what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 51 - 56 of 56 RSS Feed

Files Date: 2004-11-20 to 2004-11-21

atk-3.0.zip
Posted Nov 20, 2004
Authored by Marc Ruef | Site computec.ch

The Attack Tool Kit (ATK) is an open-source utility to perform vulnerability checks and enhance security audits. The most important changes in ATK 3.0 are the introduction of a dedicated exploiting routine and the Plugin AutoUpdate (over HTTP). Check the website for more details. Binary version.

tags | web
SHA-256 | fff78b654c27955434f6b2c513880a3a88ef5fdf1aa10a4ba630fa3f163f1362
googleDisclose.txt
Posted Nov 20, 2004
Authored by Elliott Back | Site elliottback.com

Although one of the features of Google Desktop Search is to archive web history in its index for future searching, unchecking the preference to archive Web History and saving the preference does not clear the web history from the index.

tags | advisory, web
SHA-256 | d6ac298483d170e897ea9fdc64c9e41824b213b20b76a5907a327dc8094dc5a7
zipbrk.zip
Posted Nov 20, 2004
Authored by oc.192

This is a simple tool that searches for the central and local headers contained in a zip file and alters the uncompressed data variable to be 0 in an attempt to trick anti-virus software into not scanning the files inside the zip file.

tags | exploit, local, virus
advisories | CVE-2004-0932, CVE-2004-0937
SHA-256 | 89007618a7cc506d601e2523249eba67ce6ad4d3cc000482f70f5e18ab449a0d
TheFaceBook.txt
Posted Nov 20, 2004
Authored by Alex Lanstein, Ivo Parashkevov

TheFaceBook is susceptible to multiple cross site scripting flaws.

tags | advisory, xss
SHA-256 | e8602f6f087e56db508594ec635b29de6aac55141c8f005ff868b24087ef3a19
eudora62014.txt
Posted Nov 20, 2004
Authored by Paul Szabo

Eudora 6.2.14 for Windows that was just released is still susceptible to an attachment spoofing vulnerability. Working exploit included.

tags | exploit, spoof
systems | windows
SHA-256 | 40feffee7423a8d9403bc9b62c864111246e0808bd8068c7ab5f09b183a516b9
IPSwitch-IMail-8.13-DELETE.pl
Posted Nov 20, 2004
Authored by Mati Aharoni, Zatlander | Site whitehat.co.il

Remote exploit for the IPSwitch-IMail 8.13 stack overflow in the DELETE command. Successful exploitation binds a shell to port 4444.

tags | exploit, remote, overflow, shell
SHA-256 | 34486ab358c7f8793e3c20cec33de6a9c6baf7c1e07b04a872a23d2c482b2059
Page 3 of 3
Back123Next

File Archive:

July 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jul 1st
    27 Files
  • 2
    Jul 2nd
    10 Files
  • 3
    Jul 3rd
    35 Files
  • 4
    Jul 4th
    27 Files
  • 5
    Jul 5th
    18 Files
  • 6
    Jul 6th
    0 Files
  • 7
    Jul 7th
    0 Files
  • 8
    Jul 8th
    28 Files
  • 9
    Jul 9th
    44 Files
  • 10
    Jul 10th
    24 Files
  • 11
    Jul 11th
    25 Files
  • 12
    Jul 12th
    11 Files
  • 13
    Jul 13th
    0 Files
  • 14
    Jul 14th
    0 Files
  • 15
    Jul 15th
    0 Files
  • 16
    Jul 16th
    0 Files
  • 17
    Jul 17th
    0 Files
  • 18
    Jul 18th
    0 Files
  • 19
    Jul 19th
    0 Files
  • 20
    Jul 20th
    0 Files
  • 21
    Jul 21st
    0 Files
  • 22
    Jul 22nd
    0 Files
  • 23
    Jul 23rd
    0 Files
  • 24
    Jul 24th
    0 Files
  • 25
    Jul 25th
    0 Files
  • 26
    Jul 26th
    0 Files
  • 27
    Jul 27th
    0 Files
  • 28
    Jul 28th
    0 Files
  • 29
    Jul 29th
    0 Files
  • 30
    Jul 30th
    0 Files
  • 31
    Jul 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close