exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 26 - 50 of 58 RSS Feed

Files

osCommerce Error-based SQL Injection
Posted May 3, 2017
Authored by Project Insecurity, MLT | Site insecurity.zone

TemplateMonster osCommerce prior to version 2.3x suffers from an error-based SQL injection vulnerability.

tags | exploit, web, vulnerability, sql injection
SHA-256 | 38a0fda4c724cdbc0647c49a836ea0b337317dd4887ab047e366bf56eaec7836

Related Files

Trend Micro Mobile Security Man-In-The-Middle
Posted May 11, 2016
Authored by David Coomber

Trend Micro Mobile Security iOS application versions 3.1.1034 and below fail to validate the SSL certificate it receives when connecting to the mobile application login server.

tags | advisory
systems | ios
advisories | CVE-2016-3664
SHA-256 | e551b1880ff922cd6c0047e14ee549c65dcc283403e2bdbf2f66d2992a0517bc
tmap 0.1
Posted Mar 2, 2015
Authored by TheKingOf9x

tmap is a fast multi-threaded port scanner that tunnels through TOR.

tags | tool, scanner
systems | unix
SHA-256 | db20e08df203cb56e43fdac32a8d5e55b9a58acd729cf037136a8348620e6350
T-Mobile Internet Manager DLL Hijacking
Posted Jan 29, 2015
Authored by metacom

T-Mobile Internet Manager suffers from a DLL hijacking vulnerability.

tags | exploit
systems | windows
SHA-256 | 166dfceb43c6b95cb0dabb5fe01c754f2762e18cdfd8ecf6925606f53ee52fd3
Trend Micro Control Manager 5.5 / 6.0 Blind SQL Injection
Posted Sep 27, 2012
Authored by modpr0be, otoy

Trend Micro Control Manager versions 5.5 and 6.0 suffer from an AdHocQuery remote blind SQL injection vulnerability.

tags | exploit, remote, sql injection
advisories | CVE-2012-2998
SHA-256 | ce96999e810814c024c38533c2b23e3e57c9c4a4b441314fa7e4c4133f539757
Threat Modeling Cloud Applications
Posted Feb 18, 2012
Authored by Scott Matsumoto | Site cigital.com

These are the presentation slides from a talk called Threat Modeling Cloud Applications: What You Don't Know Will Hurt You as presented at the OWASP AppSec USA 2011 conference.

tags | paper
SHA-256 | ca7ed7c83b5ae0d31004acf587fa92652ec54e92efce0b74f1135654c8dcb0a8
Technitium MAC Address Changer
Posted Jan 3, 2012
Authored by Shreyas Zare | Site tmac.technitium.com

Technitium MAC Address Changer allows you to change Media Access Control (MAC) Address of your Network Interface Card (NIC) irrespective to your NIC manufacturer or its driver. It has a very simple user interface and provides ample information regarding each NIC in the machine.

SHA-256 | c52fde9a3517d2d95b182f5a532a23fa0f13f2c771598819114293b01e59681d
T-Mobile Site And Server Security
Posted Aug 2, 2011
Authored by GrahamPhisher

Small write-up discussing various issues with T-Mobile's site and security.

tags | paper
SHA-256 | c85f78d5b785a5673ec6319cd4e213024eb515189ce4bd1e9c0abf0e8a0c23cc
tmux 1.3 / 1.4 Privilege Escalation
Posted Apr 11, 2011
Authored by ph0x90bic

tmux versions 1.3 and 1.4 suffer from a -S option incorrect setgid local privilege escalation vulnerability.

tags | exploit, local
advisories | CVE-2011-1496
SHA-256 | cd885fe8e526cc9f25b3d09ae86f267db6f64ccabdcde1494411eddaa61dea49
Trend Micro Internet Security Pro 2010 Active-X
Posted Nov 18, 2010
Authored by Dr_IDE

Trend Micro Internet Security 2010 Active-X remote exploit that leverages UfPBCtrl.DLL.

tags | exploit, remote, activex
SHA-256 | 20e0e5c29a061662abfb93bf2ab57c0045e3f149baef2042da93e7c456c8c5c4
TMAC For Linux 1.0-Beta
Posted Jun 9, 2010
Authored by Sagar Belure | Site sagar.belure.com

TMAC is a simple bash program for randomly changing the MAC address of a Network Interface Card (NIC) on Linux .

tags | bash
systems | linux, unix
SHA-256 | 4f6a66e27eed698a39d4a2960997b14b9c4eacfb20c36f5e8bd98b842239e67e
T-Mobile Has Been Pwned?
Posted Jun 8, 2009
Authored by pwnmobile

It appears that T-Mobile has been completely compromised.

tags | paper
SHA-256 | 7bcb5a0dff75273a48c53fbf400ff4aea566f65ca948005d957aa27ace4bca2d
TmaxSoft JEUS Alternate Data Streams Vulnerability
Posted Dec 12, 2008
Authored by Simon Ryeo

TmaxSoft JEUS versions below 5:FIX#26 suffer from an alternate data streams vulnerability that allows for remote file disclosure.

tags | exploit, remote
SHA-256 | de38fc496f3023ab7b9fcba54a363ff9c3887065acf78f6c7ebfd45a2ab274c8
tmin-0.04.tar.gz
Posted Jun 19, 2008
Authored by Michal Zalewski | Site code.google.com

tmin is a quick and simple tool to minimize the size and syntax of complex test cases in automated security testing. It is meant specifically for dealing with unknown or complex data formats (without the need to tokenize and re-serialize testcases), and for easy integration with UI testing harnesses.

tags | fuzzer
SHA-256 | f80bf14e4e0e2aef70ffee1065caee30c845ca9dae1448701ff20d7f6853e261
tmin-0.03.tar.gz
Posted Apr 28, 2008
Authored by Michal Zalewski | Site code.google.com

tmin is a quick and simple tool to minimize the size and syntax of complex test cases in automated security testing. It is meant specifically for dealing with unknown or complex data formats (without the need to tokenize and re-serialize testcases), and for easy integration with UI testing harnesses.

tags | fuzzer
SHA-256 | 6fa417edb887bc2a9b30f10caf309c076293186b24d00cd9af098a7243ff02a0
tmvwall381v3_adv.txt
Posted Jan 27, 2007
Authored by Sebastian Wolfgarten

A local buffer overflow vulnerability in the VSAPI library in Trend Micro VirusWall version 3.81 on Linux allows arbitrary code execution and leads to privilege escalation.

tags | advisory, overflow, arbitrary, local, code execution
systems | linux
SHA-256 | 2c17540c6c33d93e818379d4381bc07d96560541c42d1a823b05b1f8a97aec8a
tmvwall381v3_exp.c
Posted Jan 27, 2007
Authored by Sebastian Wolfgarten

Local root exploit for vscan/VSAPI in Trend Micro VirusWall version 3.81 on Linux.

tags | exploit, local, root
systems | linux
SHA-256 | 9d755b5bafb1a729d747106a19b5bdf4cf329021970131996e1098b977f41310
tm-20061111-0.tar.gz
Posted Nov 16, 2006
Authored by TU Munich, TU Berlin, ICSI | Site net.t-labs.tu-berlin.de

The timemachine can record the entire contents of a high-volume network traffic stream in order to later "travel back in time" and inspect activity that has only become interesting in retrospect. Two examples of use are security forensics (determining just how an attacker compromised a given machine) and network trouble-shooting, such as inspecting the precursors to a fault after the fault. The timemachine is designed to work in Gigabit environments and to store several days of network traffic.

tags | tool, sniffer
SHA-256 | d1c8b279cc9d1626bd858e6e908c26b6074c5828b4bfd6353908545a1e7abc72
TMCM-XSS.txt
Posted Jun 27, 2006
Authored by Darren Bounds

The Trend Micro Control Manager is vulnerable to a persistent, unauthenticated cross site scripting attack. Version 3.5 is affected. Earlier versions may also be affected.

tags | advisory, xss
SHA-256 | c3d1d3bbbf78085ec649a55ccb2a77773e6db22a4402d09da1ae786cd449f05e
tmpwatch.txt
Posted Dec 21, 2002
Authored by Michal Zalewski | Site lcamtuf.coredump.cx

Common use of 'tmpwatch' utility and its counterparts triggers race conditions in many applications, sometimes allowing privilege escalation. Includes information on races, file removal, fixes, and more.

tags | paper
systems | unix
SHA-256 | b15d4299f68a0564b2dbf1976f2695381bb7cba4b78e5f66221c135ce941492e
tmpmail.zip
Posted Aug 26, 2002

SunOS binmail script.

tags | bbs
systems | solaris
SHA-256 | 95f567254ad22c61869c737f91721f3fa83b6c75706cab357a14301faddbced3
tmpml2.zip
Posted Aug 26, 2002

Another SunOS mail script.

tags | bbs
systems | solaris
SHA-256 | f4ef0909c39da49fb123e77c4057fab38faaa8c40b44c3d98e1dd356cdfa657f
tmake.zip
Posted Aug 26, 2002

The Trojanizer.. Turns shit into Trojan

tags | trojan, bbs
SHA-256 | e9829620dd4ce50fcf34abf0388049ed544bcc48237b7fcc47e5fd42b7183e98
tm421-1.zip
Posted Aug 26, 2002

TELEMATE 4.21, Powerful comm program, 1 of 4

tags | bbs
SHA-256 | 8e15575cdeb34910d726f92e08f737e31b1a8c58b433d4f0cab73d8c590f67f9
tm421-2.zip
Posted Aug 26, 2002

TELEMATE 4.21, Powerful comm program, 2 of 4

tags | bbs
SHA-256 | c4c333b2f59dc98ebcadde866ff532690898f6c8466c591c0bd64afc6d314b7a
tm421-3.zip
Posted Aug 26, 2002

TELEMATE 4.21, Powerful comm program, 3 of 4

tags | bbs
SHA-256 | 9d0ae9a988e31b484750c1ef6af978bc009cd51185e4314a5fd6bcc4c7f04350
Page 2 of 3
Back123Next

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    0 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    0 Files
  • 16
    Apr 16th
    0 Files
  • 17
    Apr 17th
    0 Files
  • 18
    Apr 18th
    0 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close