exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 25 of 100 RSS Feed

Files

C Language Reverse Shell Generator
Posted Jul 5, 2022
Authored by Raed Ahsan

This is a C language reverse shell generator that is written in Python.

tags | tool, shell, rootkit, python
systems | unix
SHA-256 | 5dd358c97fb9c1f37b759fb43edddae386016d7945cc7d063e37b7e28f9e337f

Related Files

C3iM CMS 2.0 Cross Site Scripting
Posted Jul 10, 2023
Authored by indoushka

C3iM CMS version 2.0 suffers from a cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | b5059cee680da6b4b2504e783f5f210bcfd0f8d2a42fb0c8b729a61a89fa5d99
Covid 19 Travel Pass Management System 1.0 SQL Injection
Posted May 2, 2022
Authored by nu11secur1ty

Covid 19 Travel Pass Management System version 1.0 suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | 8c232ce0a1da7fa75903ca2807d34366340d6c85780e027ddfaa612d65d60aea
Covid-19 Directory On Vaccination System 1.0 SQL Injection
Posted Mar 28, 2022
Authored by Hejap Zairy

Covid-19 Directory on Vaccination System version 1.0 suffers from multiple remote SQL injection vulnerabilities. This research was submitted on the same day Packet Storm received similar findings from Saud Alenazi.

tags | exploit, remote, vulnerability, sql injection
SHA-256 | e48dbf027b0b4419ae063d8e8f6f74a5ea759c8c8d62182c1e548e4c07416b36
Covid-19 Directory On Vaccination System 1.0 SQL Injection
Posted Mar 28, 2022
Authored by Saud Alenazi

Covid-19 Directory on Vaccination System version 1.0 suffers from multiple remote SQL injection vulnerabilities. This research was submitted on the same day Packet Storm received similar findings from Hejap Zairy.

tags | exploit, remote, vulnerability, sql injection
SHA-256 | af74de0ddf754cd0ccfd343220ae4740c7b2b0e5648cd2c45a23dcfa4a112553
c0c0n 2020 Call For Papers
Posted Nov 15, 2019
Site is-ra.org

The c0c0n 2020 Middle East call for papers has been announced. It will take place June 15th through the 18th, 2020 at the St. Regis in Abu Dhabi.

tags | paper, conference
SHA-256 | be01899210382405d9d5da8b0e0fed33327e4fd0108067490e6f176ae60e4cec
c0c0n 2019 Call For Papers
Posted Apr 5, 2019
Site is-ra.org

The c0c0n 2019 call for papers has been announced. It will take place September 25th through the 28th, 2019 at the Grand Hyatt, Kochi (Cochin), Kerala, India.

tags | paper, conference
SHA-256 | be8843635d53aade8031d3091d8811f1ca770e66cc38dbc3a43c4447928bf48d
C4G Basic Laboratory Information System (BLIS) 3.4 SQL Injection
Posted Feb 21, 2019
Authored by Carlos Avila

C4G Basic Laboratory Information System (BLIS) version 3.4 suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | 105a483e409804b0fff0748e498f8c46b68c513d439a743dd34f7fe6876f970f
c0c0n 2018 Call For Papers
Posted Mar 19, 2018
Site is-ra.org

The c0c0n 2018 call for papers has been announced. It will take place October 3rd through the 6th, 2018 at the Grand Hyatt, Kochi (Cochin), Kerala, India.

tags | paper, conference
SHA-256 | 76cd0e30653fec16387e09848e48a7c13cab82ddb686912c072d2d17291f62ad
c0c0n 2017 Call For Papers
Posted Apr 13, 2017
Site is-ra.org

The c0c0n 2017 call for papers has been announced. It will take place August 17th through the 19th, 2017 at Le Meridien, Kochi (Cochin), Kerala, India

tags | paper, conference
SHA-256 | 5e42b65f016f7e2b1cc8bee83f7fef72bcf990228cb29cdcd57ecb1df8e21a9b
C2S DVR Management Credential Disclosure / Authentication Bypass
Posted Aug 20, 2016
Authored by Yakir Wizman

C2S types IRDOME-II-C2S, IRBOX-II-C2S, and DVR suffer from remote credential disclosure and authentication bypass vulnerabilities.

tags | exploit, remote, vulnerability, bypass, info disclosure
SHA-256 | e73e89f000fcdea1c330da9b5c60fde2f83706e600950d25d0e7c67d5a83009d
C2Box 4.0.0(r19171) Validation Bypass
Posted Mar 28, 2016
Authored by Harish Ramadoss

C2Box versions 4.0.0(r19171) and below suffer from a validation bypass vulnerability.

tags | exploit, bypass
advisories | CVE-2015-4626
SHA-256 | bc375d41b3055dd7d57b4dcb888c8376a80e14b7eb5b23111b255db7bf853cad
C4 Conference Call For Papers
Posted Oct 26, 2015
Authored by CFP C4CON

C4CON 2015 has announced its call for papers. It will take place in Chile.

tags | paper, conference
SHA-256 | 346fa3484e36a672e30417e6568c47cea1ce7a8e0bf413e95a1cfcc65cdf2112
C2Box 4.0.0 r19171 Cross Site Request Forgery
Posted Jun 28, 2015
Authored by Wissam Bashour

C2Box version 4.0.0 r19171 suffers from a cross site request forgery vulnerability.

tags | exploit, csrf
advisories | CVE-2015-4460
SHA-256 | 3260a9f8f243512939cde597aee57f84fbc49ba76f322ad99d963ca8720153cc
C99.php Shell Authentication Bypass
Posted Jul 10, 2014
Authored by Mandat0ry

C99 shells suffers from an authentication bypass vulnerability due to a simple backdoor.

tags | exploit, shell, bypass
SHA-256 | 554dae55ff26f69f50b253292782ae555b3c7c278d639da9e686c98d4a5ea194
c0c0n 2014 Call For Papers
Posted Mar 25, 2014
Site is-ra.org

The c0c0n 2014 call for papers has been announced. It will take place August 22nd through the 23rd, 2014 in Cochin, India.

tags | paper, conference
SHA-256 | 7dc5a5d889fcb04585b16b79bd6a8af8c473227390d5703e0a0fbe23582fbab3
C2C Forward Auction Center SQL Injection
Posted Dec 14, 2013
Authored by R3d-D3v!L

C2C Forward Auction Creator version 2.0 suffers a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | ae31cd335ed87386bcafdb14fe024120d0f470311e5145ece776f00d8bebba93
Evernote Android Multiple PIN Related Issues
Posted Dec 13, 2013
Authored by Chris John Riley

Evernote for Android suffers from insecure storage of PIN data and bypass of PIN protection vulnerabilities.

tags | advisory, vulnerability
advisories | CVE-2013-5112
SHA-256 | d4ec90670f420f077afc1f1d13f17cf6aed8381fff2d28c4df4a6c42bd1b8f2a
Evernote Android Insecure Password Change
Posted Dec 13, 2013
Authored by Chris John Riley

Evernote on Android can have its one-click setup functionality leveraged maliciously to change a user's password without their knowledge.

tags | advisory
advisories | CVE-2013-5116
SHA-256 | ba18b28f54ca2d88cea8523c0e775b385fed288a3a06b92f0fd87c5eef2e2283
c0c0n 2013 Call For Papers
Posted Apr 6, 2013
Site is-ra.org

The c0c0n 2013 call for papers has been announced. It will take place August 22nd through the 24th, 2013 in Cochin, India.

tags | paper, conference
SHA-256 | 2c578fe9fee1947f831599bea7142daf70954b0cb1a6536b87ebb8a328d8c572
C4kurdGroup CMS SQL Injection
Posted Apr 13, 2012
Authored by Net.Edit0r, BHG Security Center, Tak.fanar

C4kurdGroup CMS suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | 50cda04219b02a5c7bb4e5b0665becea0a288369ec91973a74dd4e3af3014838
c0c0n 2012 Call For Papers
Posted Mar 18, 2012
Site is-ra.org

The c0c0n 2012 call for papers has been announced. It will take place August 2nd through the 4th, 2012 in Cochin, India.

tags | paper, conference
SHA-256 | 68c437816cf3ca996d3838183f62c57e058067696a0f5a71106026c12ce4abd0
Icona SpA C6 Messenger Downloader Arbitrary File Download / Execute
Posted Feb 3, 2012
Authored by juan vazquez, Nine:Situations:Group::SnoopyAssault | Site metasploit.com

This Metasploit module exploits a vulnerability in Icona SpA C6 Messenger version 1.0.0.1. The vulnerability is in the Downloader ActiveX Control (DownloaderActiveX.ocx). The insecure control can be abused to download and execute arbitrary files in the context of the currently logged-on user.

tags | exploit, arbitrary, activex
advisories | CVE-2008-2551, OSVDB-45960
SHA-256 | 5ff82482c6d0cc8cb96eb23172d540f4d5ded54210dbc21fe3ea60715403632a
CA Arcserve D2D GWT RPC Credential Information Disclosure
Posted Aug 2, 2011
Authored by rgod, bannedit | Site metasploit.com

This Metasploit module exploits an information disclosure vulnerability in the CA Arcserve D2D r15 web server. The information disclosure can be triggered by sending a specially crafted RPC request to the homepage servlet. This causes CA Arcserve to disclosure the username and password in cleartext used for authentication. This username and password pair are Windows credentials with Administrator access.

tags | exploit, web, info disclosure
systems | windows
SHA-256 | 7c8e30e3bf5a9fd18f843efebdc225b819266ca4ca82d428c51238a4afa9d1c6
C99Shell 1.0 Cross Site Scripting
Posted Jan 20, 2010
Authored by indoushka

C99Shell version 1.0 pre-release build 16 suffers from cross site scripting vulnerabilities.

tags | exploit, vulnerability, xss
SHA-256 | d6ff6b592e75b1cb28edb40514da0aa5a1b8801f3471fa8f86cfd0ba3edbb773
Computer Associates ARCserve REPORTREMOTEEXECUTECML Buffer Overflow
Posted Dec 31, 2009
Authored by MC, Nahuel Cayento Riva | Site metasploit.com

This Metasploit module exploits a buffer overflow in Computer Associates BrighStor ARCserve r11.5 (build 3884). By sending a specially crafted RPC request to opcode 0x342, an attacker could overflow the buffer and execute arbitrary code. In order to successfully exploit this vulnerability, you will need set the hostname argument (HNAME).

tags | exploit, overflow, arbitrary
advisories | CVE-2008-4397
SHA-256 | 25561774611f62f76340df5f53273f88999603ab3128927abfd951eddc17dd28
Page 1 of 4
Back1234Next

File Archive:

July 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jul 1st
    27 Files
  • 2
    Jul 2nd
    10 Files
  • 3
    Jul 3rd
    35 Files
  • 4
    Jul 4th
    27 Files
  • 5
    Jul 5th
    18 Files
  • 6
    Jul 6th
    0 Files
  • 7
    Jul 7th
    0 Files
  • 8
    Jul 8th
    28 Files
  • 9
    Jul 9th
    44 Files
  • 10
    Jul 10th
    24 Files
  • 11
    Jul 11th
    25 Files
  • 12
    Jul 12th
    11 Files
  • 13
    Jul 13th
    0 Files
  • 14
    Jul 14th
    0 Files
  • 15
    Jul 15th
    28 Files
  • 16
    Jul 16th
    6 Files
  • 17
    Jul 17th
    34 Files
  • 18
    Jul 18th
    0 Files
  • 19
    Jul 19th
    0 Files
  • 20
    Jul 20th
    0 Files
  • 21
    Jul 21st
    0 Files
  • 22
    Jul 22nd
    0 Files
  • 23
    Jul 23rd
    0 Files
  • 24
    Jul 24th
    0 Files
  • 25
    Jul 25th
    0 Files
  • 26
    Jul 26th
    0 Files
  • 27
    Jul 27th
    0 Files
  • 28
    Jul 28th
    0 Files
  • 29
    Jul 29th
    0 Files
  • 30
    Jul 30th
    0 Files
  • 31
    Jul 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close