what you don't know can hurt you
Showing 1 - 25 of 100 RSS Feed

Files

Android 4.0.3 Browser Crash
Posted Dec 1, 2012
Authored by Jean Pascal Pereira

Android version 4.0.3 web browser remote crash denial of service exploit.

tags | exploit, remote, web, denial of service
MD5 | b17247b2ca3c55a39e4c0703e6bbb967

Related Files

Kies Air Denial Of Service / Authorization Bypass
Posted Nov 16, 2012
Authored by Claudio J. Lacayo

Kies Air suffers from authorization bypass and denial of service vulnerabilities. Android version 4.0.4 build number IMM76D.I747UCALH9 is affected.

tags | exploit, denial of service, vulnerability, bypass
advisories | CVE-2012-5858, CVE-2012-5859
MD5 | ca2c894d35d1c3d90e64a5b2734daf70
DropBox iOS / Android App File Theft
Posted Oct 20, 2012
Authored by Roi Saltzman

DropBox version 1.4.6 on iOS, 2.0.1 on Android, and Google Drive version 1.0.1 on iOS suffer from a file theft vulnerability due to allowing arbitrary javascript to be executed inside of the privileged file zone.

tags | advisory, arbitrary, javascript
systems | apple
MD5 | aee44986c95172241f9bcc6c7ebf9aa9
strongSwan IPsec Implementation 5.0.1
Posted Oct 5, 2012
Authored by Andreas Steffen | Site strongswan.org

strongSwan is a complete IPsec implementation for the Linux, Android, Maemo, FreeBSD, and Mac OS X operating systems. It interoperates with with most other IPsec-based VPN products via the IKEv2 or IKEv1 key exchange protocols. The focus of the strongSwan project is on strong authentication mechanisms using X.509 public key certificates and optional secure storage of private keys on smartcards through a standardized PKCS#11 interface. A rich choice of modular plugins adds additional features like Trusted Network Connect or advanced cryptographical algorithms.

Changes: The leftsourceip option now accepts a comma separated combination of %config4, %config6, or fixed IP addresses to request from the responder. Likewise, the rightsourceip option accepts multiple explicitly specified or referenced named address pools. TPM-based remote attestation has been extended to verify the complete measurements done by the Linux Integrity Measurement Architecture (IMA). Reference hash values of up to 10'000 Linux system files are stored in an SQLite database.
tags | tool, encryption, protocol
systems | linux, freebsd, apple, osx
MD5 | 950228bfb2972b76af4e65e2071d0417
Bitdefender USSD Wipe Stopper
Posted Oct 1, 2012
Authored by Bitdefender | Site bitdefender.com

The operating system your smartphone is running may be vulnerable to USSD commands that could wipe your entire phone. Tapping on a link to a cleverly coded web page could order you phone to reset itself to factory settings and disintegrate all your private data with it. Any Android phone running Phone.apk version 4.1 or lower is at risk and that's the broader base of them. Install Bitdefender's USSD Wipe Stopper to protect against such attacks. Now, once you would tap on a exploiting link, Bitdefender will intercept the wipe command and ask you to decide what to do next. You may, if unsure, dismiss the USSD command.

tags | web, telephony
MD5 | 95b7807d9c07312abae6660c31bf1c1f
Hacking Android For Fun And Profit
Posted Sep 17, 2012
Authored by G13

This is a brief whitepaper with examples and information on hacking the Android platform from Google.

tags | paper
MD5 | f7e79cbbc22d85f10d2308b07ba47c9b
Secunia Security Advisory 50613
Posted Sep 14, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Multiple vulnerabilities have been reported in Google Chrome for Android, which can be exploited by malicious people to disclose certain sensitive information and conduct cross-site scripting attacks.

tags | advisory, vulnerability, xss
MD5 | 015c24a53cb2c0e16a3a8db2cc8e4024
Secunia Security Advisory 50482
Posted Sep 7, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in Cybozu KUNAI for Android, which can be exploited by malicious people to compromise a user's device.

tags | advisory
MD5 | 1a36b24e0e083c9604c3d81133b1f893
Secunia Security Advisory 50478
Posted Aug 31, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - The vulnerability is reported in Cyobozu Live for Android, which can be exploited by malicious people to compromise a user's device.

tags | advisory
MD5 | e9061a57e2e75a6051dc72e398a40090
Secunia Security Advisory 50094
Posted Aug 8, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in Sleipnir Mobile for Android, which can be exploited by malicious people to compromise a user's device.

tags | advisory
MD5 | 0f645a00370c6ac68d9bb3eb43325e8f
Android HTC Mail Insecure Password Management
Posted Aug 6, 2012
Authored by HexView | Site hexview.com

The HTC Mail application on Android stores passwords base64 encoded after swapping around odd and even characters.

tags | exploit
MD5 | cd777a6e10b882607b3ed5cd45885bb7
Android 4.0.4 DNS Poisoning
Posted Jul 24, 2012
Authored by Roee Hay

Android versions 4.0.4 and below suffer from a DNS poisoning vulnerability.

tags | advisory
advisories | CVE-2012-2808
MD5 | f0e7d1f6cb180eaacaaf0ea77a3c5d79
Nessus On Android 1.0.1 Credential Disclosure
Posted Jul 23, 2012

Nessus version 1.0.1 for Android stores the username and password in cleartext.

tags | exploit
MD5 | 3940f6a96bf4331972ccffe0f39d4212
Secunia Security Advisory 49990
Posted Jul 18, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Artem Chaykin has reported a vulnerability in Dr.Web Anti-virus for Android, which can be exploited by malicious people to disclose sensitive information.

tags | advisory, web, virus
MD5 | 2adfc3e50f2b6613e8ca93f0a5d2b8cc
Secunia Security Advisory 49905
Posted Jul 17, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A security issue has been reported in Yahoo! Browser for Android, which can be exploited by malicious people to disclose sensitive information.

tags | advisory
MD5 | 198318fad0b61ac98b32627e0a0e1e10
Cura 1.5
Posted Jul 16, 2012
Site github.com

Cura is a mobile phone application bundle of remote systems administration tools. It provides a personalized terminal emulator, a syslog module that allows for reading logs directly from a server, a SysMonitor module that visually graphs CPU and RAM usage percentages, access to Nmap, and Server Stats will offer general server information like its Vitals, Hardware information, Memory information, processes, and so on. A security feature will be implemented that allows users to have Cura's database completely wiped upon them sending the compromised phone a secret pattern of their choosing (e.g. send an SMS message containing "phone has been stolen!" to your Android phone to wipe Cura's database, and receive the location of the compromised phone as an SMS to your emergency phone number or as an email to your emergency email address).

Changes: The modules screen is now Tabular, providing a much better user experience in which all of Cura's modules are provided as tabs on the top of the screen.
tags | exploit, remote
MD5 | 199eea14b1da9508876ff2a0c72ff8c5
Cura 1.4
Posted Jul 13, 2012
Site github.com

Cura is a mobile phone application bundle of remote systems administration tools. It provides a personalized terminal emulator, a syslog module that allows for reading logs directly from a server, a SysMonitor module that visually graphs CPU and RAM usage percentages, access to Nmap, and Server Stats will offer general server information like its Vitals, Hardware information, Memory information, processes, and so on. A security feature will be implemented that allows users to have Cura's database completely wiped upon them sending the compromised phone a secret pattern of their choosing (e.g. send an SMS message containing "phone has been stolen!" to your Android phone to wipe Cura's database, and receive the location of the compromised phone as an SMS to your emergency phone number or as an email to your emergency email address).

Changes: This release features a completely new UI for the Home (Login) screen where you are dropped upon launch. This is where you access/create/update/delete your server accounts, and it's had a complete do-over.
tags | tool, remote, wireless
MD5 | 7793c2a4d7768273e8677d80b00b06b6
Secunia Security Advisory 49788
Posted Jul 8, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A weakness has been reported in Yome Collection for Android, which can be exploited by malicious people to disclose certain system information.

tags | advisory
MD5 | e8efc23f08c39c83a1d97c11212f4158
strongSwan IPsec Implementation 5.0.0
Posted Jul 3, 2012
Authored by Andreas Steffen | Site strongswan.org

strongSwan is a complete IPsec implementation for the Linux, Android, Maemo, FreeBSD, and Mac OS X operating systems. It interoperates with with most other IPsec-based VPN products via the IKEv2 or IKEv1 key exchange protocols. The focus of the strongSwan project is on strong authentication mechanisms using X.509 public key certificates and optional secure storage of private keys on smartcards through a standardized PKCS#11 interface. A rich choice of modular plugins adds additional features like Trusted Network Connect or advanced cryptographical algorithms.

Changes: The IKEv1 protocol was re-implemented from scratch by extending the successful IKEv2 code. The charon keying daemon now supports both protocols, which allowed the old IKEv1 pluto daemon to be removed. Support for the IKEv1 Aggressive and Hybrid Modes has been added.
tags | tool, encryption, protocol
systems | linux, freebsd, apple, osx
MD5 | 1d7bccb50f01020bb04d06e9755e0eec
Pani SQL Injection 0.2b
Posted Jul 1, 2012
Authored by Palash Golechha

This is a SQL injection tool written in PHP. Can be run on Android by installing paw server and the php plugin.

tags | tool, scanner, php, sql injection
systems | unix
MD5 | 799d5f8a07e6e07b99e8f61561fb47a8
Secunia Security Advisory 49513
Posted Jun 15, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A security issue has been reported in Dolphin Browser HD for Android, which can be exploited by malicious people to disclose sensitive information.

tags | advisory
MD5 | 2489b6cd9d4e5833995cd6beb8514190
Secunia Security Advisory 49389
Posted Jun 11, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - AppSec has reported a vulnerability with an unknown impact in NetEase Weibo for Android.

tags | advisory
MD5 | e1e6e400c4d2a201b525124d3cfc2b69
Secunia Security Advisory 49349
Posted Jun 11, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - AppSec has reported a vulnerability with an unknown impact in NetEase Reader for Android.

tags | advisory
MD5 | f2622e73138b024d6c450596454088cf
Secunia Security Advisory 49415
Posted Jun 11, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - AppSec has reported a vulnerability with an unknown impact in NetEase WeiboHD for Android.

tags | advisory
MD5 | 6ac3b4dd8d0dcfa69f9093683ff3fa64
Secunia Security Advisory 49347
Posted Jun 8, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - AppSec has reported a vulnerability with an unknown impact in Cnectd for Android.

tags | advisory
MD5 | 73e3e5fd5cb1442807861fcba56b718f
Intercepter-NG Console Edition 0.1
Posted Jun 3, 2012
Authored by Ares | Site sniff.su

Intercepter-NG [Console Edition] is a sniffer that offers various capabilities including sniffing for password hashes related to ORACLE/MYSQL/VNC/NNTP/CVS/WWW/HTTP/SOCKS/MRA/FTP/POP3/SMTP/IMAP/LDAP/AIM. It works on NT/Linux/BSD/IOS/Android and is optimized for screen size 80x30 or higher.

tags | tool, web, sniffer, imap
systems | linux, bsd, apple
MD5 | 59d425358d2c05263fbf2efed0ceca04
Page 1 of 4
Back1234Next

File Archive:

November 2020

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    2 Files
  • 2
    Nov 2nd
    9 Files
  • 3
    Nov 3rd
    15 Files
  • 4
    Nov 4th
    90 Files
  • 5
    Nov 5th
    22 Files
  • 6
    Nov 6th
    16 Files
  • 7
    Nov 7th
    1 Files
  • 8
    Nov 8th
    1 Files
  • 9
    Nov 9th
    40 Files
  • 10
    Nov 10th
    27 Files
  • 11
    Nov 11th
    28 Files
  • 12
    Nov 12th
    13 Files
  • 13
    Nov 13th
    18 Files
  • 14
    Nov 14th
    2 Files
  • 15
    Nov 15th
    2 Files
  • 16
    Nov 16th
    29 Files
  • 17
    Nov 17th
    15 Files
  • 18
    Nov 18th
    15 Files
  • 19
    Nov 19th
    21 Files
  • 20
    Nov 20th
    16 Files
  • 21
    Nov 21st
    1 Files
  • 22
    Nov 22nd
    0 Files
  • 23
    Nov 23rd
    19 Files
  • 24
    Nov 24th
    32 Files
  • 25
    Nov 25th
    7 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    0 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2020 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close