Section:  .. / 0905-exploits  /

Page 9 of 12
<< 1 2 3 4 5 6 7 8 9 10 11 12 >> Files 200 - 225 of 276
Currently sorted by: File NameSort By: Last Modified, File Size

 ///  File Name: rt-sa-2009-001.txt
Description:
RedTeam Pentesting discovered a cross site scripting vulnerability in the email view functionality of the IceWarp WebMail Server version 9.4.1.
Homepage:http://www.redteam-pentesting.de/
File Size:6717
Related CVE(s):CVE-2009-1467
Last Modified:May 5 18:31:24 2009
MD5 Checksum:9a3b5d58750febd51c1ac9d9d7a4cbb9

 ///  File Name: rt-sa-2009-002.txt
Description:
RedTeam Pentesting discovered a cross site scripting vulnerability in the RSS Feed Reader functionality of the IceWarp WebMail Server version 9.4.1.
Homepage:http://www.redteam-pentesting.de/
File Size:6437
Related CVE(s):CVE-2009-1467
Last Modified:May 5 18:33:30 2009
MD5 Checksum:18847f33dd2b6152dceb71e138c6a7ef

 ///  File Name: rt-sa-2009-003.txt
Description:
RedTeam Pentesting discovered a remote SQL injection vulnerability in the Groupware component of IceWarp WebMail Server version 9.4.1.
Homepage:http://www.redteam-pentesting.de/
File Size:10228
Related CVE(s):CVE-2009-1468
Last Modified:May 5 18:34:48 2009
MD5 Checksum:bdf52e086f2f9cb63c13eaf3f0defd34

 ///  File Name: rt-sa-2009-004.txt
Description:
RedTeam Pentesting discovered that the emails sent by the IceWarp WebMail Server when using the "Forgot Password" function are generated on the client side. Version 9.4.1 is affected.
Homepage:http://www.redteam-pentesting.de/
File Size:6894
Related CVE(s):CVE-2009-1469
Last Modified:May 5 18:41:02 2009
MD5 Checksum:95562bd936964ee0d82db2c683bef2f8

 ///  File Name: rtwebalbum-sql.txt
Description:
RTWebalbum version 1.0.462 blind SQL injection exploit.
Author:YEnH4ckEr
File Size:8825
Last Modified:May 8 15:17:49 2009
MD5 Checksum:29123b11a0c6ec72d23d90ecac3617b3

 ///  File Name: SA-20090525-1.txt
Description:
SEC Consult Security Advisory 20090525-1 - The Nortel Contact Center Manager server version 6.0 suffers from a password disclosure vulnerability.
Author:D. Matscheko
Homepage:http://www.sec-consult.com
File Size:4271
Last Modified:May 26 23:04:48 2009
MD5 Checksum:1de1fe22826ddf755d05ce8191ddbc10

 ///  File Name: SA-20090525-2.txt
Description:
SEC Consult Security Advisory 20090525-2 - The SonicWALL Global Security Client version 1.0.0.15 suffers from a local privilege escalation vulnerability.
Author:lofi42
Homepage:http://www.sec-consult.com
File Size:2672
Last Modified:May 26 23:06:24 2009
MD5 Checksum:09f28a31b0460bffcfb8fc84d29ba802

 ///  File Name: SA-20090525-3.txt
Description:
SEC Consult Security Advisory 20090525-3 - The SonicWALL Global VPN Client versions 4.0.0.835 and below suffer from a local privilege escalation vulnerability.
Author:lofi42
Homepage:http://www.sec-consult.com
File Size:2621
Last Modified:May 26 23:08:11 2009
MD5 Checksum:bbd35e1bde27297e6c6e49b09c81ff6a

 ///  File Name: SA-20090525-4.txt
Description:
SEC Consult Security Advisory 20090525-4 - A format string vulnerability exists in the logfile parsing function of SonicOS. An attacker could crash the system or execute arbitrary code by injecting format string metacharacters into the logfile, if an administrator subsequently uses the SonicOS GUI to view the log.
Author:lofi42
Homepage:http://www.sec-consult.com
File Size:2440
Last Modified:May 26 23:09:38 2009
MD5 Checksum:005de32cf9aa6bac47c19749c615aa31

 ///  File Name: safarilibxml-overflow.txt
Description:
Proof of concept exploit for the Safari RSS feed:// buffer overflow via libxml2.
Author:Kevin Finisterre
Homepage:http://www.digitalmunition.com/
File Size:2459
Related CVE(s):CVE-2008-3529
Last Modified:May 26 20:20:51 2009
MD5 Checksum:230693062239171540bd988667094a6c

 ///  File Name: safemod-windows.zip
Description:
PHP versions 5.2.9 and below local safemod bypass exploit.
Author:Abysssec
Homepage:http://abysssec.com/
File Size:1721
Last Modified:May 26 20:45:44 2009
MD5 Checksum:8c488618536195e44a5d91cfba72b5a6

 ///  File Name: saman-sql.txt
Description:
Saman Portal suffers from a remote SQL injection vulnerability.
Author:Securitylab Security Research
Homepage:http://securitylab.ir/
File Size:1138
Last Modified:May 24 10:33:30 2009
MD5 Checksum:fcb1639cbde08afc33e767980b389f37

 ///  File Name: shaadiclone-addadmin.txt
Description:
ShaadiClone version 2.0 add administrator exploit that leverages addadminmembercode.php.
Author:x.CJP.x
File Size:8951
Last Modified:May 26 21:34:44 2009
MD5 Checksum:4d907ececd151c895cde05fcbaf360d5

 ///  File Name: shoryuken.c
Description:
This is a local root exploit for the Linux 2.6.29 ptrace_attach() race condition that allows a process to gain elevated privileges under certain conditions.
Author:prdelka
Homepage:https://prdelka.blackart.org.uk/
File Size:4385
Last Modified:May 15 14:18:23 2009
MD5 Checksum:2406d30eaa6ecc2fd2340203ddef7c7a

 ///  File Name: shutter-sql.txt
Description:
Shutter version 0.1.1 suffers from multiple remote SQL injection vulnerabilities.
Author:YEnH4ckEr
File Size:3405
Last Modified:May 15 14:37:15 2009
MD5 Checksum:2d72704686d075a054fdbc018424308c

 ///  File Name: simplecustomer-passwd.txt
Description:
Simple Customer version 1.3 arbitrary change administrative password exploit.
Author:ahmadbady
File Size:933
Last Modified:May 8 02:01:25 2009
MD5 Checksum:544688c982833218f15000a2c7e0f34d

 ///  File Name: sitex-lfi.txt
Description:
SiteX versions 0.7.4.418 and below suffer from local file inclusion vulnerabilities.
Author:ahmadbady
File Size:1085
Last Modified:May 27 18:30:05 2009
MD5 Checksum:82ed168b791b4a9073c9a1c2d46c0838

 ///  File Name: slayer24-overflow.txt
Description:
Slayer version 2.4 skin related universal buffer overflow exploit.
Author:SuNHouSe2
File Size:5559
Last Modified:May 26 20:41:15 2009
MD5 Checksum:266b0634f2a9fcb062234624ad37f2e5

 ///  File Name: smallpirates-sql.txt
Description:
Small Pirates version 2.1 suffers from SQL injection and cookie stealing vulnerabilities.
Author:YEnH4ckEr
File Size:6743
Last Modified:May 28 20:21:45 2009
MD5 Checksum:4943da5943d5edd9d5fad62b3d1502d6

 ///  File Name: solaris-dtrace-dos.c
Description:
Solaris 10 and OpenSolaris dtrace local kernel denial of service proof of concept exploit.
Author:mu-b
Homepage:http://www.digit-labs.org/
File Size:2266
Last Modified:May 4 23:47:21 2009
MD5 Checksum:814a97d288d8826fb2e50a782161caf7

 ///  File Name: solaris-fasttrap-dos.c
Description:
Solaris 10 and OpenSolaris fasttrap local kernel denial of service proof of concept exploit.
Author:mu-b
Homepage:http://www.digit-labs.org/
File Size:1756
Last Modified:May 4 23:48:29 2009
MD5 Checksum:4e3185d1766408117e70eea4ab71d8bd

 ///  File Name: sorinara-overflow.txt
Description:
Sorinara Streaming Audio Player version 0.9 local stack overflow exploit that creates a malicious .m3u file.
Author:Stack
Homepage:http://v4-team.com/
File Size:1981
Last Modified:May 5 18:26:31 2009
MD5 Checksum:6fb28d1aec9bf84b6d0b51027f8b6c7a

 ///  File Name: sorinarapla-overflow.txt
Description:
Sorinara Streaming Audio Player version 0.9 proof of concept exploit that creates a malicious .PLA file.
Author:GolD_M
Homepage:http://www.tryag.cc/
File Size:436
Last Modified:May 8 02:21:57 2009
MD5 Checksum:ffad583f848972b079071884ac678d1c

 ///  File Name: sorinarasap-overflow.txt
Description:
Sorinara Streaming Audio Player version 0.9 local stack overflow exploit that creates a malicious .m3u file.
Author:Cyber-Zone
Homepage:http://www.iq-ty.com/
File Size:817
Last Modified:May 5 18:30:02 2009
MD5 Checksum:30f295c05bf1d99df4be0d7c412e84af

 ///  File Name: sorinarasap09-overflow.txt
Description:
Sorinara Streaming Audio Player version 0.9 stack overflow exploit that creates a malicious .PLA file.
Author:Hakxer
File Size:2080
Last Modified:May 8 02:18:10 2009
MD5 Checksum:7c6cef918cc2a751fdf0ac014a63230c