Xoops Tiny Content Module *spaw_root* File Inclusion More about Read More...

Posted on Wednesday, June 13, 2007 @ 18:57:29 CDT in Security
by Raven

SECUNIA ADVISORY ID: SA25652

VERIFY ADVISORY: http://secunia.com/advisories/25652/

CRITICAL: Highly critical

IMPACT: Exposure of system information, Exposure of sensitive information, System access

WHERE: >From remote

SOFTWARE: Tiny Content 1.x (module for Xoops) - http://secunia.com/product/14527/

DESCRIPTION: Sp[L]o1T has discovered a vulnerability in the Tiny Content module for Xoops, which can be exploited by malicious people to disclose sensitive information or to compromise a vulnerable system.
 Read More...
 

 

HP Help and Support Center Unspecified Vulnerability More about Read More...

Posted on Wednesday, June 13, 2007 @ 18:51:21 CDT in Security
by Raven

SECUNIA ADVISORY ID: SA25624

VERIFY ADVISORY: http://secunia.com/advisories/25624/

CRITICAL: Highly critical

IMPACT: System access

WHERE: >From remote

SOFTWARE: HP Help and Support Center 4.x - http://secunia.com/product/14525/

DESCRIPTION: HP has acknowledged a vulnerability in Help and Support Center, which can be exploited by malicious people to compromise a user's system.
 Read More...
 

 

YaBB CRLF Injection Privilege Escalation Vulnerability More about Read More...

Posted on Wednesday, June 13, 2007 @ 18:46:58 CDT in Security
by Raven

SECUNIA ADVISORY ID: SA25656

VERIFY ADVISORY: http://secunia.com/advisories/25656/

CRITICAL: Highly critical

IMPACT: Privilege escalation

WHERE: >From remote

SOFTWARE: YaBB 2.x - http://secunia.com/product/6070/

DESCRIPTION: A vulnerability has been reported in YaBB, which can be exploited by malicious users and malicious people to gain escalated privileges.
 Read More...
 

 

Xoops Horoscope Module *xoopsConfig[root_path]* File Inclusion More about Read More...

Posted on Wednesday, June 13, 2007 @ 18:43:35 CDT in Security
by Raven

SECUNIA ADVISORY ID: SA25651

VERIFY ADVISORY: http://secunia.com/advisories/25651/

CRITICAL: Highly critical

IMPACT: Exposure of system information, Exposure of sensitive information, System access

WHERE: >From remote

SOFTWARE: Horoscope 2.x (module for Xoops) - http://secunia.com/product/14526/

DESCRIPTION: BeyazKurt has discovered a vulnerability in the Horoscope module for Xoops, which can be exploited by malicious people to disclose sensitive information or to compromise a vulnerable system.
 Read More...
 

 

OpenOffice RTF File Parsing Buffer Overflow Vulnerability More about

Posted on Wednesday, June 13, 2007 @ 18:39:54 CDT in Security
by Raven

SECUNIA ADVISORY ID: SA25648

VERIFY ADVISORY: http://secunia.com/advisories/25648/

CRITICAL: Highly critical

IMPACT: System access

WHERE: >From remote

SOFTWARE:
OpenOffice 1.1.x - http://secunia.com/product/302/
OpenOffice.org 2.x - http://secunia.com/product/6157/
OpenOffice 1.0.x - http://secunia.com/product/303/

DESCRIPTION: A vulnerability has been reported in OpenOffice, which can potentially be exploited by malicious people to compromise a user's system. The vulnerability is caused due to an error in the parsing of RTF files and can be exploited to cause a heap based buffer overflow via a specially crafted RTF file. Successful exploitation may allow execution of arbitrary code.

SOLUTION: Do not open untrusted RTF files.

PROVIDED AND/OR DISCOVERED BY: Reported in a Debian advisory crediting John Heasman.

ORIGINAL ADVISORY: http://www.us.debian.org/security/2007/dsa-1307
 

 
According to Web Hosting Talk

A recent survey by Google's Anti-Malware Team seems to confirm what many of us have believed in the past: Microsoft's IIS (Internet Information Services) servers are more vulnerable to host malware than Apache servers. The statistics come from the recently launched Google Online Security Blog whereby Google's researchers looked at 70,000 domains that were either distributing malware or hosting attack code.

Google however does make it clear in its blog that just because IIS is serving malware doesn't mean that it has been compromised; it might be possible that most 'warez' related Web sites uses IIS. This study has caused many heated discussions amongst security advocates and bloggers who claim that this might be an emerging type of gamesmanship from Google to promote Apache over another product made by its rival.
 



Page 186 of 659 (3950 total stories) [ << | < | 181 | 182 | 183 | 184 | 185 | 186 | 187 | 188 | 189 | 190 | 191 | > | >> ]  

News ©

Site Info

Last SeenLast Seen
  • vashd1
  • neralex
Server TrafficServer Traffic
  • Total: 514,014,733
  • Today: 26,620
Server InfoServer Info
  • Apr 30, 2025
  • 08:06 am CDT