Ravens PHP Scripts: Security



Search on This Topic:   
[ Go to Home | Select a New Topic ]
 

 

Windows Media Format Runtime ASF Parsing Vulnerability More about Read More...

Posted on Tuesday, December 11, 2007 @ 21:26:51 CST in Security
by Raven

SECUNIA ADVISORY ID: SA28034

VERIFY ADVISORY: http://secunia.com/advisories/28034/

CRITICAL: Highly critical

IMPACT: System access

OPERATING SYSTEM:
Microsoft Windows XP Professional http://secunia.com/product/22/
Microsoft Windows XP Home Edition http://secunia.com/product/16/
Microsoft Windows Vista http://secunia.com/product/13223/
Microsoft Windows Storage Server 2003 http://secunia.com/product/12399/
Microsoft Windows Server 2003 Web Edition http://secunia.com/product/1176/
Microsoft Windows Server 2003 Standard Edition http://secunia.com/product/1173/
Microsoft Windows Server 2003 Enterprise Edition http://secunia.com/product/1174/
Microsoft Windows Server 2003 Datacenter Edition http://secunia.com/product/1175/
Microsoft Windows 2000 Server http://secunia.com/product/20/
Microsoft Windows 2000 Professional http://secunia.com/product/1/
Microsoft Windows 2000 Datacenter Server http://secunia.com/product/1177/
Microsoft Windows 2000 Advanced Server http://secunia.com/product/21/

SOFTWARE:
Microsoft Windows Media Format Runtime 9.x http://secunia.com/product/16898/
Microsoft Windows Media Format Runtime 7.x http://secunia.com/product/16897/
Microsoft Windows Media Format Runtime 11.x http://secunia.com/product/16899/
Microsoft Windows Media Services 9.x http://secunia.com/product/16900/

DESCRIPTION: A vulnerability has been reported in Windows Media Format Runtime / Windows Media Services, which can be exploited by malicious people to compromise a user's system.
 Read More...
 

 
SECUNIA ADVISORY ID: SA28018

VERIFY ADVISORY: http://secunia.com/advisories/28018/

CRITICAL: Highly critical

IMPACT: System access

SOFTWARE: StarOffice / StarSuite 8.x - http://secunia.com/product/10337/

DESCRIPTION: Sun has acknowledged a vulnerability in Sun StarOffice and StarSuite, which can be exploited by malicious people to compromise a user's system.
 Read More...
 

 

rPath update for php5 More about Read More...

Posted on Tuesday, November 20, 2007 @ 10:47:52 CST in Security
by Raven

SECUNIA ADVISORY ID: SA27659

VERIFY ADVISORY: http://secunia.com/advisories/27659/

CRITICAL: Moderately critical

IMPACT: Unknown, Security Bypass

WHERE: From remote

OPERATING SYSTEM: rPath Linux 1.x - http://secunia.com/product/10614/

DESCRIPTION: rPath has issued an update for php5. This fixes some vulnerabilities and weaknesses, where some have unknown impacts and others can be exploited to bypass certain security restrictions. This is related to: SA27648
 Read More...
 

 

AOL Radio AmpX ActiveX Control Multiple Buffer Overflows More about Read More...

Posted on Thursday, November 15, 2007 @ 23:57:08 CST in Security
by Raven

SECUNIA ADVISORY ID: SA27622

VERIFY ADVISORY: http://secunia.com/advisories/27622/

CRITICAL: Highly critical

IMPACT: System access

WHERE: From remote

SOFTWARE: AOL Radio AmpX ActiveX Control 2.x - http://secunia.com/product/16511/

DESCRIPTION: Some vulnerabilities have been reported in AOL Radio, which can be exploited by malicious people to compromise a user's system.

 Read More...
 

 

Samba Multiple Buffer Overflow Vulnerabilities More about Read More...

Posted on Thursday, November 15, 2007 @ 14:03:55 CST in Security
by Raven

SECUNIA ADVISORY ID: SA27450

VERIFY ADVISORY: http://secunia.com/advisories/27450/

CRITICAL: Moderately critical

IMPACT: System access

WHERE: From local network

SOFTWARE:
Samba 3.x - http://secunia.com/product/2999/
Samba 2.x - http://secunia.com/product/1271/

DESCRIPTION: Some vulnerabilities have been reported in Samba, which can be exploited by malicious people to compromise a vulnerable system.
 Read More...
 

 

PHP Multiple Vulnerabilities More about Read More...

Posted on Thursday, November 15, 2007 @ 06:29:02 CST in Security
by Raven

SECUNIA ADVISORY ID: SA27648

VERIFY ADVISORY: http://secunia.com/advisories/27648/

CRITICAL: Moderately critical

IMPACT: Unknown, Security Bypass

WHERE: >From remote

SOFTWARE: PHP 5.2.x - http://secunia.com/product/13446/

DESCRIPTION: Some vulnerabilities and weaknesses have been reported in PHP, where some have unknown impacts and others can be exploited to bypass certain security restrictions.
 Read More...
 



Page 36 of 102 (608 total stories) [ << | < | 31 | 32 | 33 | 34 | 35 | 36 | 37 | 38 | 39 | 40 | 41 | > | >> ]  

News ©

Site Info

Last SeenLast Seen
  • vashd1
  • neralex
Server TrafficServer Traffic
  • Total: 513,602,966
  • Today: 59,422
Server InfoServer Info
  • Apr 26, 2025
  • 12:32 pm CDT