PHPFreeChat and Coppermine integration with SMF-Nuke More about

Posted on Thursday, February 14, 2008 @ 21:16:58 CST in Announcements
by Raven

spottedhog writes:  
PHPFreeChat and Coppermine Photo Gallery integration instructions are now available for SMF-Nuke. These are not PHP-Nuke or SMF modules. The integration is "hooked" into SMF-Nuke using SMF member system.

SMF-Nuke is an intregration of PHP Nuke and SMF (SimpleMachinesForums). The PHP Nuke part is based on version 7.6 patched, but way beyond, with XHTML Strict html code and all MySQL queries "freed". SMF-Nuke uses only the SMF member system and admin authorization.

Link: --> SMF-Nuke
 

 

RavenNuke™ v2.20.00 SQL Fix More about

Posted on Thursday, February 14, 2008 @ 11:04:34 CST in RavenNuke
by Raven

If you downloaded and did a fresh install of RavenNuke™ prior to 2/11/2008 11:00 CST then you need to download and run the Fix Users Temp Table script to ensure that your table is correct. The script will only modify the table if it is not correct. No data will be lost.

See Fix Registration Error for details.
 

 

TegoNuke(tm) Approve Membership Lite 1.1.0 More about

Posted on Thursday, February 14, 2008 @ 10:55:49 CST in Code Hacks
by Raven

montego writes:  
I have updated the Approve Membership Lite hack for use with the latest release of RavenNuke(tm) 2.2.0 (aka: 2.20.00). Do remember that this version is ONLY for the 2.2.0 release of RavenNuke(tm) and is NOT interchangeable with other nuke versions/forks.

This hack provides a way to force approval of new user registrations (as well as can even auto-approve). It takes the latest RavenNuke(tm) 2.2.0 Your Account module and the Approve Membership Module version 6.1.6 from Ulsoft and provides a simplified "Lite" version that only has the user approval piece (i.e., no "Custom Fields").

Download it now or just check out the detailed features list and change log.
 

 

Microsoft WebDAV Mini-Redirector Code Execution Vulnerability More about Read More...

Posted on Tuesday, February 12, 2008 @ 16:34:19 CST in Security
by Raven

SECUNIA ADVISORY ID: SA28894

VERIFY ADVISORY: http://secunia.com/advisories/28894/

CRITICAL: Highly critical

IMPACT: System access

OPERATING SYSTEM:
Microsoft Windows XP Home Edition http://secunia.com/product/16/
Microsoft Windows XP Professional http://secunia.com/product/22/
Microsoft Windows Server 2003 Datacenter Edition http://secunia.com/product/1175/
Microsoft Windows Server 2003 Enterprise Edition http://secunia.com/product/1174/
Microsoft Windows Server 2003 Standard Edition http://secunia.com/product/1173/
Microsoft Windows Server 2003 Web Edition http://secunia.com/product/1176/
Microsoft Windows Storage Server 2003 http://secunia.com/product/12399/
Microsoft Windows Vista http://secunia.com/product/13223/

DESCRIPTION: A vulnerability has been reported in Microsoft Windows, which can be exploited by malicious people to compromise a vulnerable system. The vulnerability is caused due to an error in the WebDAV Mini-Redirector (a.k.a Web Client service) when handling long pathnames in WebDAV responses. This can be exploited to cause a heap-based buffer overflow via a specially crafted WebDAV response. Successful exploitation allows execution of arbitrary code.
 Read More...
 

 

Microsoft Works File Converter File Parsing Vulnerabilities More about Read More...

Posted on Tuesday, February 12, 2008 @ 16:28:21 CST in Security
by Raven

SECUNIA ADVISORY ID: SA28904

VERIFY ADVISORY: http://secunia.com/advisories/28904/

CRITICAL: Highly critical

IMPACT: System access

SOFTWARE:
Microsoft Office 2003 Professional Edition http://secunia.com/product/2276/
Microsoft Office 2003 Small Business Edition http://secunia.com/product/2277/
Microsoft Office 2003 Standard Edition http://secunia.com/product/2275/
Microsoft Office 2003 Student and Teacher Edition http://secunia.com/product/2278/
Microsoft Works 8.x http://secunia.com/product/7215/
Microsoft Works Suite 2005 http://secunia.com/product/8711/

DESCRIPTION: Some vulnerabilities have been reported in Microsoft Office and Microsoft Works, which can be exploited by malicious people to compromise a user's system. Successful exploitation of the vulnerabilities may allow execution of arbitrary code.
 Read More...
 

 

Microsoft Internet Information Services Code Execution Vulnerability More about Read More...

Posted on Tuesday, February 12, 2008 @ 16:22:52 CST in Security
by Raven

SECUNIA ADVISORY ID: SA28893

VERIFY ADVISORY: http://secunia.com/advisories/28893/

CRITICAL: Highly critical

IMPACT: DoS, System access

SOFTWARE:
Microsoft Internet Information Services (IIS) 6 http://secunia.com/product/1438/
Microsoft Internet Information Services (IIS) 5.x http://secunia.com/product/39/

DESCRIPTION: A vulnerability has been reported in Microsoft Internet Information Services (IIS), which can be exploited by malicious people to compromise a vulnerable system. The vulnerability is caused due to an unspecified error within the processing of input to ASP web pages. This can be exploited to execute arbitrary code with the privileges of the Worker Process Identity (WPI) by passing specially crafted input to an ASP page.
 Read More...
 



Page 140 of 659 (3950 total stories) [ << | < | 135 | 136 | 137 | 138 | 139 | 140 | 141 | 142 | 143 | 144 | 145 | > | >> ]  

News ©

Site Info

Last SeenLast Seen
  • vashd1
  • neralex
Server TrafficServer Traffic
  • Total: 513,745,842
  • Today: 81,031
Server InfoServer Info
  • Apr 27, 2025
  • 04:29 pm CDT