exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 5 of 5 RSS Feed

Files Date: 2004-03-31

adder-0.3.3-src.zip
Posted Mar 31, 2004
Authored by Oliver Lavery

Adder is a tool used for experimentation with runtime modification of binary applications. It's also useful for prototyping run-time patches, understanding the effects and possibilities of call-hooking, and other run-time program tweaks. Definitely worth a download and something to play with.

tags | tool
systems | unix
SHA-256 | d9e1ecaf634b16b0e423b5eed19f67677b9a47f0530ec32ecc87384e86f0c7cf
wilco.zip
Posted Mar 31, 2004
Authored by Luigi Auriemma | Site aluigi.altervista.org

A testing tool for RogerWilco versions 1.4.1.6 and below and RogerWilco Base Station versions 0.30a that suffer from multiple bugs.

tags | exploit
SHA-256 | 14c6e5ed23cc0c634f1bc2f64b1c2e52542ccfb2535f2b0a11d8230fe7a7b9f7
rogerwilco2.txt
Posted Mar 31, 2004
Authored by Luigi Auriemma | Site aluigi.altervista.org

RogerWilco versions 1.4.1.6 and below and RogerWilco Base Station versions 0.30a suffer from multiple bugs. From being crashed with a malformed UDP packet to spoofing 'voice' traffic when not even being connected to a channel, quite a few amusing problems are listed.

tags | advisory, udp, spoof
SHA-256 | 22ab3fb2653158c6541bf495cfa5519f2bf1f7f1d2a4c897d0324b8762076abc
ieBad.txt
Posted Mar 31, 2004
Site malware.com

Good write up discussing how Microsoft has yet again dropped the ball on patching another Internet Explorer vulnerability, where using forms can allow an attacker to spoof a fake destination to the user.

tags | exploit, spoof
SHA-256 | 518c6b718d88df9d2c880d83b2441bc75030395324543fe528bc4edcbeffb0c0
Adv-20040331.txt
Posted Mar 31, 2004
Authored by Nick Gudov | Site s-quadra.com

S-Quadra Advisory #2004-03-31 - CactuShop shopping cart versions 5.x suffer from a SQL injection attack that allows for remote code execution via the MS SQL xp_cmdshell function. They also have a cross site scripting vulnerability.

tags | exploit, remote, code execution, xss, sql injection
SHA-256 | d6c5fc742f5d4a4adf31b6ea32e79a6ba6bdfbf8a51f4d9d2fa1268682a60811
Page 1 of 1
Back1Next

File Archive:

November 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    30 Files
  • 2
    Nov 2nd
    0 Files
  • 3
    Nov 3rd
    0 Files
  • 4
    Nov 4th
    12 Files
  • 5
    Nov 5th
    44 Files
  • 6
    Nov 6th
    18 Files
  • 7
    Nov 7th
    9 Files
  • 8
    Nov 8th
    8 Files
  • 9
    Nov 9th
    3 Files
  • 10
    Nov 10th
    0 Files
  • 11
    Nov 11th
    14 Files
  • 12
    Nov 12th
    20 Files
  • 13
    Nov 13th
    63 Files
  • 14
    Nov 14th
    18 Files
  • 15
    Nov 15th
    8 Files
  • 16
    Nov 16th
    0 Files
  • 17
    Nov 17th
    0 Files
  • 18
    Nov 18th
    17 Files
  • 19
    Nov 19th
    0 Files
  • 20
    Nov 20th
    0 Files
  • 21
    Nov 21st
    0 Files
  • 22
    Nov 22nd
    0 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    0 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    0 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close