Jump to content

Recommended Posts

heres my latest project, with focus on simplicity, and usability.

I made it all with notepad++, and gimp for my patterns.

all ideas are welcome, so if you have anything positive/negative feel free to post

hope you like it, and when i get to a point of saying its "good", i hope to publish full source here on phpfreaks

 

thegateway.ath.cx/projects/space/index.php

thanks,

fragman

Link to comment
https://forums.phpfreaks.com/topic/116920-a-social-networking-site/
Share on other sites

heres my latest project, with focus on simplicity, and usability.

I made it all with notepad++, and gimp for my patterns.

all ideas are welcome, so if you have anything positive/negative feel free to post

hope you like it, and when i get to a point of saying its "good", i hope to publish full source here on phpfreaks

 

thegateway.ath.cx/projects/space/index.php

thanks,

fragman

 

i can't load it.

:lol @ home networking ;D

 

Apache Mod_SSL SSL_Util_UUEncode_Binary Stack Buffer Overflow Vulnerability

Vulnerability description

This alert was generated using only banner information. It may be a false positive.

 

A stack-based buffer overflow has been reported in the Apache mod_ssl module. This issue would most likely result in a denial of service if triggered, but could theoretically allow for execution of arbitrary code. The issue is not believed to be exploitable to execute arbitrary code on x86 architectures, though this may not be the case with other architectures.

 

Affected mod_ssl versions (up to 2.8.17).

 

This vulnerability affects mod_ssl.

The impact of this vulnerability

Denial of service and/or possible arbitrary code execution.

 

Attack details

Current version is mod_ssl/2.2.8 OpenSSL/0.9.8e PHP/5.2.5 mod_apreq2-20051231/2.6.0 mod_perl/2.0.2 Perl/v5.10.0 PHP/5.2.5

 

How to fix this vulnerability

Upgrade mod_ssl to the latest version.

 

 

Apache Mod_SSL Log Function Format String Vulnerability

Vulnerability description

This alert was generated using only banner information. It may be a false positive.

 

A format string vulnerability has been found in mod_ssl versions older than 2.8.19. Successful exploitation of this issue will most likely allow an attacker to execute arbitrary code on the affected computer.

 

Affected mod_ssl versions (up to 2.8.18).

 

This vulnerability affects mod_ssl.

The impact of this vulnerability

Denial of service and/or possible arbitrary code execution.

 

Attack details

Current version is mod_ssl/2.2.8 OpenSSL/0.9.8e PHP/5.2.5 mod_apreq2-20051231/2.6.0 mod_perl/2.0.2 Perl/v5.10.0 PHP/5.2.5

 

How to fix this vulnerability

Upgrade mod_ssl to the latest version.

 

TRACE Method Enabled

Vulnerability description

HTTP TRACE method is enabled on this web server. In the presence of other cross-domain vulnerabilities in web browsers, sensitive header information could be read from any domains that support the HTTP TRACE method.

This vulnerability affects Web Server.

The impact of this vulnerability

Attackers may abuse HTTP TRACE functionality to gain access to information in HTTP headers such as cookies and authentication data.

How to fix this vulnerability

Disable TRACE Method on the web server.

 

×
×
  • Create New...

Important Information

We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.