what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 5 of 5 RSS Feed

Files from BaCkSpAcE

Email addresssinisa86 at gmail.com
First Active2004-01-20
Last Active2006-05-22
lnx_execve_fupdisasm.c
Posted May 22, 2006
Authored by BaCkSpAcE | Site bitbyterz.org

32 byte execve() shellcode with 'fuck up disasm' ability.

tags | shellcode
SHA-256 | ad2250ea9791a84a522c61851997606eabe8ac44ff645a9b816167d06cf67db5
lnx_binsh4.c
Posted Sep 7, 2005
Authored by c0ntex, BaCkSpAcE

23 byte linux/x86 /bin/sh sysenter opcode array payload.

tags | x86, shellcode
systems | linux
SHA-256 | c6fcfb33ec9f6fc7239338c5b769cff2c18bd07163945629fb794f7efd19c361
yabbSESQL.txt
Posted Mar 1, 2004
Authored by BaCkSpAcE

YaBB SE versions 1.5.4 to 1.5.5b are all susceptible to various remote SQL injection attacks.

tags | advisory, remote, sql injection
SHA-256 | d37c5048d51d248294618dab5c91a0b3df20b1030af3cf3694cce090223ea121
yabbSE2.txt
Posted Feb 17, 2004
Authored by BaCkSpAcE

YaBB SE versions 1.54 and 1.55 are susceptible to a SQL injection vulnerability that allows a remote attacker to execute malicious SQL statements on the database remotely.

tags | advisory, remote, sql injection
SHA-256 | 0cb034ef99caa617751564217c86b7aa293f12c1a2e323fbaed9a9eb14a1dc80
yabbSE.txt
Posted Jan 20, 2004
Authored by BaCkSpAcE

YaBB SE versions 1.54 and 1.53 have the functions welcome and recentTopics which are vulnerable to SQL injection because the parameter ID_MEMBER is not checked against malicious input.

tags | exploit, sql injection
SHA-256 | 95e89384d3a5e60f55043d680923bf50f3a2d727d428ca8993e211fcbfc77dda
Page 1 of 1
Back1Next

File Archive:

August 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Aug 1st
    15 Files
  • 2
    Aug 2nd
    22 Files
  • 3
    Aug 3rd
    0 Files
  • 4
    Aug 4th
    0 Files
  • 5
    Aug 5th
    15 Files
  • 6
    Aug 6th
    11 Files
  • 7
    Aug 7th
    43 Files
  • 8
    Aug 8th
    42 Files
  • 9
    Aug 9th
    36 Files
  • 10
    Aug 10th
    0 Files
  • 11
    Aug 11th
    0 Files
  • 12
    Aug 12th
    0 Files
  • 13
    Aug 13th
    0 Files
  • 14
    Aug 14th
    0 Files
  • 15
    Aug 15th
    0 Files
  • 16
    Aug 16th
    0 Files
  • 17
    Aug 17th
    0 Files
  • 18
    Aug 18th
    0 Files
  • 19
    Aug 19th
    0 Files
  • 20
    Aug 20th
    0 Files
  • 21
    Aug 21st
    0 Files
  • 22
    Aug 22nd
    0 Files
  • 23
    Aug 23rd
    0 Files
  • 24
    Aug 24th
    0 Files
  • 25
    Aug 25th
    0 Files
  • 26
    Aug 26th
    0 Files
  • 27
    Aug 27th
    0 Files
  • 28
    Aug 28th
    0 Files
  • 29
    Aug 29th
    0 Files
  • 30
    Aug 30th
    0 Files
  • 31
    Aug 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close