what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 25 of 41 RSS Feed

Files

NJStar Communicator 3.0 MiniSmtp Buffer Overflow
Posted Dec 3, 2011
Authored by Julian Pulido

NJStar Communicator version 3.0 MiniSmtp buffer overflow exploit with ASLR bypass.

tags | exploit, overflow
advisories | CVE-2011-4040
SHA-256 | 0b7da0b7c7134272e31478cea7b4b013563a075161c8cc011b32e019d9b3d3de

Related Files

Counterfeiting With Cisco IP Communicator
Posted May 24, 2016
Authored by Suman Sah

Whitepaper that discusses how Cisco IP Communicator only uses MAC addresses for authentication allowing you to spoof other callers.

tags | exploit, spoof
systems | cisco
SHA-256 | 5fa6355a4e3c274a002436a52e827eab9e6cbcae0ca0402c3a1c6a7211bbcdeb
Secunia Security Advisory 48429
Posted Jun 12, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Multiple vulnerabilities have been reported in Microsoft Lync and Office Communicator, which can be exploited by malicious people to conduct cross-site scripting attacks and compromise a user's system.

tags | advisory, vulnerability, xss
SHA-256 | 7812bf9ceb2f73b33778cf64d0ab73cef2ce3da0dabfbbe325ea4456154599db
NJStar Communicator 3.00 MiniSMTP Server Remote Exploit
Posted Nov 2, 2011
Authored by Dillon Beresford | Site metasploit.com

This Metasploit module exploits a stack buffer overflow vulnerability in NJStar Communicator Version 3.00 MiniSMTP server. The MiniSMTP application can be seen in multiple NJStar products, and will continue to run in the background even if the software is already shutdown. According to the vendor's testimonials, NJStar software is also used by well known companies such as Siemens, NEC, Google, Yahoo, eBay; government agencies such as the FBI, Department of Justice (HK); as well as a long list of universities such as Yale, Harvard, University of Tokyo, etc.

tags | exploit, overflow
SHA-256 | 44083d9c71272bc52555d936d0b249f9a4093505dbbca952c03e4cf194db20b3
Secunia Security Advisory 46630
Posted Nov 1, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been discovered in NJStar Communicator, which can be exploited by malicious people to compromise a vulnerable system.

tags | advisory
SHA-256 | 3fc23d4b11fa652a6f14c13390c62dd4ca25d6a756168d560e49f9b39938d57c
Microsoft Office 2010 Beta SIP Denial Of Service
Posted Apr 7, 2010
Authored by indoushka

Microsoft Office (2010 Beta) Communicator SIP denial of service exploit.

tags | exploit, denial of service
SHA-256 | 596cb8d048bcbb754bbe2f5df6af0fdc77c60436675b3bf2d999b447aa2f8e63
Garmin Communicator Plug-In Domain Locking Security Bypass
Posted May 7, 2009
Authored by Dyon Balding | Site secunia.com

Secunia Research has discovered a vulnerability in Garmin Communicator Plug-In, which can be exploited by malicious people to bypass certain security restrictions. The vulnerability is caused due to a synchronisation error in the GARMINAXCONTROL.GarminAxControl_t.1 ActiveX control (npGarmin.dll). This can be exploited to bypass the domain locking and dialog box presented to the user asking for confirmation that the untrusted site may access private data. Successful exploitation allows full access (such as deleting data, retrieving personal information, or installing firmware updates) to any Garmin GPS products connected to the user's system. Garmin Communicator Plug-In (npGarmin.dll) version 2.6.4.0 is affected.

tags | advisory, activex
advisories | CVE-2009-0194
SHA-256 | d2f086ac3f174a9241e5c568f24970ed3a5b1893adb4e0b56c252fa22c46ae09
Secunia Security Advisory 34326
Posted May 7, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Secunia Research has discovered a vulnerability in Garmin Communicator Plug-In, which can be exploited by malicious people to bypass certain security restrictions.

tags | advisory
SHA-256 | a222892bc7d44bb73f3d691a65c009062e73283d9e270f45cd4562cf6c218008
iDEFENSE Security Advisory 2009-04-28.1
Posted Apr 28, 2009
Authored by iDefense Labs, Stephen Fewer | Site idefense.com

iDefense Security Advisory 04.28.09 - Remote exploitation of a stack based buffer overflow vulnerability in TIBCO Software Inc.'s SmartSockets RTserver could allow an attacker to execute arbitrary code with the privileges of the affected service. The vulnerability occurs when parsing requests on the UDP interface of the RTserver. iDefense has confirmed the existence of this vulnerability in the RTserver version 4.0.10.1. Previous versions may also be affected. The SmartSockets framework is resold to various 3rd party vendors, and in this case iDefense used the version provided with Computer Associates Enterprise Communicator.

tags | advisory, remote, overflow, arbitrary, udp
advisories | CVE-2009-1291
SHA-256 | 6d008d52e91cfd5a4ca4ff613e0e700fd8d4e1656b66671f3a7aa9fae61e7a63
msoffice-dos.txt
Posted Nov 29, 2008
Authored by Praveen Darshanam

Microsoft Office Communicator (SIP) remote denial of service exploit.

tags | exploit, remote, denial of service
SHA-256 | 20c5540fef0f114978ee3c78f76467ef8fce04965ef9dc20056bebf7e07a1aa2
Secunia Security Advisory 31857
Posted Sep 16, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - wins.mallow has reported a vulnerability in Nokia E90 Communicator, which can be exploited by malicious people to cause a DoS (Denial of Service).

tags | advisory, denial of service
SHA-256 | 9b1a455864bd4e611fd2985682ac015e62d769943469c4ec407981c2fb1a4c84
vocera-flaw.txt
Posted Feb 22, 2008
Authored by George Ou

It appears that the Vocera wireless LAN VoIP communicators do not bother to cryptographically confirm the validity of a digital certificate.

tags | advisory
SHA-256 | 105682742f6dd562b1abf0a2eeae46d9ee6c3531883cad3a3642136e18d6de3d
11.19.02c.txt
Posted Nov 20, 2002
Authored by Bennett Haselton | Site idefense.com

iDEFENSE Security Advisory 11.19.02c - Users of Netscape Communicator 4.x's web browser and e-mail client who can be tricked into clicking on a malicious link can return the contents of the targeted user's preferences file often including e-mail password and URL history back to a remote attacker who redefines user_pref(), a javascript function.

tags | advisory, remote, web, javascript
SHA-256 | 5eab9de58ab811abe7daf58eecc2038d3161def28aef9bc2de99db7a39f21201
ggsniff-1.2.tar.gz
Posted Nov 1, 2002
Authored by Ryba

Patch for dsniff-2.3 that allows you to record gadu-gadu messages, a popular communicator in Poland.

Changes: Added password sniffing.
tags | patch
systems | unix
SHA-256 | 816f4c0587bdbf8c1893fc8569a3bffbd0da540062de4700c606156e66d02019
ggsniff-1.1c-dsniff-2.3-patch
Posted Sep 17, 2002
Authored by Ryba

Patch for dsniff-2.3 that allows you to record gadu-gadu messages, a popular communicator in Poland.

Changes: Fixed a cut and paste bug.
tags | patch
systems | unix
SHA-256 | 7620d8f0a7035851281f076e7dbafb22cdbc9de75c2b568aa06c005d34698db1
ggsniff-1.1b-dsniff-2.3-patch
Posted Sep 12, 2002
Authored by Ryba

Patch for dsniff-2.3 that allows you to record gadu-gadu messages, a popular communicator in Poland.

Changes: Local and remote users' IP addresses can be shown, added switch -p for disabling promiscuous mode (useful on routers), added support for extension in new GG protocol. Other small bugfixes and improvements were made.
tags | patch
systems | unix
SHA-256 | fc8192dec74061d358ec1a10e5e0866c6251e97743985d25084f0710cf326c3b
ggsniff-1.0-dsniff-2.3-patch
Posted Apr 6, 2002
Authored by Ryba

Patch for dsniff-2.3 that allows you to record gadu-gadu messages, a popular communicator in Poland.

tags | patch
systems | unix
SHA-256 | a52b6be58632020e2cb35476a0aefd69de95deb40b8238b8e1815274c1ab4b98
nn45-overflow.txt
Posted Nov 22, 2001
Authored by Darkplan | Site indigo.ie

Netscape Navigator/Communicator 4.5 buffer overflow advisory - I recently uncovered a stack based buffer overflow in NN which allowed me to execute arbitrary code. Exploit included. Tested with Netscape Navigator 4.5 using Windows98.

tags | exploit, overflow, arbitrary
SHA-256 | 8ae2a6160c963cdc89d7ce97dcfa06db4b47da886d8c54227c1f6ca9cec3bdad
comclear-1.2.tar.gz
Posted Apr 15, 2001
Site neuro-tech.net

ComClear is a history cleaner for Netscape Navigator and Communicator which allows a user to choose from deleting the cache, cookies, history, and drop-down list. Comclear has both a command-line version and a GTK+ version, the latter of which is run automatically when ComClear is run from an X session.

Changes: This release has better RPM packaging, and a GNOME application link.
tags | web
SHA-256 | fabf7d7bfe1845fb4534027f3a781f08d46f37d773322ca2c1d4749a672a03c6
TLSA2000020-1.txt
Posted Sep 1, 2000

TurboLinux Security Announcement - Affected TurboLinux versions: 6.0.5 and earlier. Package: netscape-communicator 4.74 and earlier. There is a serious problem in netscape's java libraries that allows an applet to act as a web server on the client machine, exposing all files on the machine to the world. TurboLinux security announcments here.

tags | java, web
SHA-256 | 9d00cf86eea686722c2c5dd68dc41d102c2b57e3dfcf65c8685df01f370ee639
CA-2000-15.netscape
Posted Aug 11, 2000
Site cert.org

CERT Advisory CA-2000-15 - Systems running Netscape Communicator version 4.04 through 4.74 with Java enabled ship with Java classes that allow an unsigned Java applet to access local and remote resources in violation of the security policies for applets.

tags | java, remote, local
SHA-256 | c0502d385df3d99932fdbd39395f7a2f955cc453b3afcb3aa05087faaa5b0da1
winsd.042600.txt
Posted Apr 27, 2000
Authored by winsd | Site win2000mag.com

Windows Security Update April 19 - In this issue: FrontPage 2000 Exposes Win2K Accounts, Buffer Overflow in Cmd.exe, Active Directory Mixed Object Access, Cisco IOS Subject to Denial of Service, Real Server Denial of Service, Netscape Communicator Exposes Local Files, Buffer Overflow and Path Exposure in HTimage, Internet Explorer 5.01 Allows Cross-Frame Navigation, Netware 5.1 Remote Administration Overflow, and Panda Security 3.0 Can Be Bypassed.

tags | remote, denial of service, overflow, local, magazine
systems | cisco, windows
SHA-256 | 921aa9537a60c1ccb06c67629be4e513cc11a200a55ebfebf6465df15fef6632
sersniff-0.0.3.tar.gz
Posted Apr 19, 2000
Authored by Jonathan McDowell | Site earth.li

sersniff is a program for tunnelling/sniffing for between 2 serial ports, written to help aid with the decoding of the protocol for the Nokia 9000i Communicator. It also has support for TCP connections.

tags | tcp, protocol
systems | linux
SHA-256 | 7adb899fac13a9a2cbf14b0ab190cbb4945e712b35717a2822a31c8e67372857
Fortify-1.4.6-unix-alpha.tar.gz
Posted Mar 7, 2000
Authored by Farrell McKay | Site fortify.net

Fortify provides full strength, 128-bit encryption facilities to the export editions of Netscape Navigator and Communicator. These facilites are used when connecting to an encrypting web server (with the SSL protocol). Fortify also adds the ability to generate 1024-bit RSA keys internally (these are typically used for client certificates), plus the ability to send and receive e-mail messages using strong 128-bit encryption (with the S/MIME protocol).

Changes: This is a transitionary release to support Communicator 4.72.
tags | web, protocol
SHA-256 | bb0d88da5722e9beb5f5a958b5f5b9babf828479e69482df28acca997165df11
netscape.4.x.java.txt
Posted Dec 1, 1999
Authored by Ahmed Ghandour

Netscape Communicator 4.x will allow javascript code in one netscape window to read data from another browser window, even if the two windows are pointed at different domains. Demonstration here.

tags | exploit, javascript
systems | windows
SHA-256 | 78532de37047a0f01fce8f4aff77ba175cc8163011408ee025f978c0e9cea369
unlg_nn45bug_css2.zip
Posted Nov 4, 1999
Site infected.ilm.net

bug in Netscape Communicator 4.5(may be other). Windows is affected.

tags | exploit
systems | windows
SHA-256 | 89aaeae33c93d582d73083f04a194bf33b56b6da76f6a45ad271a10b185a8c5d
Page 1 of 2
Back12Next

File Archive:

July 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jul 1st
    27 Files
  • 2
    Jul 2nd
    10 Files
  • 3
    Jul 3rd
    35 Files
  • 4
    Jul 4th
    27 Files
  • 5
    Jul 5th
    18 Files
  • 6
    Jul 6th
    0 Files
  • 7
    Jul 7th
    0 Files
  • 8
    Jul 8th
    28 Files
  • 9
    Jul 9th
    44 Files
  • 10
    Jul 10th
    24 Files
  • 11
    Jul 11th
    25 Files
  • 12
    Jul 12th
    11 Files
  • 13
    Jul 13th
    0 Files
  • 14
    Jul 14th
    0 Files
  • 15
    Jul 15th
    28 Files
  • 16
    Jul 16th
    6 Files
  • 17
    Jul 17th
    34 Files
  • 18
    Jul 18th
    6 Files
  • 19
    Jul 19th
    34 Files
  • 20
    Jul 20th
    0 Files
  • 21
    Jul 21st
    0 Files
  • 22
    Jul 22nd
    19 Files
  • 23
    Jul 23rd
    17 Files
  • 24
    Jul 24th
    47 Files
  • 25
    Jul 25th
    0 Files
  • 26
    Jul 26th
    0 Files
  • 27
    Jul 27th
    0 Files
  • 28
    Jul 28th
    0 Files
  • 29
    Jul 29th
    0 Files
  • 30
    Jul 30th
    0 Files
  • 31
    Jul 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close