Announcement

Collapse
No announcement yet.

shoutcast2 control panel fix for null nuke

Collapse
This topic is closed.
X
X
 
  • Filter
  • Time
  • Show
Clear All
new posts

  • shoutcast2 control panel fix for null nuke

    fixes installation of windows services for both sc_serv and sc_trans
    fixes sc_trans empty playlists
    fixes corrupt generation of sc_trans calandar.xml

    download http://nullnuke.netai.net/download.p...details&lid=25

    its for the latest version 1.3, you can get http://sourceforge.net/projects/nullnuke/

  • #3
    updated the download with http://nullnuke.netai.net/download.php?op=getit&lid=25

    fixes playlists and playlist paths
    cleans up administration panel and code abit
    adds some ajax to sideblock status
    now lists all stream for each server on the public radio page
    now uses endtime in calandar xml
    public radio page stream id schedule will now use minutes [not tested every show combination]

    Comment


    • #4
      final fix with everything should be working... download > http://nullnuke.netai.net/download.php?op=fileid&lid=25

      calandar is using duration again, creating a new calandar event is using end time 5:00am -> 6:00 is a hour, and not 1
      fixes calandar dj event archive show
      added max users to create local server configuration

      does other things not worth mentioning

      Comment


      • #5
        i try to find NULL NUKE CMS v2.2 to download i got the info

        =======================================================
        =======================================================
        =======================================================
        Title: NULL NUKE CMS v2.2 Multiple Vulnerabilities
        Advisory ID: ZSL-2014-5185
        Type: Local/Remote
        Impact: Spoofing, Exposure of System Information, Exposure of Sensitive Information, Manipulation of Data, Cross-Site Scripting, System Access
        Risk: (4/5)
        Release Date: 28.04.2014

        Summary
        NULL-8x3-NUKE is a fast, powerful and secure cross platform CMS for windows and Linux using base or full drive paths.

        Description
        NULL NUKE CMS suffers from multiple remote vulnerabilities including Stored/Reflected XSS, SQL Injection, Arbitrary File Upload, RCE, Arbitrary File Deletion, Arbitrary File Access using absolute path and/or traversal, Open Redirection, Parameter Traversal, and Cross-Site Request Forgery.

        Vendor
        nullwanton - http://sourceforge.net/projects/nullnuke/

        Affected Version
        2.2 and 2.1 rc3

        Tested On
        Apache/2.4.7 (Win32)
        PHP/5.5.6
        MySQL 5.6.14

        Vendor Status
        N/A

        PoC
        nullnuke_mv.txt
        Credits

        Vulnerability discovered by Gjoko Krstic - <[email protected]>
        =======================================================
        =======================================================
        =======================================================

        Please Update and fix the Multiple Vulnerabilities

        Thanks.
        Last edited by dimajahiz; 8 November 2014, 14:53. Reason: Multiple Vulnerabilities

        Comment

        Working...
        X