Ravens PHP Scripts: Security



Search on This Topic:   
[ Go to Home | Select a New Topic ]
 

 

Link CMS Cross-Site Scripting and SQL Injection More about Read More...

Posted on Wednesday, December 06, 2006 @ 23:39:50 CST in Security
by Raven

SECUNIA ADVISORY ID: SA23107

VERIFY ADVISORY: http://secunia.com/advisories/23107/

CRITICAL: Moderately critical

IMPACT: Cross Site Scripting, Manipulation of data

SOFTWARE: LINK Content Management Server - http://secunia.com/product/12832/

DESCRIPTION: Ivan Markovic has reported some vulnerabilities in Link CMS, which can be exploited by malicious people to conduct SQL injection and cross-site scripting attacks.
 Read More...
 

 

DenyHosts *hosts.deny* Denial of Service More about Read More...

Posted on Wednesday, December 06, 2006 @ 23:35:51 CST in Security
by Raven

SECUNIA ADVISORY ID: SA23236

VERIFY ADVISORY: http://secunia.com/advisories/23236/

CRITICAL: Moderately critical

IMPACT: DoS

SOFTWARE: DenyHosts 2.x - http://secunia.com/product/12830/

DESCRIPTION: Tavis Ormandy has discovered a vulnerability in DenyHosts, which can be exploited by malicious people to cause a DoS (Denial of Service).
The vulnerability is caused due to an error in the parsing of log files before adding an entry in /etc/hosts.deny. Read More...
 

 

Microsoft Word Unspecified Memory Corruption Vulnerability More about Read More...

Posted on Wednesday, December 06, 2006 @ 05:54:16 CST in Security
by Raven

SECUNIA ADVISORY ID: SA23232

VERIFY ADVISORY: http://secunia.com/advisories/23232/

CRITICAL: Extremely critical

IMPACT: System access

DESCRIPTION: A vulnerability has been reported in Microsoft Word, which potentially can be exploited by malicious people to compromise a user's system. The vulnerability is caused due to an unspecified error in the handling of Word documents can be exploited to cause a memory corruption. Successful exploitation may allow execution of arbitrary code.

SOFTWARE:
 Read More...
 

 

Quick.Cart *config[db_type]* Local File Inclusion Vulnerabilities More about Read More...

Posted on Tuesday, December 05, 2006 @ 10:48:48 CST in Security
by Raven

SECUNIA ADVISORY ID: SA23168

VERIFY ADVISORY: http://secunia.com/advisories/23168/

CRITICAL: Moderately critical

IMPACT: Exposure of sensitive information

SOFTWARE: Quick.Cart 2.x - http://secunia.com/product/12801/

DESCRIPTION: r0ut3r has reported some vulnerabilities in Quick.Cart, which can be exploited by malicious people to disclose sensitive information. Successful exploitation requires that "register_globals" is enabled and "magic_quotes_gpc" is disabled. The vulnerabilities are reported in version 2.0. Other versions may also be affected. Input passed to the "config[db_type]" parameter in multiple files is not properly verified before being used to include files. This can be exploited to include arbitrary files from local resources via directory traversal attacks.

Examples:
 Read More...
 

 

xine-lib libreal and libmms Buffer Overflow Vulnerabilities More about Read More...

Posted on Tuesday, December 05, 2006 @ 10:43:32 CST in Security
by Raven

SECUNIA ADVISORY ID: SA23218

VERIFY ADVISORY: http://secunia.com/advisories/23218/

CRITICAL: Highly critical

IMPACT: DoS, System access

SOFTWARE: xine-lib 1.x - http://secunia.com/product/3410/

DESCRIPTION: Some vulnerabilities have been reported in xine-lib, which potentially can be exploited by malicious people to compromise a user's system. Successful exploitation may allow the execution of arbitrary code. The vulnerabilities are reported in versions prior to 1.1.3.
 Read More...
 

 

mxBB Portal mx_tinies Module *module_root_path* File Inclusion More about Read More...

Posted on Monday, December 04, 2006 @ 10:45:33 CST in Security
by Raven

SECUNIA ADVISORY ID: SA23206

VERIFY ADVISORY: http://secunia.com/advisories/23206/

CRITICAL: Highly critical

IMPACT: System access

SOFTWARE: mx_tinies (module for mxBB) 1.x - http://secunia.com/product/12794/

DESCRIPTION: bd0rk has reported a vulnerability in the mx_tinies module for MxBB, which can be exploited by malicious people to compromise a vulnerable system. Input passed to the "module_root_path" parameter in includes/common.php is not properly verified before being used to include files. This can be exploited to execute arbitrary PHP code by including files from local or external resources. Successful exploitation requires that "register_globals" is enabled. The vulnerability is reported in version 1.3.0. Other versions may also be affected.
 Read More...
 



Page 65 of 102 (608 total stories) [ << | < | 60 | 61 | 62 | 63 | 64 | 65 | 66 | 67 | 68 | 69 | 70 | > | >> ]  

News ©

Site Info

Last SeenLast Seen
  • vashd1
  • neralex
Server TrafficServer Traffic
  • Total: 513,761,203
  • Today: 96,392
Server InfoServer Info
  • Apr 27, 2025
  • 10:22 pm CDT