exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 26 - 32 of 32 RSS Feed

Files Date: 2005-11-04 to 2005-11-05

CuteNews1.4.1.txt
Posted Nov 4, 2005
Authored by rgod | Site retrogod.altervista.org

CuteNews 1.4.1 Arbitrary file inclusion and remote code execution exploit.

tags | exploit, remote, arbitrary, code execution, file inclusion
SHA-256 | b914cc41173788699408b2682073f31a26b0ddf39c5b0e48e606a6b8ae4d6665
coarseknocking-0.0.2.tar.gz
Posted Nov 4, 2005
Authored by Andre Luiz Rodrigues Ferreira | Site coarseknocking.sourceforge.net

This is a simple implementation of Port Knocking techniques. It sniffs network packets looking for predetermined keys and executes commands to open and close ports on the firewall. In the client mode it injects packets with the key to server.

tags | tool, scanner
systems | unix
SHA-256 | 95e588790aa423059221be1e0e1337e75a7ed8a2cda22435c4fbbb9aac09dc04
mtype-3.16.txt
Posted Nov 4, 2005
Authored by Tim Brown | Site nth-dimension.org.uk

Movable Type blogging software stores the admin username and password hash in a cookie, leaving the system vulnerable to XSS.

tags | advisory
SHA-256 | e717f6c404ec08c8a538f3e595e63353134ba9c9d6f6977e7706f15dd003b701
StackBasedOverflows-Windows-Part2.pdf
Posted Nov 4, 2005
Authored by Nish Bhalla | Site securitycompass.com

Writing Stack Based Overflows on Windows - Part II: Windows Assembly for writing Exploits

tags | paper, overflow
systems | windows
SHA-256 | 458ebf2f8f50c0249db41a0f2babf0e9c981f7c972089ff9b19153fd0210a5ff
StackBasedOverflows-Windows-Part1.pdf
Posted Nov 4, 2005
Authored by Nish Bhalla | Site securitycompass.com

Writing Stack Based Overflows on Windows - Part I: Basic Concepts

tags | paper, overflow
systems | windows
SHA-256 | f2eded9aca3088ea4d10a3faf846a8d5c7b7d77f76c4957ad9691750d63e1c75
ssf.zip
Posted Nov 4, 2005
Authored by Tobias Glemser | Site security-scans.de

Sip Send Fun version 0.2 - a tool to exploit the various weakness in VoIP-Phones. Written in php.

tags | spoof, php
SHA-256 | 4caf3015d8abe09a2efcfb6068961af9f04ed3f7fd73754ebd4bd8ca6b17394a
mambo-4.5.2.3.txt
Posted Nov 4, 2005
Authored by trueend5 | Site irannetjob.com

Mambo versions 4.5.2.3, 4.5.2.2, 4.5.2.1, 4.5.2 suffer from a path disclosure vulnerability via a specially crafted url.

tags | advisory
SHA-256 | 57f70dae3c661dfcc4fda834e1ece2567e5eb94330ef99f18e07214cdb9a1955
Page 2 of 2
Back12Next

File Archive:

November 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    30 Files
  • 2
    Nov 2nd
    0 Files
  • 3
    Nov 3rd
    0 Files
  • 4
    Nov 4th
    12 Files
  • 5
    Nov 5th
    44 Files
  • 6
    Nov 6th
    18 Files
  • 7
    Nov 7th
    9 Files
  • 8
    Nov 8th
    8 Files
  • 9
    Nov 9th
    3 Files
  • 10
    Nov 10th
    0 Files
  • 11
    Nov 11th
    14 Files
  • 12
    Nov 12th
    20 Files
  • 13
    Nov 13th
    69 Files
  • 14
    Nov 14th
    0 Files
  • 15
    Nov 15th
    0 Files
  • 16
    Nov 16th
    0 Files
  • 17
    Nov 17th
    0 Files
  • 18
    Nov 18th
    0 Files
  • 19
    Nov 19th
    0 Files
  • 20
    Nov 20th
    0 Files
  • 21
    Nov 21st
    0 Files
  • 22
    Nov 22nd
    0 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    0 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    0 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close