The RavenNuke(tm) Team has found a possible XSS opportunity depending on different factors of how your forums are setup. The fix is to replace your current modules/Forums/posting.php file with this one. This fix has been tested on RavenNuke(tm) but should work for other versions too. Your versions of the file may already contain the fix (for other reasons) but we have confirmed that the exploit is in other flavors of nuke. Better safe than sorry :)! Be sure to read the README file for additional information.
Download posting.php fix
Potential XSS exploit discovered for different versions of *nuke
Posted on Saturday, November 10, 2007 @ 00:39:13 CST in Security
|
Nuke Platinum Security Fix
Posted on Thursday, November 08, 2007 @ 23:44:39 CST in Security
|
RealPlayer/RealOne/HelixPlayer Multiple Buffer Overflows
Posted on Friday, October 26, 2007 @ 21:27:14 CDT in Security
|
Mozilla Firefox Multiple Vulnerabilities
Posted on Saturday, October 20, 2007 @ 00:02:04 CDT in Security
|
Mozilla Thunderbird Memory Corruption Vulnerabilities
Posted on Friday, October 19, 2007 @ 23:55:59 CDT in Security
|
Oracle Products Multiple Vulnerabilities
Posted on Wednesday, October 17, 2007 @ 18:11:04 CDT in Security
|