exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 5 of 5 RSS Feed

Files from Collin Mulliner

Email addresscollin.mulliner at sit.fraunhofer.de
First Active2006-08-27
Last Active2009-06-19
Nokia Denial Of Service / Spoofing
Posted Jun 19, 2009
Authored by Collin Mulliner

The Nokia 6212 Classic suffers from denial of service and URL spoofing vulnerabilities.

tags | advisory, denial of service, spoof, vulnerability
SHA-256 | f924130f46c774dfe95a5814310493331cfaa964f415837fbb22a8db6ce22bd6
iPhone Safari Phone Auto Dial
Posted Jun 19, 2009
Authored by Collin Mulliner

Safari on the Apple iPhone suffers from a vulnerability that allows an attacker to auto-dial a number.

tags | exploit
systems | apple, iphone
SHA-256 | 750d96b2e5b025f4f460cec5ea7897e6f417588a419c661fea5d7b95be167b5c
nokia-spoof.txt
Posted Aug 18, 2008
Authored by Collin Mulliner

The Nokia 6131 NFC mobile phone suffers from URI/URL spoofing vulnerabilities.

tags | exploit, spoof, vulnerability
SHA-256 | 56973b2ee36d33e3f30c5601df9e1e0b0815ab273c2f6bdc529634b2c78d9567
raidsonic-disclose.txt
Posted Mar 17, 2008
Authored by Collin Mulliner | Site mulliner.org

RaidSonic version 2.6.0-n stores the encryption key in plain text on an unencrypted partition.

tags | exploit, info disclosure
SHA-256 | 7236f5bb5c52ecb5f0e6dac6ef96f1543f48c62d8f7ac948c37e43a6bc110d9b
pocketpc.txt
Posted Aug 27, 2006
Authored by Collin Mulliner, Prof. Giovanni Vigna

MMS composer versions 1.5.5.6 and 2.0.0.13 suffer from multiple buffer overflows in the MMS parsing code allowing for arbitrary code execution and denial of service conditions.

tags | advisory, denial of service, overflow, arbitrary, code execution
SHA-256 | 85797acd23078e7a0402ffbedbb3a17a3a05d8df947fd121802d1fb83dc94927
Page 1 of 1
Back1Next

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close