exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 26 - 42 of 42 RSS Feed

Files Date: 2012-07-31 to 2012-07-31

Secunia Security Advisory 50063
Posted Jul 31, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Two vulnerabilities have been reported in the PoodLL plugins for Moodle, which can be exploited by malicious people to conduct cross-site scripting attacks.

tags | advisory, vulnerability, xss
SHA-256 | 7f928e1ef9d46da2dadab131054e85fcc473662c2453689b842054730301fedd
Secunia Security Advisory 50021
Posted Jul 31, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Two security issues and a vulnerability have been reported in Django, which can be exploited by malicious people to conduct cross-site scripting attacks and cause a DoS (Denial of Service).

tags | advisory, denial of service, xss
SHA-256 | 9239fbffebc7f27da01750df0381a2801292c0c7b99ddaa8f70b612be2d18560
Secunia Security Advisory 50099
Posted Jul 31, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Some vulnerabilities have been reported in the Backend Localization plugin for WordPress, which can be exploited by malicious people to conduct cross-site scripting attacks.

tags | advisory, vulnerability, xss
SHA-256 | 77a4086ca6f20e915785181730d0675252f56b8f6f763f25404ec336d2103498
Secunia Security Advisory 50074
Posted Jul 31, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A weakness has been discovered in Scrutinizer NetFlow and sFlow Analyzer, which can be exploited by malicious, local users to bypass certain security restrictions.

tags | advisory, local
SHA-256 | eb4bc7c7983fbc936d2f8fc9acc61b3ad6789d493a3111747661dfc717954d3c
Secunia Security Advisory 50116
Posted Jul 31, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in ICONICS GENESIS32 and ICONICS BizViz, which can be exploited by malicious, local users to gain escalated privileges.

tags | advisory, local
SHA-256 | a873e7efe03216b30da648df37190cfe2e7d2c76894d75aaf671a7b90ec9d078
Temenos T24 R07.03 Authentication Bypass
Posted Jul 31, 2012
Authored by Dionach

Temenos T24 R07.03 suffers from an authentication bypass vulnerability as it fails to properly enforce access control on the password reset functionality.

tags | exploit, bypass
SHA-256 | 02ff07cc29f837babb592db15e1183a5b60963952716001ea0a431f7960a4a04
Temenos T24 R07.03 Cross Site Scripting
Posted Jul 31, 2012
Authored by Dionach

Temenos T24 R07.03 suffers from a reflected cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | 5a86a359330048bce578fad4d1e515585ab3ba67c08f61b0f8def7cf9c396e72
Symantec Web Gateway 5.0.3.18 Blind SQL Injection
Posted Jul 31, 2012
Authored by @_Kc57

Symantec Web Gateway version 5.0.3.18 suffers from a remote blind SQL injection vulnerability in deptUploads_data.php.

tags | exploit, remote, web, php, sql injection
SHA-256 | 3979d02fd58b3d8d425160bc812c8985dd4e717d3e8b65cbe4b4ce9d8c41fd1b
DataWatch Monarch Business Intelligence (BI) 5.1 Blind XPath Injection
Posted Jul 31, 2012
Authored by Dionach

DataWatch Monarch Business Intelligence (BI) version 5.1 suffers from a blind XPath injection vulnerability in the administrative section.

tags | exploit
SHA-256 | 3e0ec45c35080aac2af038b91791730e03ba16055058332c47d09bc62aab599e
DataWatch Monarch Business Intelligence (BI) 5.1 SQL Injection
Posted Jul 31, 2012
Authored by Dionach

DataWatch Monarch Business Intelligence (BI) version 5.1 suffers from a remote blind SQL injection vulnerability.

tags | advisory, remote, sql injection
SHA-256 | b490b61cddfb1646f4adbb097c40441e7e7963d4b9bc0f254dde7e16ee03d28f
DataWatch Monarch Business Intelligence (BI) 5.1 Reflective Cross Site Scripting
Posted Jul 31, 2012
Authored by Dionach

DataWatch Monarch Business Intelligence (BI) version 5.1 suffers from a reflective cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | ec32eb30d78cfa43006c0637f0d72afa5a3d43bf5f740ba4eef97842fa1daac5
DataWatch Monarch Business Intelligence (BI) 5.1 Client Cross Site Scripting
Posted Jul 31, 2012
Authored by Dionach

DataWatch Monarch Business Intelligence (BI) version 5.1 suffers from a cross site scripting vulnerability in the client section.

tags | exploit, xss
SHA-256 | a56f2b5cc1afeece14c2a41f4faabc96b0f7f9edcef58badecb3fee221ce4bd7
DataWatch Monarch Business Intelligence (BI) 5.1 Admin Cross Site Scripting
Posted Jul 31, 2012
Authored by Dionach

DataWatch Monarch Business Intelligence (BI) version 5.1 suffers from a cross site scripting vulnerability in the administrative section.

tags | exploit, xss
SHA-256 | ec32eb30d78cfa43006c0637f0d72afa5a3d43bf5f740ba4eef97842fa1daac5
Dr. Web Control Center 6.00.3.201111300 Cross Site Scripting
Posted Jul 31, 2012
Authored by Oliver Karow | Site oliverkarow.de

Dr. Web Control Center version 6.00.3.201111300 suffers from a persistent script injection vulnerability.

tags | exploit, web, xss
SHA-256 | 851dfd59c6d9101c9e8c052a49bf2565ed6031d9562a93e808d4c5f2aacb003b
LedgerSMB 1.3 Denial Of Service
Posted Jul 31, 2012
Authored by Chris Travers

A security oversight has been discovered in LedgerSMB 1.3 which could allow a malicious user to cause a denial of service against LedgerSMB or otherwise affect the way in which certain forms of data would get entered.

tags | advisory, denial of service
SHA-256 | 4cd2f77e1b66b8024507a17ff8fd9246978a15c4237dcc46026b9a96ef1a1227
Debian Security Advisory 2517-1
Posted Jul 31, 2012
Authored by Debian | Site debian.org

Debian Linux Security Advisory 2517-1 - Einar Lonn discovered that under certain conditions bind9, a DNS server, may use cached data before initialization. As a result, an attacker can trigger and assertion failure on servers under high query load that do DNSSEC validation.

tags | advisory
systems | linux, debian
advisories | CVE-2012-3817
SHA-256 | 1264cbf6ebe6d856f52045f33b4880823f6d6637579867ab6419f12fcd0c8aa0
Spark IM Stored Static Crypto Key
Posted Jul 31, 2012
Authored by Adam Caudill

Spark IM client version 2.6.3 suffers from a cryptography failure where the key for encrypting the passwords is stored statically in Encryptor.java. Tool included that will recover usernames and passwords.

tags | exploit, java, info disclosure
systems | linux
SHA-256 | 9782253ae9795fa6cba9d6a8e3b03d59608adabe717e35b82a175473cd0bfd36
Page 2 of 2
Back12Next

File Archive:

March 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Mar 1st
    16 Files
  • 2
    Mar 2nd
    0 Files
  • 3
    Mar 3rd
    0 Files
  • 4
    Mar 4th
    32 Files
  • 5
    Mar 5th
    28 Files
  • 6
    Mar 6th
    42 Files
  • 7
    Mar 7th
    17 Files
  • 8
    Mar 8th
    13 Files
  • 9
    Mar 9th
    0 Files
  • 10
    Mar 10th
    0 Files
  • 11
    Mar 11th
    15 Files
  • 12
    Mar 12th
    19 Files
  • 13
    Mar 13th
    21 Files
  • 14
    Mar 14th
    38 Files
  • 15
    Mar 15th
    15 Files
  • 16
    Mar 16th
    0 Files
  • 17
    Mar 17th
    0 Files
  • 18
    Mar 18th
    10 Files
  • 19
    Mar 19th
    32 Files
  • 20
    Mar 20th
    46 Files
  • 21
    Mar 21st
    16 Files
  • 22
    Mar 22nd
    13 Files
  • 23
    Mar 23rd
    0 Files
  • 24
    Mar 24th
    0 Files
  • 25
    Mar 25th
    12 Files
  • 26
    Mar 26th
    31 Files
  • 27
    Mar 27th
    19 Files
  • 28
    Mar 28th
    42 Files
  • 29
    Mar 29th
    0 Files
  • 30
    Mar 30th
    0 Files
  • 31
    Mar 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close