exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 26 - 31 of 31 RSS Feed

Files Date: 2012-07-10 to 2012-07-11

Secunia Security Advisory 49534
Posted Jul 10, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Charlie Eriksen has discovered multiple vulnerabilities in the WP Symposium plugin for WordPress, which can be exploited by malicious users and malicious people to conduct SQL injection attacks.

tags | advisory, vulnerability, sql injection
SHA-256 | 204965fbcfbd5c0ab62f3e975ebfc06b7eeaa212bda00429378d44eca7344bf0
Gentoo Linux Security Advisory 201207-01
Posted Jul 10, 2012
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory 201207-1 - A vulnerability has been found in sudo which may allow local users to gain escalated privileges. Versions less than 1.8.5_p1 are affected.

tags | advisory, local
systems | linux, gentoo
advisories | CVE-2012-2337
SHA-256 | 68d3a1284139070f600b38347b5b97957f28145e7f8f5ca73e1945edb8e00ccf
Apache Hadoop HDFS Information Disclosure
Posted Jul 10, 2012
Authored by Aaron T. Myers

Apache Hadoop version 2.0.0-alpha suffers from an HDFS information disclosure vulnerability. Malicious clients may gain write access to data for which they have read-only permission, or gain read access to any data blocks whose IDs they can determine.

tags | advisory, info disclosure
advisories | CVE-2012-3376
SHA-256 | 8ea4cabe21ecd11c0e368081bd0fd9e1d9007bdbf2e8fcaaf287c6748a7721da
Check Point Abra Bypass / Command Execution
Posted Jul 10, 2012
Authored by Komarov A., Belov V.

Check Point Abra suffers from multiple security vulnreabilities. Imperfect control modules and data monitoring allows you to run any file, bypassing the current policy around virtualization, and read/write data from an isolated Abra session directly into the PC operating system, conduct phishing attacks, etc.

tags | exploit
SHA-256 | fd38db2d9b2ab2fa942d55e39415191f7800d837620ebccc49fa1b3074ad2a6c
Netsweeper Cross Site Scripting / Cross Site Request Forgery
Posted Jul 10, 2012
Authored by Jacob Holcomb

Netsweeper Internet Filter suffers from cross site scripting and cross site request forgery vulnerabilities in the WebAdmin portal.

tags | exploit, vulnerability, xss, csrf
advisories | CVE-2012-2446, CVE-2012-2447, CVE-2012-3859
SHA-256 | 4bd4e67cc0eb876ff9cc96b4c11b92ea9c443472e744412fd9c45d3c23ad06ab
BookNux 0.2 Cross Site Scripting / SQL Injection
Posted Jul 10, 2012
Authored by Jean Pascal Pereira

BookNux versions 0.2 and below suffer from cross site scripting and remote SQL injection vulnerabilities.

tags | exploit, remote, vulnerability, xss, sql injection
SHA-256 | 4b1031332b38ad2be8272796bbd7a4e6bd1e58db9384b8886949368cd9b81cf1
Page 2 of 2
Back12Next

File Archive:

March 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Mar 1st
    16 Files
  • 2
    Mar 2nd
    0 Files
  • 3
    Mar 3rd
    0 Files
  • 4
    Mar 4th
    32 Files
  • 5
    Mar 5th
    28 Files
  • 6
    Mar 6th
    42 Files
  • 7
    Mar 7th
    17 Files
  • 8
    Mar 8th
    13 Files
  • 9
    Mar 9th
    0 Files
  • 10
    Mar 10th
    0 Files
  • 11
    Mar 11th
    15 Files
  • 12
    Mar 12th
    19 Files
  • 13
    Mar 13th
    21 Files
  • 14
    Mar 14th
    38 Files
  • 15
    Mar 15th
    15 Files
  • 16
    Mar 16th
    0 Files
  • 17
    Mar 17th
    0 Files
  • 18
    Mar 18th
    10 Files
  • 19
    Mar 19th
    32 Files
  • 20
    Mar 20th
    46 Files
  • 21
    Mar 21st
    16 Files
  • 22
    Mar 22nd
    13 Files
  • 23
    Mar 23rd
    0 Files
  • 24
    Mar 24th
    0 Files
  • 25
    Mar 25th
    12 Files
  • 26
    Mar 26th
    31 Files
  • 27
    Mar 27th
    19 Files
  • 28
    Mar 28th
    42 Files
  • 29
    Mar 29th
    0 Files
  • 30
    Mar 30th
    0 Files
  • 31
    Mar 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close