Ravens PHP Scripts: Security



Search on This Topic:   
[ Go to Home | Select a New Topic ]
 

 
"This is an absolutely vital security patch which all store owners must apply!"

Vital Security Patch Details
 

 

NukeSentinel[tm] Patch Re-Released For Version 2.4.2 SQL Injection More about

Posted on Sunday, December 18, 2005 @ 00:20:55 CST in Security
by Raven

I have re-released a patch (v2.4.2pl2) for the SQL injection exploit that was recently discovered by Feloci and reported by Technocrat. Even though it is powerless against RavenNuke76, I recommend that everyone who uses NukeSentinel(tm) download and apply this patch ASAP!

Read about the issue and fix NukeSentinel(tm) Patch Level 2.4.2pl2. Download NukeSentinel(tm) Patch Level 2.4.2pl2
 

 

NukeSentinel[tm] Patch Released For Version 2.4.2 SQL Injection More about

Posted on Friday, December 16, 2005 @ 00:28:11 CST in Security
by Raven

I have released a patch (v2.4.2pl1) for the SQL injection exploit that was recently discovered by Feloci and reported by Technocrat. Even though it is powerless against RavenNuke76, I recommend that everyone who uses NukeSentinel(tm) download and apply this patch ASAP!

Download NukeSentinel(tm) Patch Level 2.4.2pl1
 

 

NukeSentinel[tm] Security Alert And Fix More about

Posted on Tuesday, December 13, 2005 @ 23:39:15 CST in Security
by Raven

There have been a series of recent attacks on sites that are not patched current with Chatserv's 3.x series. This specially crafted url was also able to bypass the filters in NukeSentinel(tm). There's more to the story, but read the thread Recent UNION exploit with unpatched sites and NukeSentinel for the fix. The download will be corrected shortly.

Thanks to Technocrat for first making me aware of this and for also being persistent to get a good fix!
 

 

Attack code released for IE hole More about

Posted on Tuesday, November 22, 2005 @ 06:55:02 CST in Security
by Raven

"Exploit code for a new flaw in Internet Explorer could put systems at risk of remote attack, security experts warned Monday."

The exploit code, made public Monday, aims to take advantage of the "extremely critical" vulnerabilities in IE 5.5 and IE 6 running on XP Service Pack 2 (SP2), and IE 6 running on Windows 2000 SP4, security researcher Secunia said in advisory.

Once a PC user is tricked into visiting a malicious Web site, the exploit can be triggered automatically, without the user doing anything.

"An attacker could use the exploit to run any code they want to on a person's system," said Thomas Kristensen, Secunia's chief technology officer. "It could be they want to launch some really nasty code on a user's system."

The flaw lies in a Javascript component of IE used for loading Web pages onto a computer, according to an advisory from SANS Internet Storm Center.

Microsoft has not released a patch for the hole exploited by the code. People can attempt to work around the problem by either shutting off Javascript or using another type of browser, security companies advised.

Security researchers said the IE vulnerability has been known for the past six months, ... Read the rest of the story



 

 

phpMyAdmin HTTP Response Splitting Vulnerability More about

Posted on Wednesday, November 16, 2005 @ 09:24:13 CST in Security
by Raven

qfk writes:  
TITLE: phpMyAdmin HTTP Response Splitting Vulnerability
SECUNIA ADVISORY ID: SA17578
VERIFY ADVISORY: http://secunia.com/advisories/17578/
CRITICAL: Less critical
IMPACT: Exposure of system information, Cross Site Scripting
WHERE: >From remote
SOFTWARE: phpMyAdmin 2.x
http://secunia.com/product/1720/
phpMyAdmin 1.x
http://secunia.com/product/1719/

DESCRIPTION: Toni Koivunen has reported a vulnerability in phpMyAdmin, which can be exploited by malicious people to conduct HTTP response splitting attacks. Some input passed to "libraries/header_http.inc.php" isn't properly sanitised before being returned to the user. This can be exploited to include arbitrary HTTP headers in a response sent to the user. Successful exploitation requires that "register_globals" is enabled. It is also possible to disclose the full path to certain scripts by accessing them directly. The vulnerability has been reported in versions prior to 2.6.4-pl4 and in version 2.7.0-beta1.

SOLUTION: Update to version 2.6.4-pl4.
http://www.phpmyadmin.net/home_page/downloads.php
PROVIDED AND/OR DISCOVERED BY: Toni Koivunen
ORIGINAL ADVISORY: Toni Koivunen: http://www.fitsec.com/advisories/FS-05-02.txt
phpMyAdmin: http://www.phpmyadmin.net/home_page/security.php?issue=PMASA-2005-6
 



Page 85 of 102 (608 total stories) [ << | < | 80 | 81 | 82 | 83 | 84 | 85 | 86 | 87 | 88 | 89 | 90 | > | >> ]  

News ©

Site Info

Last SeenLast Seen
  • vashd1
  • neralex
Server TrafficServer Traffic
  • Total: 513,957,507
  • Today: 76,943
Server InfoServer Info
  • Apr 29, 2025
  • 03:54 pm CDT