what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 25 of 100 RSS Feed

Files

Yahoo! Messenger 11.5 Buffer Overflow
Posted Feb 12, 2012
Authored by Manideep, Vulnerability Laboratory

Yahoo! Messenger version 11.5 suffers from a buffer overflow vulnerability.

tags | advisory, overflow
SHA-256 | 7effd2b540f78d3bd0dd3e6cabbdb016ba24c58d1c29c7b4db634aa999ae780a

Related Files

Mibew Web Messenger 1.6.4 SQL Injection
Posted Aug 6, 2012
Authored by Ucha Gobejishvili

Mibew Web Messenger version 1.6.4 suffers from a remote SQL injection vulnerability.

tags | exploit, remote, web, sql injection
SHA-256 | bed01cb6059bb09cc7e1502d369544b1281c6b3d3b97cc6e202f1af83fe360e7
LAN Messenger 1.2.28 Denial Of Service
Posted May 2, 2012
Authored by Julien Ahrens, Vulnerability Laboratory | Site vulnerability-lab.com

LAN Messenger versions 1.2.28 and below suffer from a remote denial of service vulnerability.

tags | exploit, remote, denial of service
SHA-256 | eff6948e4801547fe1cfebd1aacccadc027fc700ffd47ae47741cd482302bb51
Secunia Security Advisory 48126
Posted Feb 21, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Luigi Auriemma has discovered a vulnerability in Novell Messenger Client, which can be exploited by malicious people to compromise a user's system.

tags | advisory
SHA-256 | 52cb2fa218e45005737107ace7f2f69d5f2226bbab7340956c2f748f57a9d4a8
Novell GroupWise Messenger 2.1.0 Arbitrary Memory Write
Posted Feb 17, 2012
Authored by Luigi Auriemma | Site aluigi.org

Novell GroupWise Messenger versions 2.1.0 and below suffer from an arbitrary memory write vulnerability. Proof of concept code included.

tags | exploit, arbitrary, proof of concept
systems | linux
SHA-256 | 2a860e7fc425db009ce68367eb366a207037f08cbda2c027cf4fa5a25d8f9723
Novell GroupWise Messenger 2.1.0 Memory Corruption
Posted Feb 17, 2012
Authored by Luigi Auriemma | Site aluigi.org

Novell GroupWise Messenger versions 2.1.0 and below suffer from a memory corruption vulnerability. Proof of concept code included.

tags | exploit, proof of concept
systems | linux
SHA-256 | 7bf5d40c43687f0dd580d97a27bf832ee281150557d29f08aaeefdac37a8bcc1
Novell GroupWise Messenger Client 2.1.0 Unicode Stack Overflow
Posted Feb 17, 2012
Authored by Luigi Auriemma | Site aluigi.org

Novell GroupWise Messenger Client versions 2.1.0 and below suffer from a unicode stack overflow vulnerability. Proof of concept code included.

tags | exploit, overflow, proof of concept
systems | linux
SHA-256 | 0e268a424cde5fd0ea8d5a4d615a84eb7ca0ba1673fe16ea7a7415099931f463
Icona SpA C6 Messenger Downloader Arbitrary File Download / Execute
Posted Feb 3, 2012
Authored by juan vazquez, Nine:Situations:Group::SnoopyAssault | Site metasploit.com

This Metasploit module exploits a vulnerability in Icona SpA C6 Messenger version 1.0.0.1. The vulnerability is in the Downloader ActiveX Control (DownloaderActiveX.ocx). The insecure control can be abused to download and execute arbitrary files in the context of the currently logged-on user.

tags | exploit, arbitrary, activex
advisories | CVE-2008-2551, OSVDB-45960
SHA-256 | 5ff82482c6d0cc8cb96eb23172d540f4d5ded54210dbc21fe3ea60715403632a
Secunia Security Advisory 47767
Posted Feb 1, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - AppSec has reported a security issue in MiTalk Messenger for Android, which can be exploited by malicious people to bypass certain security restrictions.

tags | advisory
SHA-256 | 3d4f9f4d822abd9d405405c5b7b9b9d90ef4566ca42e79a2b426b189c4502897
Secunia Security Advisory 47787
Posted Jan 31, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - CodSeq has discovered a vulnerability in Mibew Messenger, which can be exploited by malicious people to conduct cross-site request forgery attacks.

tags | advisory, csrf
SHA-256 | a7766612c2c403a4a0820c26efdd30bb8658122350e7fa07e0a4899b3340a6fc
Mibew Messenger 1.6.4 Cross Site Scripting
Posted Jan 30, 2012
Authored by Filippo Cavallarin

Mibew Messenger version 1.6.4 suffers from multiple cross site scripting vulnerabilities.

tags | exploit, vulnerability, xss
SHA-256 | 70ca4b16e1bd521b1858f4631f536db54e0cb770544aff6b395c926a0f05eef9
Secunia Security Advisory 47041
Posted Jan 15, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Tielei Wang has discovered a vulnerability in Yahoo Messenger, which can be exploited by malicious people to compromise a user's system.

tags | advisory
SHA-256 | 67e4d05e8d5a18096065f230473a7c784c0ebba77ee418f42ff350225ef25cc8
Secunia Security Advisory 46785
Posted Dec 22, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A security issue has been reported in WhatsApp Messenger, which can be exploited by malicious people to disclose potentially sensitive information.

tags | advisory
SHA-256 | f6dab7cea0114aa4f9a02710e16d749887c9dcf167be5d37f3a8265bd2b3cd7c
Secunia Security Advisory 46677
Posted Oct 31, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in Novell Messenger, which can be exploited by malicious people to disclose potentially sensitive information.

tags | advisory
SHA-256 | 2ee572fb64897d443d5e0a0c24e6511673a9002f870276e8920c21e5051e8a0f
Red Hat Security Advisory 2011-1371-01
Posted Oct 14, 2011
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2011-1371-01 - Pidgin is an instant messaging program which can log in to multiple accounts on multiple instant messaging networks simultaneously. An input sanitization flaw was found in the way the Pidgin SILC protocol plug-in escaped certain UTF-8 characters. A remote attacker could use this flaw to crash Pidgin via a specially-crafted SILC message. Multiple NULL pointer dereference flaws were found in the way the Pidgin Yahoo! Messenger Protocol plug-in handled malformed YMSG packets. A remote attacker could use these flaws to crash Pidgin via a specially-crafted notification message.

tags | advisory, remote, protocol
systems | linux, redhat
advisories | CVE-2011-1091, CVE-2011-3594
SHA-256 | f0ad974a63999ee0a2da67fe7b5c6434dc5657a1919e71a6c7d833f173143ae6
eBuddy Web Messenger Cross Site Scripting
Posted Sep 1, 2011
Authored by Russian Federation

eBuddy Web Messenger suffers from a cross site scripting vulnerability.

tags | exploit, web, xss
SHA-256 | 77b4fe175a400f550ca56f490b3da9cd7a692adb0823cd175fed9a0e611b28bb
NetSaro Enterprise Messenger Server Code Disclosure
Posted Aug 25, 2011
Authored by Rob Kraus | Site solutionary.com

A vulnerability exists in the NetSaro Enterprise Messenger Server Administration Console allowing a remote attacker to obtain unauthenticated access to the applications source code. Attackers may make HTTP GET requests and append a Null Byte to allow download of the source code for the applications web pages. An attacker does not need to authenticate to obtain access to source code for pages that usually require authentication prior to viewing.

tags | advisory, remote, web
SHA-256 | 1231ae3590ce9f439d6b83bc44f312d176de967ea3fd246651485e8e72f9d537
Secunia Security Advisory 45642
Posted Aug 16, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Two weaknesses have been discovered in NetSaro Enterprise Messenger, which can be exploited by malicious, local users to disclose sensitive information.

tags | advisory, local
SHA-256 | 0ec510e8c8447bf9d4530afe5205f79b5e2a0d52def23dbe84bacee38176c48b
NetSaro Enterprise Messenger Server Plaintext Password Storage
Posted Aug 16, 2011
Authored by Rob Kraus | Site solutionary.com

A vulnerability exists in the NetSaro Enterprise Messenger Server application allowing an attacker to obtain access to plaintext usernames and passwords. The stored passwords are used to authenticate users running the NetSaro Enterprise Client connecting to the server. This is a second level attack that requires access to the password files stored within the application root directory. An attacker who has previously compromised the host operating system or gained direct access to the NetSaro.fdb database file found in the "NetSaro Enterprise ServerDb" directory can obtain the user credentials using readily available tools.

tags | advisory, root
SHA-256 | 5cbcfb103f656ef50499195011ab3f297cb4532d146aa664ccd91c09612fe813
NetSaro Enterprise Manager Server Weak Cryptographic Storage
Posted Aug 16, 2011
Authored by Rob Kraus | Site solutionary.com

A vulnerability exists in the NetSaro Enterprise Messenger Server application allowing an attacker to easily decrypt passwords used to authenticate to the application. The application implements Base64 encoding to obfuscate the values of plaintext passwords used for logging into the server administration console. This is a second level attack that requires access to the password files stored within the application root directory. An attacker who has previously compromised the host operating system or achieved direct access to the configuration.xml file found in the "NetSaro Enterprise Server" directory can obtain the encoded user credentials and decrypt them using readily available Base64 decoding tools.

tags | advisory, root
SHA-256 | 1e5e9c85c5226e719db82524ba8e52dd4a1526c77d534b61ca30a522f9e623ab
Paltalk Messenger 10.0 Insecure Method
Posted Jul 16, 2011
Authored by High-Tech Bridge SA | Site htbridge.com

Paltalk Messenger version 10.0 suffers from an Active-X insecure method vulnerability.

tags | exploit, activex
SHA-256 | 3b4401939b9bca69589a54c90655ff168e700c9fd2e7f74591bc6d8108accfef
MSN Live Messenger 14.0 Plus! DLL Hijack
Posted May 31, 2011
Authored by Kalashinkov3

MSN Live Messenger version 14.0 Plus! suffers from a DLL hijacking vulnerability.

tags | exploit
systems | windows
SHA-256 | aefdb3d190c9576d9c7aff86808641f8c0b86d00650059273a13b750b4452983
Secunia Security Advisory 44159
Posted Apr 15, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in Microsoft Windows Messenger, which can be exploited by malicious people to compromise a user's system.

tags | advisory
systems | windows
SHA-256 | 93ec5ce55a927a205df77f9cddc0499ccbc14e099c169d0fd3ab489449ccc670
PHP Universal Web Messenger Cross-Domain Redirect
Posted Dec 16, 2010
Authored by ProCheckUp, Jan Fry | Site procheckup.com

PHP Universal Web Messenger suffers from a cross-domain redirect vulnerability.

tags | exploit, web, php
SHA-256 | 3d11a6d4f9d5cdf42c90ac17922caf1bba35357aa4b5bbdfd7e1d98500977074
Secunia Security Advisory 42572
Posted Dec 11, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Salvatore Fresta has discovered a security issue in the JE Messenger component for Joomla, which can be exploited by malicious users to compromise a vulnerable system.

tags | advisory
SHA-256 | 1711bbab99b92690d2a202cee87df38ae8d0d3af893cc0af95a7e856ff28790d
Joomla JE Messenger 1.0 Shell Upload
Posted Dec 9, 2010
Authored by Salvatore Fresta | Site salvatorefresta.net

The Joomla JE Messenger 1.0 suffers from a shell upload vulnerability.

tags | exploit, shell
SHA-256 | 28c7bab00d1980b37b55d7b9fe1701a9551802253ace9c0a2091c87047e44404
Page 1 of 4
Back1234Next

File Archive:

March 2023

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Mar 1st
    16 Files
  • 2
    Mar 2nd
    13 Files
  • 3
    Mar 3rd
    15 Files
  • 4
    Mar 4th
    0 Files
  • 5
    Mar 5th
    0 Files
  • 6
    Mar 6th
    16 Files
  • 7
    Mar 7th
    31 Files
  • 8
    Mar 8th
    16 Files
  • 9
    Mar 9th
    13 Files
  • 10
    Mar 10th
    9 Files
  • 11
    Mar 11th
    0 Files
  • 12
    Mar 12th
    0 Files
  • 13
    Mar 13th
    10 Files
  • 14
    Mar 14th
    6 Files
  • 15
    Mar 15th
    17 Files
  • 16
    Mar 16th
    22 Files
  • 17
    Mar 17th
    13 Files
  • 18
    Mar 18th
    0 Files
  • 19
    Mar 19th
    0 Files
  • 20
    Mar 20th
    16 Files
  • 21
    Mar 21st
    13 Files
  • 22
    Mar 22nd
    5 Files
  • 23
    Mar 23rd
    6 Files
  • 24
    Mar 24th
    47 Files
  • 25
    Mar 25th
    0 Files
  • 26
    Mar 26th
    0 Files
  • 27
    Mar 27th
    50 Files
  • 28
    Mar 28th
    42 Files
  • 29
    Mar 29th
    7 Files
  • 30
    Mar 30th
    31 Files
  • 31
    Mar 31st
    15 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close