FileFindz.com - Find and download files with Google! More about

Posted on Friday, March 28, 2008 @ 00:38:02 CDT in Internet
by Raven

kenetix writes:  
FileFindz.com is a service that allows you to search for almost any file type and download them using various search engines such as Google, Yahoo, and Live.com. Check it out here at:

www.filefindz.com
 

 

Another Torrent Engine Shut Down More about

Posted on Thursday, March 27, 2008 @ 03:21:42 CDT in Community
by Raven

WIZ writes:  


Friends of TorrentSpy,

We have decided on our own, not due to any court order or agreement, to bring the Torrentspy.com search engine to an end and thus we permanently closed down worldwide on March 24, 2008.

The legal climate in the USA for copyright, privacy of search requests, and links to torrent files in search results is simply too hostile. We spent the last two years, and hundreds of thousands of dollars, defending the rights of our users and ourselves.

Ultimately the Court demanded actions that in our view were inconsistent with our privacy policy, traditional court rules, and International law; therefore, we now feel compelled to provide the ultimate method of privacy protection for our users - permanent shutdown. It was a wild ride,

The TorrentSpy Team

Check it out for yourselves..Http://torrentspy.com
 

 
SECUNIA ADVISORY ID: SA29509

VERIFY ADVISORY: http://secunia.com/advisories/29509/

CRITICAL: Moderately critical

IMPACT: Security Bypass, DoS, System access

SOFTWARE: PECL Alternative PHP Cache (APC) Extension 3.x - http://secunia.com/product/18046/

SOLUTION: Update to version 3.0.17. - http://pecl.php.net/package/APC/3.0.17

DESCRIPTION: Daniel Papasian has reported a vulnerability in the PECL Alternative PHP Cache (APC) extension, which can be exploited by malicious users to bypass certain security restrictions and potentially by malicious people to compromise a vulnerable system. The vulnerability is reported in version 3.0.16. Other versions may also be affected.
 Read More...
 

 

Mozilla Thunderbird Multiple Vulnerabilities More about Read More...

Posted on Wednesday, March 26, 2008 @ 22:58:43 CDT in Security
by Raven

SECUNIA ADVISORY ID: SA29548

VERIFY ADVISORY: http://secunia.com/advisories/29548/

CRITICAL: Highly critical

IMPACT: Security Bypass, Cross Site Scripting, System access

SOFTWARE: Mozilla Thunderbird 2.x: http://secunia.com/product/14070/

SOLUTION: The vulnerabilities will be fixed in the upcoming 2.0.0.13 version.

DESCRIPTION: Some vulnerabilities have been reported in Mozilla Thunderbird, which can be exploited by malicious people to bypass certain security restrictions, conduct cross-site scripting attacks, or potentially compromise a user's system. For more information: SA29526. The vulnerabilities are reported in versions prior to 2.0.0.13.
 Read More...
 

 

Mozilla Firefox Multiple Vulnerabilities More about Read More...

Posted on Wednesday, March 26, 2008 @ 22:53:35 CDT in Security
by Raven

SECUNIA ADVISORY ID: SA29526

VERIFY ADVISORY: http://secunia.com/advisories/29526/

CRITICAL: Highly critical

IMPACT: Security Bypass, Cross Site Scripting, Spoofing, Exposure of sensitive information, System access

SOFTWARE: Mozilla Firefox 2.0.x: http://secunia.com/product/12434/

SOLUTION: Update to version 2.0.0.13.

DESCRIPTION: Some vulnerabilities and weaknesses have been reported in Mozilla Firefox, which can be exploited by malicious people to bypass certain security restrictions, disclose potentially sensitive information, conduct cross-site scripting and phishing attacks, and potentially compromise a user's system. The vulnerabilities are reported in versions prior to 2.0.0.13.
 Read More...
 

 

phpBB eXtreme Styles Module *phpEx* Local File Inclusion More about Read More...

Posted on Tuesday, March 25, 2008 @ 16:48:33 CDT in Security
by Raven

SECUNIA ADVISORY ID: SA29487

VERIFY ADVISORY: http://secunia.com/advisories/29487/

CRITICAL: Moderately critical

IMPACT: Exposure of system information, Exposure of sensitive information

SOFTWARE: eXtreme Styles 2.x (module for phpBB) http://secunia.com/product/18020/

DESCRIPTION: bd0rk has discovered a vulnerability in the eXtreme Styles module (XS-Mod) for phpBB, which can be exploited by malicious people to disclose sensitive information. Successful exploitation requires that "register_globals" is enabled. The vulnerability is confirmed in version 2.4.0 and reported in version 2.3.1. Other versions may also be affected.
 Read More...
 



Page 132 of 659 (3950 total stories) [ << | < | 127 | 128 | 129 | 130 | 131 | 132 | 133 | 134 | 135 | 136 | 137 | > | >> ]  

News ©

Site Info

Last SeenLast Seen
  • vashd1
  • neralex
Server TrafficServer Traffic
  • Total: 513,683,537
  • Today: 18,726
Server InfoServer Info
  • Apr 27, 2025
  • 06:36 am CDT