Posted on Friday, March 28, 2008 @ 00:38:02 CDT in Internet by Raven
kenetix writes: FileFindz.com is a service that allows you to search for almost any file type and download them using various search engines such as Google, Yahoo, and Live.com. Check it out here at:
www.filefindz.com
|
Posted on Thursday, March 27, 2008 @ 03:21:42 CDT in Community by Raven
WIZ writes:
Friends of TorrentSpy,
We have decided on our own, not due to any court order or agreement, to bring the Torrentspy.com search engine to an end and thus we permanently closed down worldwide on March 24, 2008.
The legal climate in the USA for copyright, privacy of search requests, and links to torrent files in search results is simply too hostile. We spent the last two years, and hundreds of thousands of dollars, defending the rights of our users and ourselves.
Ultimately the Court demanded actions that in our view were inconsistent with our privacy policy, traditional court rules, and International law; therefore, we now feel compelled to provide the ultimate method of privacy protection for our users - permanent shutdown. It was a wild ride,
The TorrentSpy Team
Check it out for yourselves..Http://torrentspy.com
|
Posted on Wednesday, March 26, 2008 @ 23:06:57 CDT in Security by Raven
SECUNIA ADVISORY ID: SA29509
VERIFY ADVISORY: http://secunia.com/advisories/29509/
CRITICAL: Moderately critical
IMPACT: Security Bypass, DoS, System access
SOFTWARE: PECL Alternative PHP Cache (APC) Extension 3.x - http://secunia.com/product/18046/
SOLUTION: Update to version 3.0.17. - http://pecl.php.net/package/APC/3.0.17
DESCRIPTION: Daniel Papasian has reported a vulnerability in the PECL Alternative PHP Cache (APC) extension, which can be exploited by malicious users to bypass certain security restrictions and potentially by malicious people to compromise a vulnerable system. The vulnerability is reported in version 3.0.16. Other versions may also be affected. Read More...
|
Posted on Wednesday, March 26, 2008 @ 22:58:43 CDT in Security by Raven
SECUNIA ADVISORY ID: SA29548
VERIFY ADVISORY: http://secunia.com/advisories/29548/
CRITICAL: Highly critical
IMPACT: Security Bypass, Cross Site Scripting, System access
SOFTWARE: Mozilla Thunderbird 2.x: http://secunia.com/product/14070/
SOLUTION: The vulnerabilities will be fixed in the upcoming 2.0.0.13 version.
DESCRIPTION: Some vulnerabilities have been reported in Mozilla Thunderbird, which can be exploited by malicious people to bypass certain security restrictions, conduct cross-site scripting attacks, or potentially compromise a user's system. For more information: SA29526. The vulnerabilities are reported in versions prior to 2.0.0.13. Read More...
|
Posted on Wednesday, March 26, 2008 @ 22:53:35 CDT in Security by Raven
SECUNIA ADVISORY ID: SA29526
VERIFY ADVISORY: http://secunia.com/advisories/29526/
CRITICAL: Highly critical
IMPACT: Security Bypass, Cross Site Scripting, Spoofing, Exposure of sensitive information, System access
SOFTWARE: Mozilla Firefox 2.0.x: http://secunia.com/product/12434/
SOLUTION: Update to version 2.0.0.13.
DESCRIPTION: Some vulnerabilities and weaknesses have been reported in Mozilla Firefox, which can be exploited by malicious people to bypass certain security restrictions, disclose potentially sensitive information, conduct cross-site scripting and phishing attacks, and potentially compromise a user's system. The vulnerabilities are reported in versions prior to 2.0.0.13.
Read More...
|
Posted on Tuesday, March 25, 2008 @ 16:48:33 CDT in Security by Raven
SECUNIA ADVISORY ID: SA29487
VERIFY ADVISORY: http://secunia.com/advisories/29487/
CRITICAL: Moderately critical
IMPACT: Exposure of system information, Exposure of sensitive information
SOFTWARE: eXtreme Styles 2.x (module for phpBB) http://secunia.com/product/18020/
DESCRIPTION: bd0rk has discovered a vulnerability in the eXtreme Styles module (XS-Mod) for phpBB, which can be exploited by malicious people to disclose sensitive information. Successful exploitation requires that "register_globals" is enabled. The vulnerability is confirmed in version 2.4.0 and reported in version 2.3.1. Other versions may also be affected.
Read More...
|