Again I ask for your help More about

Posted on Tuesday, January 01, 2008 @ 23:30:01 CST in Community
by Raven

nextgen writes:  
I am still looking for community members to help with a project I am currently working on. I am looking for coders, themers, Beta Testers and moderators. Anyone who is interested may visit the main site at http://www.ngnuke.com, as well as the development site at http://www.ngnuke.com/styles/index.php.

Registration is free and it would be a terrific assett to us and would be a chance for you to make an impact in the way the cms turns out. Thanks for reading and I hope to see you on the site.
 

 

NukeSentinel™ 2.5.15 Released More about

Posted on Sunday, December 30, 2007 @ 23:42:02 CST in NukeSentinel (tm)
by BobMarion

2.5.15 CHANGES (2007-12-28):
· Includes IP2Country 2007-12-28 updated imports.
· Not in upgrade package.
· Improved logic in includes file.
· Improved socket testing. (Thanks to Raven)
· Admin GUI updates.
· TegoNuke Mailer support added (Thanks to montego)
 

 
kguske writes:  
nukeSEO.com released nukePIE™, a replacement for the standard PHPNuke block feed reader.

With nukePIE™, RavenNuke, BonusNuke, DadaNuke, NukeEvolution, Nuke Platinum and other PHP-Nuke distributions can:

* Correctly display RSS 2.0, ATOM 1.0, or any properly-formed feed in Nuke blocks
* Display feed item descriptions as either full-HTML tool tips or as title tags for the link, which helps visitors and search engines

Links: nukePIE demo. download (GPL, free membership required). FAQs.
 Read More...
 

 

Mambo Multiple Vulnerabilities More about Read More...

Posted on Thursday, December 27, 2007 @ 15:01:12 CST in Mambo Security Alert
by Raven

SECUNIA ADVISORY ID: SA28251

VERIFY ADVISORY: http://secunia.com/advisories/28251/

CRITICAL: Highly critical

IMPACT: Unknown, Cross Site Scripting, System access

SOFTWARE: Mambo 4.x - http://secunia.com/product/872/

DESCRIPTION: Some vulnerabilities have been reported in Mambo, one with an unknown impact and others, which can be exploited by malicious people to conduct cross-site scripting attacks or to compromise a vulnerable system. The vulnerabilities are reported in version 4.6.2. Prior versions may also be affected.
 Read More...
 

 

Gallery Multiple Vulnerabilities More about Read More...

Posted on Wednesday, December 26, 2007 @ 18:29:02 CST in Security
by Raven

SECUNIA ADVISORY ID: SA28163

VERIFY ADVISORY: http://secunia.com/advisories/28163/

CRITICAL: Highly critical

IMPACT: Security Bypass, Cross Site Scripting, Exposure of sensitive information, System access

SOFTWARE: Gallery 2.x - http://secunia.com/product/5879/

DESCRIPTION: Some vulnerabilities and a weakness have been reported in Gallery, where some have unspecified impacts and others can be exploited by malicious users or malicious people to disclose sensitive information, conduct cross-site scripting attacks, bypass certain security restrictions, and potentially compromise a vulnerable system. The vulnerabilities were reported in versions prior to 2.2.4. Note: In version 2.2.4, the Core module contains enhanced information disclosure protection and includes a fix for an unspecified redirection weakness.
 Read More...
 

 

Discuss all your ideas and share your knoweldge! More about

Posted on Wednesday, December 26, 2007 @ 15:38:00 CST in Announcements
by Raven

nukeevangelist writes:  
Discuss all your ideas and share your knoweldge with the authors.

hecargo.net ++ 20 blocks
jmagar.com myHeadlines module
Simple Shop version 1.3 [demo]
sergids.com music module
pancacke.org MP3 streaming-module
 



Page 149 of 659 (3950 total stories) [ << | < | 144 | 145 | 146 | 147 | 148 | 149 | 150 | 151 | 152 | 153 | 154 | > | >> ]  

News ©

Site Info

Last SeenLast Seen
  • vashd1
  • neralex
Server TrafficServer Traffic
  • Total: 513,872,720
  • Today: 107,013
Server InfoServer Info
  • Apr 28, 2025
  • 09:08 pm CDT