Exploit the possiblities
Showing 1 - 9 of 9 RSS Feed

Files from Titon

Email addresstiton at bastardlabs.com
First Active2006-12-11
Last Active2008-06-05
Zero Day Initiative Advisory 08-034
Posted Jun 5, 2008
Authored by Tipping Point, Titon | Site zerodayinitiative.com

A vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Hewlett Packard StorageWorks Storage Mirroring. Authentication is not required to exploit this vulnerability.

tags | advisory, remote, arbitrary
advisories | CVE-2008-1661
MD5 | 730ea833ea242cd3bfe956e149199fb5
motorolatimbuktu-create.txt
Posted Mar 13, 2008
Authored by Titon

Motorola Timbuktu Pro versions 8.6.5 and below file deletion and creation exploit.

tags | exploit
MD5 | 65ecd158b3c4208128dca16d0427f6da
backupexec-upload.txt
Posted Feb 8, 2008
Authored by Titon

Backup Exec System Recovery Manager versions 7.0.1 and below file upload proof of concept exploit.

tags | exploit, proof of concept, file upload
MD5 | 4cdd5f57c4c02a08f0217258a35533f3
Zero Day Initiative Advisory 08-03
Posted Feb 6, 2008
Authored by Tipping Point, Titon | Site zerodayinitiative.com

A vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Symantec Backup Exec System Recovery Manager. Authentication is not required to exploit this vulnerability. Backup Exec System Recovery Manager versions 7.0 and 7.0.1 are affected.

tags | advisory, remote, arbitrary
advisories | CVE-2008-0457
MD5 | be7b33818fa9723d29f832bc0b43af58
timbuktu_sploit.txt
Posted Sep 26, 2007
Authored by Titon

Motorola Timbuktu Pro version 8.6.3 arbitrary file deletion/creation exploit.

tags | exploit, arbitrary
MD5 | aea197f6e7d8dfeaf01a565807e58b82
iDEFENSE Security Advisory 2007-08-27.2
Posted Aug 27, 2007
Authored by iDefense Labs, Titon | Site idefense.com

iDefense Security Advisory 08.27.07 - Remote exploitation of multiple buffer overflow vulnerabilities within Motorola Inc.'s Timbuktu allows attackers to crash the service or potentially execute arbitrary code with SYSTEM privileges. iDefense has confirmed the existence of these vulnerabilities within version 8.6.3.1367 of Motorola Inc.'s Timbuktu Pro for Windows. Older versions are suspected to be vulnerable.

tags | advisory, remote, overflow, arbitrary, vulnerability
systems | windows
advisories | CVE-2007-4221
MD5 | 1429829150418ac56a8f20217cf4ad95
iDEFENSE Security Advisory 2007-08-27.1
Posted Aug 27, 2007
Authored by iDefense Labs, Titon | Site idefense.com

iDefense Security Advisory 08.27.07 - Remote exploitation of a directory traversal vulnerability in Motorola Inc.'s Timbuktu Pro allows attackers to delete or create files with SYSTEM privileges. iDefense confirmed the existence of this vulnerability in version 8.6.3.1367 of Motorola Inc.'s Timbuktu Pro for Windows. Other versions, including those for other operating systems are suspected to be vulnerable.

tags | advisory, remote
systems | windows
advisories | CVE-2007-4220
MD5 | b05606c0d244cd6c03b5e12a4c142899
iDEFENSE Security Advisory 2007-04-02.1
Posted Apr 3, 2007
Authored by iDefense Labs, ri0t, Eric DETOISIEN, Titon | Site idefense.com

iDefense Security Advisory 04.02.07 - Remote exploitation of a buffer overflow vulnerability in an ActiveX control installed by Hewlett-Packard Mercury Quality Center could allow for the execution of arbitrary code. iDefense has confirmed this vulnerability in the control that is installed with the 9.0 version of Hewlett-Packard Mercury Quality Center. The vulnerable ActiveX control is version 9.1.0.4353.

tags | advisory, remote, overflow, arbitrary, activex
MD5 | 05cb3a803519f121f8fa5bf004dd3404
iDEFENSE Security Advisory 2006-12-08.1
Posted Dec 11, 2006
Authored by iDefense Labs, Damian Put, Titon | Site idefense.com

iDefense Security Advisory 12.08.06 - Remote exploitation of a denial of service vulnerability in Multiple Vendors' Antivirus engines allows an attacker to cause the engines to consume excessive resources. The affected vendors' scan engines are vulnerable to a DoS attack when scanning specially malformed RAR archives. Specifically, the malformed archives will have the head_size and pack_size fields set to zero in Archive Header section. When such a file is encountered, the affected scan engines will enter an infinite loop. Confirmed systems affected: Sophos Small business edition (Windows/Linux) 4.06.1 with engine version 2.34.3. Trend Micro PC Cillin - Internet Security 2006. Trend Micro Office Scan 7.3. Trend Micro Server Protect 5.58.

tags | advisory, remote, denial of service
systems | linux, windows
advisories | CVE-2006-5645
MD5 | 5c0000a6d35f7f12401a74a547016533
Page 1 of 1
Back1Next

Want To Donate?


Bitcoin: 18PFeCVLwpmaBuQqd5xAYZ8bZdvbyEWMmU

File Archive:

January 2018

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jan 1st
    2 Files
  • 2
    Jan 2nd
    13 Files
  • 3
    Jan 3rd
    16 Files
  • 4
    Jan 4th
    39 Files
  • 5
    Jan 5th
    26 Files
  • 6
    Jan 6th
    40 Files
  • 7
    Jan 7th
    2 Files
  • 8
    Jan 8th
    16 Files
  • 9
    Jan 9th
    25 Files
  • 10
    Jan 10th
    28 Files
  • 11
    Jan 11th
    44 Files
  • 12
    Jan 12th
    32 Files
  • 13
    Jan 13th
    2 Files
  • 14
    Jan 14th
    4 Files
  • 15
    Jan 15th
    31 Files
  • 16
    Jan 16th
    15 Files
  • 17
    Jan 17th
    16 Files
  • 18
    Jan 18th
    24 Files
  • 19
    Jan 19th
    15 Files
  • 20
    Jan 20th
    5 Files
  • 21
    Jan 21st
    0 Files
  • 22
    Jan 22nd
    0 Files
  • 23
    Jan 23rd
    0 Files
  • 24
    Jan 24th
    0 Files
  • 25
    Jan 25th
    0 Files
  • 26
    Jan 26th
    0 Files
  • 27
    Jan 27th
    0 Files
  • 28
    Jan 28th
    0 Files
  • 29
    Jan 29th
    0 Files
  • 30
    Jan 30th
    0 Files
  • 31
    Jan 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2018 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close