Ravens PHP Scripts: Security



Search on This Topic:   
[ Go to Home | Select a New Topic ]
 

 

PHP-Nuke Addressbook Module *module_name* Local File Inclusion More about Read More...

Posted on Friday, April 06, 2007 @ 09:50:32 CDT in Security
by Raven

SECUNIA ADVISORY ID: SA24697

VERIFY ADVISORY: http://secunia.com/advisories/24697/

CRITICAL: Moderately critical

IMPACT: Exposure of system information, Exposure of sensitive information

WHERE: >From remote

SOFTWARE: Addressbook 1.x (module for PHP-Nuke) - http://secunia.com/product/13832/

DESCRIPTION: bd0rk has discovered a vulnerability in the Addressbook module for PHP-Nuke, which can be exploited by malicious people to disclose sensitive information.
 Read More...
 

 

Advanced Login *root* File Inclusion Vulnerability More about Read More...

Posted on Friday, March 30, 2007 @ 11:10:28 CDT in Security
by Raven

SECUNIA ADVISORY ID: SA24695

VERIFY ADVISORY: http://secunia.com/advisories/24695/

CRITICAL: Highly critical

IMPACT: System access

WHERE: >From remote

SOFTWARE: Advanced Login 0.x - http://secunia.com/product/13824/

DESCRIPTION: Zeni Susanto has discovered a vulnerability in Advanced Login, which can be exploited by malicious people to compromise a vulnerable system.
 Read More...
 

 

Microsoft Windows Animated Cursor Handling Vulnerability More about Read More...

Posted on Thursday, March 29, 2007 @ 23:55:47 CDT in Security
by Raven

SECUNIA ADVISORY ID: SA24659

VERIFY ADVISORY: http://secunia.com/advisories/24659/

CRITICAL: Extremely critical

NOTE: The vulnerability is currently being actively exploited.

IMPACT: System access

WHERE: >From remote

DESCRIPTION: A vulnerability has been reported in Microsoft Windows, which can be exploited by malicious people to compromise a user's system.

The vulnerability is caused due to an unspecified error in the handling of animated cursors and can e.g. be exploited by tricking a user into visiting a malicious website using Internet Explorer or opening a malicious e-mail message. Successful exploitation allows execution of arbitrary code.

OPERATING SYSTEM:
 Read More...
 

 

mod_perl *path_info* Denial of Service Vulnerability More about Read More...

Posted on Thursday, March 29, 2007 @ 23:46:22 CDT in Security
by Raven

SECUNIA ADVISORY ID: SA24678

VERIFY ADVISORY: http://secunia.com/advisories/24678/

CRITICAL: Moderately critical

IMPACT: DoS

WHERE: >From remote

SOFTWARE:
mod_perl 2.x - http://secunia.com/product/2870/
mod_perl 1.x - http://secunia.com/product/5960/

DESCRIPTION: A vulnerability has been reported in mod_perl, which potentially can be exploited by malicious people to cause a DoS (Denial of Service).

 Read More...
 

 

War FTP Daemon Unspecified Buffer Overflow Vulnerability More about Read More...

Posted on Wednesday, March 14, 2007 @ 11:53:23 CDT in Security
by Raven

SECUNIA ADVISORY ID: SA24494

VERIFY ADVISORY: http://secunia.com/advisories/24494/

CRITICAL: Highly critical

IMPACT: DoS, System access

WHERE: >From remote

SOFTWARE: War FTP Daemon 1.6x - http://secunia.com/product/1998/

DESCRIPTION: Immunity has reported a vulnerability in WarFTP Daemon, which potentially can be exploited by malicious people to compromise a vulnerable system.
 Read More...
 

 

MySQL Commander *home* File Inclusion Vulnerability More about Read More...

Posted on Wednesday, March 14, 2007 @ 07:05:44 CDT in Security
by Raven

SECUNIA ADVISORY ID: SA24500

VERIFY ADVISORY: http://secunia.com/advisories/24500/

CRITICAL: Highly critical

IMPACT: System access

WHERE: >From remote

SOFTWARE: MySQL Commander 2.x - http://secunia.com/product/13647/

DESCRIPTION: M.Hasran Addahroni has discovered a vulnerability in MySQL Commander, which can be exploited by malicious people to compromise a vulnerable system.
 Read More...
 



Page 48 of 102 (608 total stories) [ << | < | 43 | 44 | 45 | 46 | 47 | 48 | 49 | 50 | 51 | 52 | 53 | > | >> ]  

News ©

Site Info

Last SeenLast Seen
  • vashd1
  • neralex
Server TrafficServer Traffic
  • Total: 513,672,623
  • Today: 7,812
Server InfoServer Info
  • Apr 27, 2025
  • 02:35 am CDT