what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 9 of 9 RSS Feed

Files from Titon

Email addresstiton at bastardlabs.com
First Active2006-12-11
Last Active2008-06-05
Zero Day Initiative Advisory 08-034
Posted Jun 5, 2008
Authored by Tipping Point, Titon | Site zerodayinitiative.com

A vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Hewlett Packard StorageWorks Storage Mirroring. Authentication is not required to exploit this vulnerability.

tags | advisory, remote, arbitrary
advisories | CVE-2008-1661
SHA-256 | a118c902376643ce29a17845a8997a5aba2deb72b473632718632d8308a20b8d
motorolatimbuktu-create.txt
Posted Mar 13, 2008
Authored by Titon

Motorola Timbuktu Pro versions 8.6.5 and below file deletion and creation exploit.

tags | exploit
SHA-256 | 784120f3abd0a37eb684117921e604cdeca952d7b7cb4c8e96bc9970be0e96fa
backupexec-upload.txt
Posted Feb 8, 2008
Authored by Titon

Backup Exec System Recovery Manager versions 7.0.1 and below file upload proof of concept exploit.

tags | exploit, proof of concept, file upload
SHA-256 | ee1e884145bd69e458fc0939f1a4ccdf7815e2de211d2ce86ec7cc531ae21e68
Zero Day Initiative Advisory 08-03
Posted Feb 6, 2008
Authored by Tipping Point, Titon | Site zerodayinitiative.com

A vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Symantec Backup Exec System Recovery Manager. Authentication is not required to exploit this vulnerability. Backup Exec System Recovery Manager versions 7.0 and 7.0.1 are affected.

tags | advisory, remote, arbitrary
advisories | CVE-2008-0457
SHA-256 | 2febe6c060baca99c4a70f0ea9a1c410d16626e72a059c4ff90bc5900afd1555
timbuktu_sploit.txt
Posted Sep 26, 2007
Authored by Titon

Motorola Timbuktu Pro version 8.6.3 arbitrary file deletion/creation exploit.

tags | exploit, arbitrary
SHA-256 | 874412375d09b6cf6ef3a5277cbd467699ee63e7e2c5be8e6065abfef7c41322
iDEFENSE Security Advisory 2007-08-27.2
Posted Aug 27, 2007
Authored by iDefense Labs, Titon | Site idefense.com

iDefense Security Advisory 08.27.07 - Remote exploitation of multiple buffer overflow vulnerabilities within Motorola Inc.'s Timbuktu allows attackers to crash the service or potentially execute arbitrary code with SYSTEM privileges. iDefense has confirmed the existence of these vulnerabilities within version 8.6.3.1367 of Motorola Inc.'s Timbuktu Pro for Windows. Older versions are suspected to be vulnerable.

tags | advisory, remote, overflow, arbitrary, vulnerability
systems | windows
advisories | CVE-2007-4221
SHA-256 | 2c0be78c19651cec8c3830a3d8035766d457717c504dd033a6cce9c7c645aabf
iDEFENSE Security Advisory 2007-08-27.1
Posted Aug 27, 2007
Authored by iDefense Labs, Titon | Site idefense.com

iDefense Security Advisory 08.27.07 - Remote exploitation of a directory traversal vulnerability in Motorola Inc.'s Timbuktu Pro allows attackers to delete or create files with SYSTEM privileges. iDefense confirmed the existence of this vulnerability in version 8.6.3.1367 of Motorola Inc.'s Timbuktu Pro for Windows. Other versions, including those for other operating systems are suspected to be vulnerable.

tags | advisory, remote
systems | windows
advisories | CVE-2007-4220
SHA-256 | 18e9855a8b025e8dd06159a3b3c1326937d4ce121fdce33a74edda805b44cfac
iDEFENSE Security Advisory 2007-04-02.1
Posted Apr 3, 2007
Authored by iDefense Labs, ri0t, Eric DETOISIEN, Titon | Site idefense.com

iDefense Security Advisory 04.02.07 - Remote exploitation of a buffer overflow vulnerability in an ActiveX control installed by Hewlett-Packard Mercury Quality Center could allow for the execution of arbitrary code. iDefense has confirmed this vulnerability in the control that is installed with the 9.0 version of Hewlett-Packard Mercury Quality Center. The vulnerable ActiveX control is version 9.1.0.4353.

tags | advisory, remote, overflow, arbitrary, activex
SHA-256 | 5b7a58a511de0448a1f3aa7cfacb09134ed75ed21003432e47ea7cef077143a6
iDEFENSE Security Advisory 2006-12-08.1
Posted Dec 11, 2006
Authored by iDefense Labs, Damian Put, Titon | Site idefense.com

iDefense Security Advisory 12.08.06 - Remote exploitation of a denial of service vulnerability in Multiple Vendors' Antivirus engines allows an attacker to cause the engines to consume excessive resources. The affected vendors' scan engines are vulnerable to a DoS attack when scanning specially malformed RAR archives. Specifically, the malformed archives will have the head_size and pack_size fields set to zero in Archive Header section. When such a file is encountered, the affected scan engines will enter an infinite loop. Confirmed systems affected: Sophos Small business edition (Windows/Linux) 4.06.1 with engine version 2.34.3. Trend Micro PC Cillin - Internet Security 2006. Trend Micro Office Scan 7.3. Trend Micro Server Protect 5.58.

tags | advisory, remote, denial of service
systems | linux, windows
advisories | CVE-2006-5645
SHA-256 | 67c4a280c65b80adddfea7555c151689fa0a7b7c4e14641e6726e9b11f3ce9f5
Page 1 of 1
Back1Next

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    8 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    11 Files
  • 23
    Apr 23rd
    68 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close