what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 101 - 105 of 105 RSS Feed

Files

linsql2.c
Posted Aug 5, 2005
Authored by Herbless, solid

linsql2 is an updated version of the command line client for MS-SQL that can execute arbitrary SQL queries and OS commands, when the username/password of the MS-SQL server is known. This version supports the API of the latest freetds library.

tags | exploit, arbitrary
SHA-256 | 4a7f09b14553a97a9a8574a315ad5054939fcc9f829e00560c83fedc1daeea48
fuseXSS.txt
Posted Aug 5, 2005
Authored by N.N.P

Fuse version 4.1.0 and possibly earlier versions appear susceptible to cross site scripting attacks.

tags | exploit, xss
SHA-256 | 8f5d67d23186a9cd6e844fed0fb3cf73c4aee466929859b10d0071d6071bd284
naxtorShop.txt
Posted Aug 5, 2005
Authored by John Cobb | Site NoBytes.com

Naxtor Shopping Cart 1.0 is susceptible to cross site scripting, SQL injection, and information disclosure vulnerabilities.

tags | exploit, vulnerability, xss, sql injection, info disclosure
SHA-256 | 261cae7535d437a324bbc188354942c054e6e0dc3304587397d3dc08116fcabf
quickDoS.txt
Posted Aug 5, 2005
Authored by matiteman

Quick'n'Easy FTP server 3.0 pro and lite suffer from a remote buffer overflow vulnerability that can result in a denial of service.

tags | exploit, remote, denial of service, overflow
SHA-256 | 9a64dafde7563903ef2ed2c64e250221bbb96477a2c523f5eb5c27068a9064d2
netquerypoc.html
Posted Aug 5, 2005
Authored by rgod | Site retrogod.altervista.org

Netquery 3.1 remote command execution proof of concept exploit.

tags | exploit, remote, proof of concept
SHA-256 | 3b2367e914621187e128ad68af7dadb8a12153971468d5ecdf4a3f427321eefb
Page 5 of 5
Back12345Next

Top Authors In Last 30 Days

Recent News

News RSS Feed
Life Imitates xkcd Comic As Florida Gang Beats Crypto Password From Retiree
Posted Sep 20, 2024

tags | headline, cybercrime, data loss, cryptography
1 In 10 Orgs Dumping Their Security Vendors After CrowdStrike Outage
Posted Sep 20, 2024

tags | headline, denial of service
Cyber Crooks Strut Away With Haute Couture Harvey Nichols Data
Posted Sep 20, 2024

tags | headline, hacker, privacy, britain, cybercrime, data loss, fraud
Noise Storms: Massive Amounts Of Spoofed Web Traffic Linked To China
Posted Sep 20, 2024

tags | headline, china
Tor Network Denies Report That Anonymity Is Completely Canceled
Posted Sep 20, 2024

tags | headline, government, privacy, cryptography
Marko Polo Hackers Found To Be Running Dozens Of Scams
Posted Sep 20, 2024

tags | headline, hacker, cybercrime, fraud, phish, cryptography
Re-Opened Three Mile Island Will Power AI Datacenters Under New Deal
Posted Sep 20, 2024

tags | headline, microsoft, botnet
Social Media Users Lack Control Over Data Used By AI, US FTC Says
Posted Sep 19, 2024

tags | headline, government, privacy, usa, data loss, botnet
Hackers Demand $6 Million From Seattle Airport Operators
Posted Sep 19, 2024

tags | headline, hacker, cybercrime, data loss, fraud, cryptography
Recent WhatsUp Gold Vulnerabilities Possibly Exploited In Ransomware Attacks
Posted Sep 19, 2024

tags | headline, malware, cybercrime, flaw, cryptography
View More News →
packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close