exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 26 - 32 of 32 RSS Feed

Files Date: 2005-11-04 to 2005-11-05

CuteNews1.4.1.txt
Posted Nov 4, 2005
Authored by rgod | Site retrogod.altervista.org

CuteNews 1.4.1 Arbitrary file inclusion and remote code execution exploit.

tags | exploit, remote, arbitrary, code execution, file inclusion
SHA-256 | b914cc41173788699408b2682073f31a26b0ddf39c5b0e48e606a6b8ae4d6665
coarseknocking-0.0.2.tar.gz
Posted Nov 4, 2005
Authored by Andre Luiz Rodrigues Ferreira | Site coarseknocking.sourceforge.net

This is a simple implementation of Port Knocking techniques. It sniffs network packets looking for predetermined keys and executes commands to open and close ports on the firewall. In the client mode it injects packets with the key to server.

tags | tool, scanner
systems | unix
SHA-256 | 95e588790aa423059221be1e0e1337e75a7ed8a2cda22435c4fbbb9aac09dc04
mtype-3.16.txt
Posted Nov 4, 2005
Authored by Tim Brown | Site nth-dimension.org.uk

Movable Type blogging software stores the admin username and password hash in a cookie, leaving the system vulnerable to XSS.

tags | advisory
SHA-256 | e717f6c404ec08c8a538f3e595e63353134ba9c9d6f6977e7706f15dd003b701
StackBasedOverflows-Windows-Part2.pdf
Posted Nov 4, 2005
Authored by Nish Bhalla | Site securitycompass.com

Writing Stack Based Overflows on Windows - Part II: Windows Assembly for writing Exploits

tags | paper, overflow
systems | windows
SHA-256 | 458ebf2f8f50c0249db41a0f2babf0e9c981f7c972089ff9b19153fd0210a5ff
StackBasedOverflows-Windows-Part1.pdf
Posted Nov 4, 2005
Authored by Nish Bhalla | Site securitycompass.com

Writing Stack Based Overflows on Windows - Part I: Basic Concepts

tags | paper, overflow
systems | windows
SHA-256 | f2eded9aca3088ea4d10a3faf846a8d5c7b7d77f76c4957ad9691750d63e1c75
ssf.zip
Posted Nov 4, 2005
Authored by Tobias Glemser | Site security-scans.de

Sip Send Fun version 0.2 - a tool to exploit the various weakness in VoIP-Phones. Written in php.

tags | spoof, php
SHA-256 | 4caf3015d8abe09a2efcfb6068961af9f04ed3f7fd73754ebd4bd8ca6b17394a
mambo-4.5.2.3.txt
Posted Nov 4, 2005
Authored by trueend5 | Site irannetjob.com

Mambo versions 4.5.2.3, 4.5.2.2, 4.5.2.1, 4.5.2 suffer from a path disclosure vulnerability via a specially crafted url.

tags | advisory
SHA-256 | 57f70dae3c661dfcc4fda834e1ece2567e5eb94330ef99f18e07214cdb9a1955
Page 2 of 2
Back12Next

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close