exploit the possibilities
Showing 1 - 8 of 8 RSS Feed

Files Date: 2012-01-29

ME Monitoring Manager Cross Site Scripting / SQL Injection
Posted Jan 29, 2012
Authored by Benjamin Kunz Mejri, Pim J.F. Campers, Vulnerability Laboratory | Site vulnerability-lab.com

ME Monitoring Manager versions 9.x and 10.x suffer from cross site scripting and remote SQL injection vulnerabilities.

tags | exploit, remote, vulnerability, xss, sql injection
SHA-256 | 27495ed2f2e058fb3695234a4e0de35c6432d8dc1b07b45b11e1b624e0d050bf
Zorp Proxy Firewall Suite 3.9.3
Posted Jan 29, 2012
Authored by Balazs Scheidler | Site balabit.com

Zorp is a proxy firewall suite with its core architecture built around today's security demands. It uses application level proxies, is modular and component based, uses a script language to describe policy decisions, makes it possible to monitor encrypted traffic, lets you override client actions, and lets you protect your servers with its built in IDS capabilities.

Changes: This release fixes passphrase handling of trusted CA private keys and removes support for obsolete Linux versions and Solaris.
tags | tool, firewall
systems | unix
SHA-256 | 05c0dd91dd29762f5e296d14459621c31954abd49ee245eed81ed44d3cf305ae
HercSP Cross Site Scripting
Posted Jan 29, 2012
Authored by Red Security TEAM

HercSP suffers from a cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | 32b84d2c5b473e4dd8e3cd4460d91b32e8178dac6685fd3b3c6029d150c88143
Redbus.in Open Redirection
Posted Jan 29, 2012
Authored by r007k17-w

Redbus.in suffers from an open redirection vulnerability.

tags | exploit
SHA-256 | 5f80c3d3b59c788a6c571300287636cc82e5cab5cfb8a328bf2239b695f822c5
SirmaNET Web Design SQL Injection
Posted Jan 29, 2012
Authored by 3spi0n

SirmaNET Web Design suffers from a remote SQL injection vulnerability.

tags | exploit, remote, web, sql injection
SHA-256 | 6f78d1de26ea69aca326e21861d0800a26eab815a47b6878fb38aaa6963593dd
Maxxweb CMS SQL Injection
Posted Jan 29, 2012
Authored by M4sT3r4N0nY

Maxxweb CMS suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | 9f782c8b821ef318bb46c543e37ff67c06c83ff0d5094f567aa5eb1659043d86
Voy Forums Cross Site Scripting
Posted Jan 29, 2012
Authored by Sony

Voy Forums suffers from a cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | 4a5718e5082bc88856784acdd5ef7dbd74a6440c022b6b9406f0c25625a7505f
Bastille Unix 3.2.1
Posted Jan 29, 2012
Authored by Jay Beale | Site bastille-linux.org

The Bastille Hardening program locks down an operating system, configuring the system for increased security. It currently supports Red Hat, Fedora Core, Red Hat Enterprise, SuSE, SuSE Enterprise, Mandrake, Debian, and Gentoo, HP-UX, and Apple's Mac OS X.

Changes: Various updates.
systems | linux, redhat, suse, debian, hpux, mandrake, apple, osx, gentoo, fedora
SHA-256 | f55bd88272c1d996167dc032f97acacaa8b515889994c3ba72683834f0fbe19e
Page 1 of 1
Back1Next

File Archive:

May 2022

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    May 1st
    0 Files
  • 2
    May 2nd
    15 Files
  • 3
    May 3rd
    19 Files
  • 4
    May 4th
    24 Files
  • 5
    May 5th
    15 Files
  • 6
    May 6th
    14 Files
  • 7
    May 7th
    0 Files
  • 8
    May 8th
    0 Files
  • 9
    May 9th
    13 Files
  • 10
    May 10th
    7 Files
  • 11
    May 11th
    99 Files
  • 12
    May 12th
    45 Files
  • 13
    May 13th
    7 Files
  • 14
    May 14th
    0 Files
  • 15
    May 15th
    0 Files
  • 16
    May 16th
    16 Files
  • 17
    May 17th
    26 Files
  • 18
    May 18th
    4 Files
  • 19
    May 19th
    0 Files
  • 20
    May 20th
    0 Files
  • 21
    May 21st
    0 Files
  • 22
    May 22nd
    0 Files
  • 23
    May 23rd
    0 Files
  • 24
    May 24th
    0 Files
  • 25
    May 25th
    0 Files
  • 26
    May 26th
    0 Files
  • 27
    May 27th
    0 Files
  • 28
    May 28th
    0 Files
  • 29
    May 29th
    0 Files
  • 30
    May 30th
    0 Files
  • 31
    May 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close