Ravens PHP Scripts: Security



Search on This Topic:   
[ Go to Home | Select a New Topic ]
 

 

Mozilla Firefox Javascript Garbage Collector Vulnerability More about Read More...

Posted on Thursday, April 17, 2008 @ 20:12:50 CDT in Security
by Raven

SECUNIA ADVISORY ID: SA29787

VERIFY ADVISORY: http://secunia.com/advisories/29787/

CRITICAL: Highly critical

IMPACT: DoS, System access

SOFTWARE: Mozilla Firefox 2.0.x http://secunia.com/product/12434/

DESCRIPTION: A vulnerability has been reported in Mozilla Firefox, which can potentially be exploited by malicious people to compromise a user's system. The vulnerability is reported in version 2.0.0.13. Prior versions may also be affected.
 Read More...
 

 

Coppermine Photo Gallery *bridge/coppermine.inc.php* SQL Injection More about Read More...

Posted on Monday, April 14, 2008 @ 14:48:05 CDT in Security
by Raven

SECUNIA ADVISORY ID: SA29741

VERIFY ADVISORY: http://secunia.com/advisories/29741/

CRITICAL: Moderately critical

IMPACT: Manipulation of data

SOFTWARE: Coppermine Photo Gallery 1.x http://secunia.com/product/1427/

DESCRIPTION: A vulnerability has been reported in Coppermine Photo Gallery, which can be exploited by malicious people to conduct SQL injection attacks. The vulnerability is reported in version 1.4.17. Prior versions may also be affected.
 Read More...
 

 

Internet Explorer Data Stream Handling Vulnerability More about Read More...

Posted on Tuesday, April 08, 2008 @ 19:27:38 CDT in Security
by Raven

SECUNIA ADVISORY ID: SA27707

VERIFY ADVISORY: http://secunia.com/advisories/27707/

CRITICAL: Highly critical

IMPACT: System access

SOFTWARE:
Microsoft Internet Explorer 6.x http://secunia.com/product/11/
Microsoft Internet Explorer 7.x http://secunia.com/product/12366/
Microsoft Internet Explorer 5.01 http://secunia.com/product/9/

DESCRIPTION: Secunia Research has discovered a vulnerability in Internet Explorer, which can be exploited by malicious people to compromise a user's system. The vulnerability is caused due to an error when processing data streams and can be exploited to trigger a use-after-free condition by returning a specially crafted data stream of e.g. an unexpected MIME-type for which no handler is registered. Successful exploitation allows execution of arbitrary code when a user visits a malicious website.
 Read More...
 

 

Opera Multiple Vulnerabilities More about Read More...

Posted on Thursday, April 03, 2008 @ 18:36:16 CDT in Security
by Raven

SECUNIA ADVISORY ID: SA29662

VERIFY ADVISORY: http://secunia.com/advisories/29662/

CRITICAL: Highly critical

IMPACT: System access

SOFTWARE:
Opera 9.x http://secunia.com/product/10615/
Opera 5.x http://secunia.com/product/82/
Opera 6.x http://secunia.com/product/81/
Opera 7.x http://secunia.com/product/761/
Opera 8.x http://secunia.com/product/4932/

DESCRIPTION: Some vulnerabilities have been reported in Opera, which potentially can be exploited by malicious people to compromise a user's system. Successful exploitation of the vulnerabilities may allow execution of arbitrary code. The vulnerabilities are reported in versions prior to 9.27.
 Read More...
 

 
SECUNIA ADVISORY ID: SA29509

VERIFY ADVISORY: http://secunia.com/advisories/29509/

CRITICAL: Moderately critical

IMPACT: Security Bypass, DoS, System access

SOFTWARE: PECL Alternative PHP Cache (APC) Extension 3.x - http://secunia.com/product/18046/

SOLUTION: Update to version 3.0.17. - http://pecl.php.net/package/APC/3.0.17

DESCRIPTION: Daniel Papasian has reported a vulnerability in the PECL Alternative PHP Cache (APC) extension, which can be exploited by malicious users to bypass certain security restrictions and potentially by malicious people to compromise a vulnerable system. The vulnerability is reported in version 3.0.16. Other versions may also be affected.
 Read More...
 

 

Mozilla Thunderbird Multiple Vulnerabilities More about Read More...

Posted on Wednesday, March 26, 2008 @ 22:58:43 CDT in Security
by Raven

SECUNIA ADVISORY ID: SA29548

VERIFY ADVISORY: http://secunia.com/advisories/29548/

CRITICAL: Highly critical

IMPACT: Security Bypass, Cross Site Scripting, System access

SOFTWARE: Mozilla Thunderbird 2.x: http://secunia.com/product/14070/

SOLUTION: The vulnerabilities will be fixed in the upcoming 2.0.0.13 version.

DESCRIPTION: Some vulnerabilities have been reported in Mozilla Thunderbird, which can be exploited by malicious people to bypass certain security restrictions, conduct cross-site scripting attacks, or potentially compromise a user's system. For more information: SA29526. The vulnerabilities are reported in versions prior to 2.0.0.13.
 Read More...
 



Page 29 of 102 (608 total stories) [ << | < | 24 | 25 | 26 | 27 | 28 | 29 | 30 | 31 | 32 | 33 | 34 | > | >> ]  

News ©

Site Info

Last SeenLast Seen
  • vashd1
  • neralex
Server TrafficServer Traffic
  • Total: 517,487,774
  • Today: 260,316
Server InfoServer Info
  • May 18, 2025
  • 06:23 pm CDT