DESCRIPTION: A vulnerability has been reported in GeSHI, which can potentially be exploited by malicious people to compromise a vulnerable system.
 Read More...
 

 

Opera Command Execution and Cross-Site Scripting More about Read More...

Posted on Friday, October 31, 2008 @ 01:29:38 CDT in Security
by Raven

SECUNIA ADVISORY ID: SA32452

VERIFY ADVISORY: http://secunia.com/advisories/32452/

CRITICAL: Highly critical

IMPACT: Cross Site Scripting, System access

SOFTWARE:
Opera 5.x - http://secunia.com/advisories/product/82/
Opera 6.x - http://secunia.com/advisories/product/81/
Opera 7.x - http://secunia.com/advisories/product/761/
Opera 8.x - http://secunia.com/advisories/product/4932/
Opera 9.x - http://secunia.com/advisories/product/10615/

DESCRIPTION: Some vulnerabilities have been reported in Opera, which can be exploited by malicious people to conduct cross-site scripting attacks or potentially to compromise a user's system. The vulnerabilities are reported in versions prior to 9.62.
 Read More...
 

 

phplist *connector.php* File Extension Validation Vulnerability More about Read More...

Posted on Tuesday, October 28, 2008 @ 19:27:38 CDT in Security
by Raven

SECUNIA ADVISORY ID: SA32439

VERIFY ADVISORY: http://secunia.com/advisories/32439/

CRITICAL: Moderately critical

IMPACT: System access

SOFTWARE: phplist 2.x - http://secunia.com/advisories/product/2544/

DESCRIPTION: A vulnerability has been reported in phplist, which potentially can be exploited by malicious users to compromise a vulnerable system. The vulnerability is reported in versions prior to 2.10.7.
 Read More...
 

 

Microsoft Windows Server Service Vulnerability More about Read More...

Posted on Thursday, October 23, 2008 @ 18:17:58 CDT in Security
by Raven

SECUNIA ADVISORY ID: SA32326

VERIFY ADVISORY: http://secunia.com/advisories/32326/

CRITICAL: Highly critical

IMPACT: System access

OPERATING SYSTEM:
Microsoft Windows 2000 Advanced Server - http://secunia.com/advisories/product/21/
Microsoft Windows 2000 Datacenter Server - http://secunia.com/advisories/product/1177/
Microsoft Windows 2000 Professional - http://secunia.com/advisories/product/1/
Microsoft Windows 2000 Server - http://secunia.com/advisories/product/20/
Microsoft Windows XP Home Edition - http://secunia.com/advisories/product/16/
Microsoft Windows XP Professional - http://secunia.com/advisories/product/22/
Microsoft Windows Vista - http://secunia.com/advisories/product/13223/
Microsoft Windows Server 2003 Datacenter Edition - http://secunia.com/advisories/product/1175/
Microsoft Windows Server 2003 Enterprise Edition - http://secunia.com/advisories/product/1174/
Microsoft Windows Server 2003 Standard Edition - http://secunia.com/advisories/product/1173/
Microsoft Windows Server 2003 Web Edition - http://secunia.com/advisories/product/1176/
Microsoft Windows Storage Server 2003 - http://secunia.com/advisories/product/12399/
Microsoft Windows Server 2008 - http://secunia.com/advisories/product/18255/

DESCRIPTION: A vulnerability has been reported in Microsoft Windows, which can be exploited by malicious people to compromise a vulnerable system. The vulnerability is caused due to an error in the Server Service component when processing RPC requests and can be exploited via specially crafted RPC requests. Successful exploitation allows execution of arbitrary code, but requires authenticated access on Windows Vista and Windows Server 2008. NOTE: According to Microsoft, the vulnerability is currently being actively exploited.
 Read More...
 



Page 22 of 102 (608 total stories) [ << | < | 17 | 18 | 19 | 20 | 21 | 22 | 23 | 24 | 25 | 26 | 27 | > | >> ]  

News ©

Site Info

Last SeenLast Seen
  • vashd1
  • neralex
Server TrafficServer Traffic
  • Total: 513,506,091
  • Today: 98,923
Server InfoServer Info
  • Apr 25, 2025
  • 02:49 pm CDT