Ravens PHP Scripts: Security



Search on This Topic:   
[ Go to Home | Select a New Topic ]
 

 

FileZilla Unspecified Format String Vulnerabilities More about Read More...

Posted on Monday, April 16, 2007 @ 12:03:10 CDT in Security
by raven

SECUNIA ADVISORY ID: SA24894

VERIFY ADVISORY: http://secunia.com/advisories/24894/

CRITICAL: Moderately critical

IMPACT: DoS, System access

WHERE: >From remote

SOFTWARE: FileZilla 2.x - http://secunia.com/product/2925/

DESCRIPTION: Some vulnerabilities have been reported in FileZilla, which potentially can be exploited by malicious people to compromise a user's system.
 Read More...
 

 

Clam AntiVirus Two Vulnerabilities More about Read More...

Posted on Saturday, April 14, 2007 @ 12:16:54 CDT in Security
by Raven



SECUNIA ADVISORY ID: SA24891

VERIFY ADVISORY: http://secunia.com/advisories/24891/

CRITICAL: Moderately critical

IMPACT: Unknown

WHERE: >From remote

SOFTWARE: Clam AntiVirus (clamav) 0.x - http://secunia.com/product/2538/

DESCRIPTION: Two vulnerabilities with unknown impact have been reported in Clam AntiVirus.
 Read More...
 

 

PhpWiki *UpLoad* PHP Script Upload Vulnerability More about Read More...

Posted on Saturday, April 14, 2007 @ 12:13:10 CDT in Security
by Raven

SECUNIA ADVISORY ID: SA24888

VERIFY ADVISORY: http://secunia.com/advisories/24888/

CRITICAL: Highly critical

IMPACT: System access

WHERE: >From remote

SOFTWARE: PhpWiki 1.x - http://secunia.com/product/5318/

DESCRIPTION: A vulnerability has been discovered in PhpWiki, which can be exploited by malicious people to compromise a vulnerable system.
 Read More...
 

 

Microsoft Windows DNS Service Buffer Overflow Vulnerability More about Read More...

Posted on Saturday, April 14, 2007 @ 12:07:53 CDT in Security
by Raven

SECUNIA ADVISORY ID: SA24871

VERIFY ADVISORY: http://secunia.com/advisories/24871/

CRITICAL: Highly critical

IMPACT: System access

WHERE: >From local network

DESCRIPTION: A vulnerability has been reported in Microsoft Windows, which can be exploited by malicious people to compromise a vulnerable system. The vulnerability is caused due to a boundary error in an RPC interface of the DNS service used for remote management of the service. This can be exploited to cause a stack-based buffer overflow via a specially crafted RPC request. Successful exploitation allows execution of arbitrary code with SYSTEM privileges.

OPERATING SYSTEM:
 Read More...
 

 

Opera Unspecified Flash Player Plug-In Vulnerability More about Read More...

Posted on Saturday, April 14, 2007 @ 12:01:41 CDT in Security
by Raven

SECUNIA ADVISORY ID: SA24877

VERIFY ADVISORY: http://secunia.com/advisories/24877/

CRITICAL: Moderately critical

IMPACT: Unknown

WHERE: >From remote

SOFTWARE: Opera 9.x - http://secunia.com/product/10615/

DESCRIPTION: A vulnerability with an unknown impact has been reported in Opera.
 Read More...
 

 
SECUNIA ADVISORY ID: SA24743

VERIFY ADVISORY: http://secunia.com/advisories/24743/

CRITICAL: Highly critical

IMPACT: Cross Site Scripting, System access

WHERE: >From remote

SOFTWARE: Firebug (Extension for Mozilla Firefox) 1.x - http://secunia.com/product/13856/

DESCRIPTION: pdp has reported a vulnerability in the Firebug extension for Mozilla Firefox, which can be exploited by malicious people to compromise a vulnerable system.
 Read More...
 



Page 47 of 102 (608 total stories) [ << | < | 42 | 43 | 44 | 45 | 46 | 47 | 48 | 49 | 50 | 51 | 52 | > | >> ]  

News ©

Site Info

Last SeenLast Seen
  • vashd1
  • neralex
Server TrafficServer Traffic
  • Total: 513,672,588
  • Today: 7,777
Server InfoServer Info
  • Apr 27, 2025
  • 02:35 am CDT