exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 10 of 10 RSS Feed

Files from Bahaa Naamnmeh

First Active2003-09-18
Last Active2005-08-14
mcwOverflow.txt
Posted Aug 14, 2005
Authored by Bahaa Naamnmeh | Site bsecurity.tk

A Unicode buffer overflow exists in the handling of .mcw files in Microsoft Word.

tags | advisory, overflow
SHA-256 | bd6af65a00560736f607e17816c217de9f27ad59f1769adbd5fa1f8de4ff8e02
RUMBA.txt
Posted Apr 17, 2005
Authored by Bahaa Naamnmeh | Site bsecurity.tk

There are several buffer overflow vulnerabilities that can be triggered when loading a specially crafted profile into RUMBA Office 7.3.

tags | advisory, overflow, vulnerability
SHA-256 | ddc021caa5195851b76ce25e60084b865be505a0a82d133687d33b9815e75145
winshadow.zip
Posted Oct 1, 2003
Authored by Peter Winter-Smith, Bahaa Naamnmeh | Site elitehaven.net

OmniCon WinShadow version 2.0 exploit that makes use of a buffer overflow in the client handling of hostnames in host files.

tags | exploit, overflow
SHA-256 | 86813402c8fb4dfc3ce919ffaaa3d42a89d9a501b49144029fa04d5764e3e764
winshadow.txt
Posted Oct 1, 2003
Authored by Bahaa Naamnmeh | Site bsecurity.tk

OmniCon WinShadow version 2.0 suffers from a buffer overflow in the client handling of hostnames in host files. A denial of service also exists whenever an excessively long username or password is used.

tags | advisory, denial of service, overflow
SHA-256 | 1ab3f35a2cae652c184347381e282940b2819ed0fa2fd143dfdca37f01511eb9
ReBootSQLinject.txt
Posted Sep 25, 2003
Authored by Bahaa Naamnmeh | Site bsecurity.tk

Re-Boot Design ASP Forum is vulnerable to a SQL injection attack that allows remote accessing of a user account without prior knowledge of their password.

tags | advisory, remote, sql injection, asp
SHA-256 | e678d70617cc30fc5813f731c6760853903497a982dccceee63e02e782e18f04
threadITsql.txt
Posted Sep 25, 2003
Authored by Bahaa Naamnmeh | Site bsecurity.tk

Thread-ITSQL is susceptible to cross site scripting attacks in its Topic Title, Name and Message fields.

tags | advisory, xss
SHA-256 | a8673828a2c183f9ff8049970d8dbf6c66a148d78e082ca0072c4acc741f989a
threadIT.txt
Posted Sep 25, 2003
Authored by Bahaa Naamnmeh | Site bsecurity.tk

The Thread-IT Message board is vulnerable to cross site scripting injection via the Topic Title, Name and Message fields.

tags | advisory, xss
SHA-256 | 10e3db50f48b3886d5c8ae6c8e46cadf3fa8ec612cab4d818e88e79ee5f0385f
commentxss.txt
Posted Sep 25, 2003
Authored by Bahaa Naamnmeh | Site bsecurity.tk

Comment Board is susceptible to cross site scripting attacks in the Topic Title, Name, and Message fields.

tags | advisory, xss
SHA-256 | 827dc62fdf35b1cc001920e7959315e067206ab13b453f97e6841f66fd718d36
pandpdos.txt
Posted Sep 18, 2003
Authored by Bahaa Naamnmeh | Site bsecurity.tk

The Plug and Play Web Server version 1.0002c is susceptible to multiple buffer overflow attacks that cause the server to crash.

tags | exploit, web, overflow
SHA-256 | 2b68d648120147ab8417ee871e9d52d166dd19a55bd2cd64fc864ba5ce18e676
pandpdt.txt
Posted Sep 18, 2003
Authored by Bahaa Naamnmeh | Site bsecurity.tk

The Plug and Play Web Server version 1.0002c is susceptible to multiple directory traversal attacks allowing a remote attacker to gain access to internal system files.

tags | exploit, remote, web
SHA-256 | 08a1508555f21666773d5967a389f637ade7bd17986669a075b9984c763bda51
Page 1 of 1
Back1Next

File Archive:

May 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    May 1st
    44 Files
  • 2
    May 2nd
    5 Files
  • 3
    May 3rd
    11 Files
  • 4
    May 4th
    0 Files
  • 5
    May 5th
    0 Files
  • 6
    May 6th
    28 Files
  • 7
    May 7th
    3 Files
  • 8
    May 8th
    4 Files
  • 9
    May 9th
    53 Files
  • 10
    May 10th
    12 Files
  • 11
    May 11th
    0 Files
  • 12
    May 12th
    0 Files
  • 13
    May 13th
    0 Files
  • 14
    May 14th
    0 Files
  • 15
    May 15th
    0 Files
  • 16
    May 16th
    0 Files
  • 17
    May 17th
    0 Files
  • 18
    May 18th
    0 Files
  • 19
    May 19th
    0 Files
  • 20
    May 20th
    0 Files
  • 21
    May 21st
    0 Files
  • 22
    May 22nd
    0 Files
  • 23
    May 23rd
    0 Files
  • 24
    May 24th
    0 Files
  • 25
    May 25th
    0 Files
  • 26
    May 26th
    0 Files
  • 27
    May 27th
    0 Files
  • 28
    May 28th
    0 Files
  • 29
    May 29th
    0 Files
  • 30
    May 30th
    0 Files
  • 31
    May 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close