exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 5 of 5 RSS Feed

Files Date: 2004-03-31

adder-0.3.3-src.zip
Posted Mar 31, 2004
Authored by Oliver Lavery

Adder is a tool used for experimentation with runtime modification of binary applications. It's also useful for prototyping run-time patches, understanding the effects and possibilities of call-hooking, and other run-time program tweaks. Definitely worth a download and something to play with.

tags | tool
systems | unix
SHA-256 | d9e1ecaf634b16b0e423b5eed19f67677b9a47f0530ec32ecc87384e86f0c7cf
wilco.zip
Posted Mar 31, 2004
Authored by Luigi Auriemma | Site aluigi.altervista.org

A testing tool for RogerWilco versions 1.4.1.6 and below and RogerWilco Base Station versions 0.30a that suffer from multiple bugs.

tags | exploit
SHA-256 | 14c6e5ed23cc0c634f1bc2f64b1c2e52542ccfb2535f2b0a11d8230fe7a7b9f7
rogerwilco2.txt
Posted Mar 31, 2004
Authored by Luigi Auriemma | Site aluigi.altervista.org

RogerWilco versions 1.4.1.6 and below and RogerWilco Base Station versions 0.30a suffer from multiple bugs. From being crashed with a malformed UDP packet to spoofing 'voice' traffic when not even being connected to a channel, quite a few amusing problems are listed.

tags | advisory, udp, spoof
SHA-256 | 22ab3fb2653158c6541bf495cfa5519f2bf1f7f1d2a4c897d0324b8762076abc
ieBad.txt
Posted Mar 31, 2004
Site malware.com

Good write up discussing how Microsoft has yet again dropped the ball on patching another Internet Explorer vulnerability, where using forms can allow an attacker to spoof a fake destination to the user.

tags | exploit, spoof
SHA-256 | 518c6b718d88df9d2c880d83b2441bc75030395324543fe528bc4edcbeffb0c0
Adv-20040331.txt
Posted Mar 31, 2004
Authored by Nick Gudov | Site s-quadra.com

S-Quadra Advisory #2004-03-31 - CactuShop shopping cart versions 5.x suffer from a SQL injection attack that allows for remote code execution via the MS SQL xp_cmdshell function. They also have a cross site scripting vulnerability.

tags | exploit, remote, code execution, xss, sql injection
SHA-256 | d6c5fc742f5d4a4adf31b6ea32e79a6ba6bdfbf8a51f4d9d2fa1268682a60811
Page 1 of 1
Back1Next

File Archive:

August 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Aug 1st
    15 Files
  • 2
    Aug 2nd
    22 Files
  • 3
    Aug 3rd
    0 Files
  • 4
    Aug 4th
    0 Files
  • 5
    Aug 5th
    15 Files
  • 6
    Aug 6th
    11 Files
  • 7
    Aug 7th
    43 Files
  • 8
    Aug 8th
    42 Files
  • 9
    Aug 9th
    36 Files
  • 10
    Aug 10th
    0 Files
  • 11
    Aug 11th
    0 Files
  • 12
    Aug 12th
    0 Files
  • 13
    Aug 13th
    0 Files
  • 14
    Aug 14th
    0 Files
  • 15
    Aug 15th
    0 Files
  • 16
    Aug 16th
    0 Files
  • 17
    Aug 17th
    0 Files
  • 18
    Aug 18th
    0 Files
  • 19
    Aug 19th
    0 Files
  • 20
    Aug 20th
    0 Files
  • 21
    Aug 21st
    0 Files
  • 22
    Aug 22nd
    0 Files
  • 23
    Aug 23rd
    0 Files
  • 24
    Aug 24th
    0 Files
  • 25
    Aug 25th
    0 Files
  • 26
    Aug 26th
    0 Files
  • 27
    Aug 27th
    0 Files
  • 28
    Aug 28th
    0 Files
  • 29
    Aug 29th
    0 Files
  • 30
    Aug 30th
    0 Files
  • 31
    Aug 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close