exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 25 of 100 RSS Feed

Files

C Language Reverse Shell Generator
Posted Jul 5, 2022
Authored by Raed Ahsan

This is a C language reverse shell generator that is written in Python.

tags | tool, shell, rootkit, python
systems | unix
SHA-256 | 5dd358c97fb9c1f37b759fb43edddae386016d7945cc7d063e37b7e28f9e337f

Related Files

Covid 19 Travel Pass Management System 1.0 SQL Injection
Posted May 2, 2022
Authored by nu11secur1ty

Covid 19 Travel Pass Management System version 1.0 suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | 8c232ce0a1da7fa75903ca2807d34366340d6c85780e027ddfaa612d65d60aea
Covid-19 Directory On Vaccination System 1.0 SQL Injection
Posted Mar 28, 2022
Authored by Hejap Zairy

Covid-19 Directory on Vaccination System version 1.0 suffers from multiple remote SQL injection vulnerabilities. This research was submitted on the same day Packet Storm received similar findings from Saud Alenazi.

tags | exploit, remote, vulnerability, sql injection
SHA-256 | e48dbf027b0b4419ae063d8e8f6f74a5ea759c8c8d62182c1e548e4c07416b36
Covid-19 Directory On Vaccination System 1.0 SQL Injection
Posted Mar 28, 2022
Authored by Saud Alenazi

Covid-19 Directory on Vaccination System version 1.0 suffers from multiple remote SQL injection vulnerabilities. This research was submitted on the same day Packet Storm received similar findings from Hejap Zairy.

tags | exploit, remote, vulnerability, sql injection
SHA-256 | af74de0ddf754cd0ccfd343220ae4740c7b2b0e5648cd2c45a23dcfa4a112553
c0c0n 2020 Call For Papers
Posted Nov 15, 2019
Site is-ra.org

The c0c0n 2020 Middle East call for papers has been announced. It will take place June 15th through the 18th, 2020 at the St. Regis in Abu Dhabi.

tags | paper, conference
SHA-256 | be01899210382405d9d5da8b0e0fed33327e4fd0108067490e6f176ae60e4cec
c0c0n 2019 Call For Papers
Posted Apr 5, 2019
Site is-ra.org

The c0c0n 2019 call for papers has been announced. It will take place September 25th through the 28th, 2019 at the Grand Hyatt, Kochi (Cochin), Kerala, India.

tags | paper, conference
SHA-256 | be8843635d53aade8031d3091d8811f1ca770e66cc38dbc3a43c4447928bf48d
C4G Basic Laboratory Information System (BLIS) 3.4 SQL Injection
Posted Feb 21, 2019
Authored by Carlos Avila

C4G Basic Laboratory Information System (BLIS) version 3.4 suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | 105a483e409804b0fff0748e498f8c46b68c513d439a743dd34f7fe6876f970f
c0c0n 2018 Call For Papers
Posted Mar 19, 2018
Site is-ra.org

The c0c0n 2018 call for papers has been announced. It will take place October 3rd through the 6th, 2018 at the Grand Hyatt, Kochi (Cochin), Kerala, India.

tags | paper, conference
SHA-256 | 76cd0e30653fec16387e09848e48a7c13cab82ddb686912c072d2d17291f62ad
c0c0n 2017 Call For Papers
Posted Apr 13, 2017
Site is-ra.org

The c0c0n 2017 call for papers has been announced. It will take place August 17th through the 19th, 2017 at Le Meridien, Kochi (Cochin), Kerala, India

tags | paper, conference
SHA-256 | 5e42b65f016f7e2b1cc8bee83f7fef72bcf990228cb29cdcd57ecb1df8e21a9b
C2S DVR Management Credential Disclosure / Authentication Bypass
Posted Aug 20, 2016
Authored by Yakir Wizman

C2S types IRDOME-II-C2S, IRBOX-II-C2S, and DVR suffer from remote credential disclosure and authentication bypass vulnerabilities.

tags | exploit, remote, vulnerability, bypass, info disclosure
SHA-256 | e73e89f000fcdea1c330da9b5c60fde2f83706e600950d25d0e7c67d5a83009d
C2Box 4.0.0(r19171) Validation Bypass
Posted Mar 28, 2016
Authored by Harish Ramadoss

C2Box versions 4.0.0(r19171) and below suffer from a validation bypass vulnerability.

tags | exploit, bypass
advisories | CVE-2015-4626
SHA-256 | bc375d41b3055dd7d57b4dcb888c8376a80e14b7eb5b23111b255db7bf853cad
C4 Conference Call For Papers
Posted Oct 26, 2015
Authored by CFP C4CON

C4CON 2015 has announced its call for papers. It will take place in Chile.

tags | paper, conference
SHA-256 | 346fa3484e36a672e30417e6568c47cea1ce7a8e0bf413e95a1cfcc65cdf2112
C2Box 4.0.0 r19171 Cross Site Request Forgery
Posted Jun 28, 2015
Authored by Wissam Bashour

C2Box version 4.0.0 r19171 suffers from a cross site request forgery vulnerability.

tags | exploit, csrf
advisories | CVE-2015-4460
SHA-256 | 3260a9f8f243512939cde597aee57f84fbc49ba76f322ad99d963ca8720153cc
C99.php Shell Authentication Bypass
Posted Jul 10, 2014
Authored by Mandat0ry

C99 shells suffers from an authentication bypass vulnerability due to a simple backdoor.

tags | exploit, shell, bypass
SHA-256 | 554dae55ff26f69f50b253292782ae555b3c7c278d639da9e686c98d4a5ea194
c0c0n 2014 Call For Papers
Posted Mar 25, 2014
Site is-ra.org

The c0c0n 2014 call for papers has been announced. It will take place August 22nd through the 23rd, 2014 in Cochin, India.

tags | paper, conference
SHA-256 | 7dc5a5d889fcb04585b16b79bd6a8af8c473227390d5703e0a0fbe23582fbab3
C2C Forward Auction Center SQL Injection
Posted Dec 14, 2013
Authored by R3d-D3v!L

C2C Forward Auction Creator version 2.0 suffers a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | ae31cd335ed87386bcafdb14fe024120d0f470311e5145ece776f00d8bebba93
Evernote Android Multiple PIN Related Issues
Posted Dec 13, 2013
Authored by Chris John Riley

Evernote for Android suffers from insecure storage of PIN data and bypass of PIN protection vulnerabilities.

tags | advisory, vulnerability
advisories | CVE-2013-5112
SHA-256 | d4ec90670f420f077afc1f1d13f17cf6aed8381fff2d28c4df4a6c42bd1b8f2a
Evernote Android Insecure Password Change
Posted Dec 13, 2013
Authored by Chris John Riley

Evernote on Android can have its one-click setup functionality leveraged maliciously to change a user's password without their knowledge.

tags | advisory
advisories | CVE-2013-5116
SHA-256 | ba18b28f54ca2d88cea8523c0e775b385fed288a3a06b92f0fd87c5eef2e2283
c0c0n 2013 Call For Papers
Posted Apr 6, 2013
Site is-ra.org

The c0c0n 2013 call for papers has been announced. It will take place August 22nd through the 24th, 2013 in Cochin, India.

tags | paper, conference
SHA-256 | 2c578fe9fee1947f831599bea7142daf70954b0cb1a6536b87ebb8a328d8c572
C4kurdGroup CMS SQL Injection
Posted Apr 13, 2012
Authored by Net.Edit0r, BHG Security Center, Tak.fanar

C4kurdGroup CMS suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | 50cda04219b02a5c7bb4e5b0665becea0a288369ec91973a74dd4e3af3014838
c0c0n 2012 Call For Papers
Posted Mar 18, 2012
Site is-ra.org

The c0c0n 2012 call for papers has been announced. It will take place August 2nd through the 4th, 2012 in Cochin, India.

tags | paper, conference
SHA-256 | 68c437816cf3ca996d3838183f62c57e058067696a0f5a71106026c12ce4abd0
Icona SpA C6 Messenger Downloader Arbitrary File Download / Execute
Posted Feb 3, 2012
Authored by juan vazquez, Nine:Situations:Group::SnoopyAssault | Site metasploit.com

This Metasploit module exploits a vulnerability in Icona SpA C6 Messenger version 1.0.0.1. The vulnerability is in the Downloader ActiveX Control (DownloaderActiveX.ocx). The insecure control can be abused to download and execute arbitrary files in the context of the currently logged-on user.

tags | exploit, arbitrary, activex
advisories | CVE-2008-2551, OSVDB-45960
SHA-256 | 5ff82482c6d0cc8cb96eb23172d540f4d5ded54210dbc21fe3ea60715403632a
CA Arcserve D2D GWT RPC Credential Information Disclosure
Posted Aug 2, 2011
Authored by rgod, bannedit | Site metasploit.com

This Metasploit module exploits an information disclosure vulnerability in the CA Arcserve D2D r15 web server. The information disclosure can be triggered by sending a specially crafted RPC request to the homepage servlet. This causes CA Arcserve to disclosure the username and password in cleartext used for authentication. This username and password pair are Windows credentials with Administrator access.

tags | exploit, web, info disclosure
systems | windows
SHA-256 | 7c8e30e3bf5a9fd18f843efebdc225b819266ca4ca82d428c51238a4afa9d1c6
C99Shell 1.0 Cross Site Scripting
Posted Jan 20, 2010
Authored by indoushka

C99Shell version 1.0 pre-release build 16 suffers from cross site scripting vulnerabilities.

tags | exploit, vulnerability, xss
SHA-256 | d6ff6b592e75b1cb28edb40514da0aa5a1b8801f3471fa8f86cfd0ba3edbb773
Computer Associates ARCserve REPORTREMOTEEXECUTECML Buffer Overflow
Posted Dec 31, 2009
Authored by MC, Nahuel Cayento Riva | Site metasploit.com

This Metasploit module exploits a buffer overflow in Computer Associates BrighStor ARCserve r11.5 (build 3884). By sending a specially crafted RPC request to opcode 0x342, an attacker could overflow the buffer and execute arbitrary code. In order to successfully exploit this vulnerability, you will need set the hostname argument (HNAME).

tags | exploit, overflow, arbitrary
advisories | CVE-2008-4397
SHA-256 | 25561774611f62f76340df5f53273f88999603ab3128927abfd951eddc17dd28
CA BrightStor ARCserve Backup AddColumn() ActiveX Buffer Overflow
Posted Nov 26, 2009
Authored by dean | Site metasploit.com

The CA BrightStor ARCserve Backup ActiveX control (ListCtrl.ocx) is vulnerable to a stack-based buffer overflow. By passing an overly long argument to the AddColumn() method, a remote attacker could overflow a buffer and execute arbitrary code on the system.

tags | exploit, remote, overflow, arbitrary, activex
advisories | CVE-2008-1472
SHA-256 | deda324d5d17fb5a0a5f8b8fcc9d39b55328a2faeca975767d3d6875b67d01d1
Page 1 of 4
Back1234Next

File Archive:

September 2022

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Sep 1st
    23 Files
  • 2
    Sep 2nd
    12 Files
  • 3
    Sep 3rd
    0 Files
  • 4
    Sep 4th
    0 Files
  • 5
    Sep 5th
    10 Files
  • 6
    Sep 6th
    8 Files
  • 7
    Sep 7th
    30 Files
  • 8
    Sep 8th
    14 Files
  • 9
    Sep 9th
    26 Files
  • 10
    Sep 10th
    0 Files
  • 11
    Sep 11th
    0 Files
  • 12
    Sep 12th
    5 Files
  • 13
    Sep 13th
    28 Files
  • 14
    Sep 14th
    15 Files
  • 15
    Sep 15th
    17 Files
  • 16
    Sep 16th
    9 Files
  • 17
    Sep 17th
    0 Files
  • 18
    Sep 18th
    0 Files
  • 19
    Sep 19th
    12 Files
  • 20
    Sep 20th
    15 Files
  • 21
    Sep 21st
    20 Files
  • 22
    Sep 22nd
    13 Files
  • 23
    Sep 23rd
    12 Files
  • 24
    Sep 24th
    0 Files
  • 25
    Sep 25th
    0 Files
  • 26
    Sep 26th
    30 Files
  • 27
    Sep 27th
    27 Files
  • 28
    Sep 28th
    0 Files
  • 29
    Sep 29th
    0 Files
  • 30
    Sep 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Hosting By
Rokasec
close