exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 12 of 12 RSS Feed

Files Date: 2012-02-05

DNS Service Oriented DoS / DDoS Attacks
Posted Feb 5, 2012
Authored by Huzeyfe ONAL

Whitepaper called DNS Service Oriented Denial of Service / Distributed Denial of Service Attacks. Written in Turkish.

tags | paper, denial of service
SHA-256 | 493ad9e6e104e2d2161841c38de46e0ed488cc2b36141db458386aa4c11820ec
Analysis Of A MIDI Remote Code Execution Vulnerability
Posted Feb 5, 2012
Authored by Celil Unuver

This whitepaper analyzes the MIDI remote code execution vulnerability found in the Windows Multimedia Library. Written in Turkish.

tags | paper, remote, code execution
systems | windows
advisories | CVE-2012-0003
SHA-256 | bc77e719e2e51fcf4b4ae803f613a643621f8d598b8d91904c9c989f3d76fdee
PHP 5.4.0RC6 Denial Of Service
Posted Feb 5, 2012
Authored by Stefan Esser

PHP version 5.4.0RC6 64-bit denial of service proof of concept exploit.

tags | exploit, denial of service, php, proof of concept
SHA-256 | 7c04eac6d3b3e40ab566f6c73cb79f9cb313c82bbc16ddb890969b52370d94fd
Edraw Diagram Component 5 Active-X Buffer Overflow
Posted Feb 5, 2012
Authored by Senator of Pirates

Edraw Diagram Component 5 active-x buffer overflow proof of concept denial of service exploit.

tags | exploit, denial of service, overflow, activex, proof of concept
SHA-256 | 428ea6a0fb5b774ad26363a005e9f41084184866a058959a2cbd7e8fec064e19
Mobile Based MITM Attack
Posted Feb 5, 2012
Authored by Bilal Bokhari

This is a brief whitepaper discussing how to set up QT Mobile Hotspot and YAMAS applications to man in the middle connections using your phone.

tags | paper
SHA-256 | 8589a3cbc7aa1e43619674b8384fb3846512cc1a76778c508dc5e6c0447074d4
ObjectLabs Forum Systems SQL Injection
Posted Feb 5, 2012
Authored by 3spi0n

ObjectLabs Forum System suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | 29f7cb358fdb021cd30f1d0fcec8713490b9ae7307d605e693d36405de170423
Conduit Wibiya Toolbar Persistent Cross Site Scripting
Posted Feb 5, 2012
Authored by r007k17-w

Conduit Wibiya Toolbar suffers from a persistent cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | 2c959827ddff6b6e3255ec9d5694089b2dd225dbc6bd0228afcff881b6d624a1
XWiki Enterprise 3.4 Cross Site Scripting
Posted Feb 5, 2012
Authored by Sony

XWiki Enterprise version 3.4 suffers from a cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | 488e3e2f9cda2bffc248f4417be270c003838d7fd6841f9ce325effa416744da
InsideChannel Web Design SQL Injection
Posted Feb 5, 2012
Authored by 3spi0n

InsideChannel Web Design suffers from a remote SQL injection vulnerability.

tags | exploit, remote, web, sql injection
SHA-256 | a3d29d847caff3d0c1c691d89f130ba1c3be4de039ffd59149897f7afc762089
Viper Network Sniffer Script
Posted Feb 5, 2012
Authored by Bl4ck.Viper

This is a bash script to use in conjunction with Backtrack that simplifies the spawning of various sniffers.

tags | tool, sniffer, bash
SHA-256 | f47f5904466161ca77c2e5dfe50b339c668137229b6b7c9220564c7df7b59982
Zanjan Azad University SQL Injection
Posted Feb 5, 2012
Authored by Skote Vahshat

Zanjan Azad University suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | f465587e4fef5e22d939dda3daafee489e8cfe29447dd6630ce9f90b818a0d0f
Debian Security Advisory 2384-2
Posted Feb 5, 2012
Authored by Debian | Site debian.org

Debian Linux Security Advisory 2384-2 - It was discovered that the last security update for cacti, DSA-2384-1, introduced a regression in lenny.

tags | advisory
systems | linux, debian
advisories | CVE-2010-1644, CVE-2010-1645, CVE-2010-2543, CVE-2010-2545, CVE-2011-4824
SHA-256 | 82d990a810faa7b35f7eb3aceea45e1088a0b71504914f64a2c3c9da89629f41
Page 1 of 1
Back1Next

File Archive:

July 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jul 1st
    27 Files
  • 2
    Jul 2nd
    10 Files
  • 3
    Jul 3rd
    35 Files
  • 4
    Jul 4th
    27 Files
  • 5
    Jul 5th
    18 Files
  • 6
    Jul 6th
    0 Files
  • 7
    Jul 7th
    0 Files
  • 8
    Jul 8th
    28 Files
  • 9
    Jul 9th
    44 Files
  • 10
    Jul 10th
    24 Files
  • 11
    Jul 11th
    25 Files
  • 12
    Jul 12th
    11 Files
  • 13
    Jul 13th
    0 Files
  • 14
    Jul 14th
    0 Files
  • 15
    Jul 15th
    28 Files
  • 16
    Jul 16th
    0 Files
  • 17
    Jul 17th
    0 Files
  • 18
    Jul 18th
    0 Files
  • 19
    Jul 19th
    0 Files
  • 20
    Jul 20th
    0 Files
  • 21
    Jul 21st
    0 Files
  • 22
    Jul 22nd
    0 Files
  • 23
    Jul 23rd
    0 Files
  • 24
    Jul 24th
    0 Files
  • 25
    Jul 25th
    0 Files
  • 26
    Jul 26th
    0 Files
  • 27
    Jul 27th
    0 Files
  • 28
    Jul 28th
    0 Files
  • 29
    Jul 29th
    0 Files
  • 30
    Jul 30th
    0 Files
  • 31
    Jul 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close