exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 26 - 50 of 100 RSS Feed

Files

ICQ 6.5 HTML Injection
Posted Aug 15, 2009
Authored by ShineShadow

ICQ version 6.5 suffers from a HTML injection vulnerability.

tags | exploit
SHA-256 | 47e5107f4c6fbacd60b513e4af30bb3ea087276cc908d5e80cdc241f35e569bc

Related Files

Ubuntu Security Notice 796-1
Posted Jul 6, 2009
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice USN-796-1 - Yuriy Kaminskiy discovered that Pidgin did not properly handle certain messages in the ICQ protocol handler. A remote attacker could send a specially crafted message and cause Pidgin to crash.

tags | advisory, remote, protocol
systems | linux, ubuntu
advisories | CVE-2009-1889
SHA-256 | e9d236e58486d787e4f1439f5a9222d5b450347d97a026eb8d4c6826b1ac3968
ICQ 6.5 File Processing
Posted May 30, 2009
Authored by Nine:Situations:Group | Site retrogod.altervista.org

ICQ 6.5 URL Search Hook / ICQToolBar.dll .URL file processing Windows Explorer remote buffer overflow proof of concept exploit.

tags | exploit, remote, overflow, proof of concept
systems | windows
SHA-256 | 7db4ef3b45e02ee4e93761483eb3e15822ea237e62bf8f3e0332ef68373ae5f0
Mandriva Linux Security Advisory 2008-159
Posted Jul 31, 2008
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory - A flaw was discovered in licq versions prior to 1.3.6 that allowed a remote attacker to cause a denial of service (crash) via a large number of connections. The updated packages have been patched to correct this issue.

tags | advisory, remote, denial of service
systems | linux, mandriva
advisories | CVE-2008-1996
SHA-256 | 5cc0b81b5e5f59430fe5cbc3fce12657c17be158f5d25ff49c1751e514cd77af
Mandriva Linux Security Advisory 2008-143
Posted Jul 11, 2008
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory - An integer overflow flaw was found in Pidgin's MSN protocol handler that could allow for the execution of arbitrary code if a user received a malicious MSN message. In addition, this update provides the ability to use ICQ networks again on Mandriva Linux 2008.0, as in MDVSA-2008:103 (updated pidgin for 2008.1). The updated packages have been patched to correct this issue.

tags | advisory, overflow, arbitrary, protocol
systems | linux, mandriva
advisories | CVE-2008-2927
SHA-256 | 7d84696431ca3cbdcdd7bc3811cc4ffa055ddcf1c20c7cb29c685bb32ae3d154
Intercepter Sniffer 0.7.2
Posted Jun 19, 2008
Authored by Ares | Site sniff.su

0x4553-Intercepter is a WinPcap-based sniffer that offers various capabilities including sniffing for password hashes related to ICQ/IRC/AIM/FTP/IMAP/POP3/SMTP/LDAP/BNC/SOCKS/HTTP/WWW/NNTP/CVS/TELNET/MRA/DC++/VNC/MYSQL and ORACLE. It also sniffs ICQ/AIM/JABBER/YAHOO/MSN/GADU-GADU/IRC and MRA protocols. It has a built-in arp poisoning module, can change MAC addresses of LAN adapters, and has various other interesting functionality.

tags | tool, web, sniffer, imap, protocol
SHA-256 | 5ad84f258fe5c1a003154863ca8dd48fbd7bb2f51969f497c4930e70efd66a4f
Secunia Security Advisory 30236
Posted May 15, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Fedora has issued an update for licq. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service).

tags | advisory, denial of service
systems | linux, fedora
SHA-256 | 97d5ee5c4a11e7e0f9a784a2147a4f106947524ebd871dfa2e979b39b4640574
Secunia Security Advisory 30055
Posted May 8, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in Licq, which can be exploited by malicious people to cause a DoS (Denial of Service).

tags | advisory, denial of service
SHA-256 | 844f60713dbe93fdcfebe756739680541a9465be4722d290f3cb63ef8999013e
Secunia Security Advisory 29821
Posted Apr 28, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Leon Juranic has reported a vulnerability in ICQ, which can be exploited by malicious people to compromise another user's system.

tags | advisory
SHA-256 | 62f126ad2e2cf9b8dbcf37bb0315f36a50674f980254cebe74d7467ace7ba296
INFIGO-2008-04-08.txt
Posted Apr 16, 2008
Authored by Leon Juranic | Site infigo.hr

INFIGO IS's security team has identified a critical remote buffer overflow vulnerability in the latest ICQ version (ICQ 6.0).

tags | advisory, remote, overflow
SHA-256 | f15fcb7c39b1de855c85925767b7a551daaddf85fabc42a30d0971f234fc959e
icq-dos.txt
Posted Mar 12, 2008
Authored by spdr

ICQ Toolbar versions 2.3 ActiveX remote denial of service exploit.

tags | exploit, remote, denial of service, activex
SHA-256 | 74da912743972bf3b6843c60fbd3962165a38f4108595d36b215ead70a4aec48
Secunia Security Advisory 29138
Posted Feb 29, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - B0B has discovered a vulnerability in ICQ, which can be exploited by malicious people to compromise another user's system.

tags | advisory
SHA-256 | 8cd4bdc461c8b3668af81cab8b6385efa35fe22fd153d6c1d3b43225b96a4911
Debian Linux Security Advisory 1433-1
Posted Dec 18, 2007
Authored by Debian | Site debian.org

Debian Security Advisory 1433-1 - Several remote vulnerabilities have been discovered in centericq, a text-mode multi-protocol instant messenger client, which could allow remote attackers to execute arbitrary code due to insufficient bounds-testing.

tags | advisory, remote, arbitrary, vulnerability, protocol
systems | linux, debian
advisories | CVE-2007-3713
SHA-256 | e379251ecccc8fb160423951ba0e6f51b36555ff93a2ca1b3ad9d02e13ab6358
Secunia Security Advisory 28103
Posted Dec 18, 2007
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Debian has issued an update for centericq. This fixes some vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially compromise a user's system.

tags | advisory, denial of service, vulnerability
systems | linux, debian
SHA-256 | f37c7ecd6d1fc496477be66beb6eec34d1fed7cc2efa13e0469b1e4426830888
centericq_421_bo_06_063.txt
Posted Jul 11, 2007
Authored by Nico Leidecker | Site portcullis-security.com

Centericq version 4.21 on FreeBSD as well as the official sources have been found vulnerable to multiple buffer overflows.

tags | advisory, overflow
systems | freebsd
SHA-256 | 695f8d41c00f3dd190485927ef216e87f08348cdcb3ef1dd4e144206e4e61c15
Secunia Security Advisory 24803
Posted Apr 11, 2007
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in ICQ, which potentially can be exploited by malicious users to compromise another user's system.

tags | advisory
SHA-256 | 7f11dde80c8d320fb9dcfc6f9aa13d6cc921ec4cba697c80377f1457191f6ebc
iDEFENSE Security Advisory 2007-04-09.1
Posted Apr 10, 2007
Authored by iDefense Labs | Site idefense.com

iDefense Security Advisory 04.09.07 - Remote exploitation of a path-traversal vulnerability in AOL's AIM and ICQ could allow a remote attacker to place arbitrary files on the victim's machine during a file transfer operation. AIM and ICQ allow users to share and transfer files via a custom protocol. During file transfers, the sender is allowed to specify the display name of the file, and the filename used for the transfer. The recipient can only specify the folder in which to save the file. Due to an input validation flaw, the clients do not properly strip "../" traversal characters from the filename the attacker supplies. By specially encoding the path attackers can force the file to be saved to a directory of their choosing when the victim accepts the file transfer. iDefense has confirmed this vulnerability in ICQ version 5.1. Previous versions are suspected vulnerable. Additionally, AOL reported that AIM version 5.9 and prior are vulnerable.

tags | advisory, remote, arbitrary, protocol
SHA-256 | b77678f991015e9042ee8fdf0028477c14990bee80af6a2365dbcc3ee31f9200
hydra-5.4-src.tar.gz
Posted Mar 24, 2007
Authored by van Hauser, thc | Site thc.org

THC-Hydra is a high quality parallelized login hacker for Samba, Smbnt, Cisco AAA, FTP, POP3, IMAP, Telnet, HTTP Auth, LDAP, NNTP, MySQL, VNC, ICQ, Socks5, PCNFS, Cisco and more. Includes SSL support, parallel scans, and is part of Nessus.

Changes: Fixes to the http modules as some Apache installations are picky. Fixed memory leaks. Performance patch added and more.
tags | web, imap
systems | cisco
SHA-256 | cd2e7e5ea479d50982b08334b1f4477a6620e6b45bc79ab55ddd07b128c64611
Gentoo Linux Security Advisory 200701-20
Posted Jan 24, 2007
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory GLSA 200701-20 - When interfacing with the LiveJournal service, Centericq does not appropriately allocate memory for incoming data, in some cases creating a buffer overflow. Versions less than or equal to 4.21.0-r2 are affected.

tags | advisory, overflow
systems | linux, gentoo
SHA-256 | a1f7767dbb2d379cb09fc4180b478e63b2d36e5bba8701fac6befa6f250e33f1
tk53-advisory-1.txt
Posted Jan 13, 2007
Authored by Lolek, Roflek

CenterICQ contains support for LiveJournal (http://www.livejournal.com/), such as posting to your own blog, reading other blogs' RSS feeds, and other community-related functions, such as showing whether a user has added or removed your own users to/from the friend list, all via a unified HTTP interface provided by LiveJournal. The latter functionality is vulnerable to a buffer overflow and possible remote code execution. Affected versions range from 4.9.11 through 4.21.0. Proof of concept exploit included.

tags | exploit, remote, web, overflow, code execution, proof of concept
SHA-256 | b6dc98674cfbf8ff44212a63d67c5667ac485c8229d5b0f0f60c18e483be0ad0
Zero Day Initiative Advisory 06-037
Posted Nov 7, 2006
Authored by Tipping Point | Site zerodayinitiative.com

A vulnerability in the America Online ICQ ActiveX Control allows attackers to execute arbitrary code on vulnerable installations. User interaction is not required to exploit this vulnerability.

tags | advisory, arbitrary, activex
advisories | CVE-2006-5650
SHA-256 | 8dd8ea66a326007a7d050d9ea761e9778457ce03c8ecef1e45a8b6f1d1f07adf
Secunia Security Advisory 22670
Posted Nov 6, 2006
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in America Online ICQ, which can be exploited by malicious people to compromise a user's system.

tags | advisory
SHA-256 | ce6708e9ec0c8993ac489608f75cea2e8888c6656fcbf48a9db10928c287e668
icq-overflow.txt
Posted Nov 1, 2006
Authored by LegendaryZion | Site zion-security.com

The Icq 2003 client is prone to a local heap overflow vulnerability in the "Answering Service" function due to a lack of bounds checking.

tags | advisory, overflow, local
SHA-256 | 4772ca26764f8ea1899dab21a55d1b2108ceaca9d4d35d45111958e8da941bbc
Armorize-ADV-2006-0005.txt
Posted Oct 20, 2006
Authored by Armorize | Site armorize.com

Armorize-ADV-2006-0005 discloses multiple cross-site scripting vulnerabilities that are found in Gcontact, which is a Web based address book written in Ajax/PHP offering multi-user, multi-contacts (email,phone,icq,msn,...) & multi-address for each person, birthday reminder by email, mailing-list management, Excel export, etc.

tags | advisory, web, php, vulnerability, xss
SHA-256 | 8c00d8f70c2d466f2cb4980a4297d1bfbf34ffdf2e3ffa80be27b73a2ed5292f
Secunia Security Advisory 21809
Posted Sep 8, 2006
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Core Security Technologies has discovered two vulnerabilities in ICQ Toolbar, which can be exploited by malicious people to conduct script insertion attacks.

tags | advisory, vulnerability
SHA-256 | ef5f219a16306565e8bdee0fc5610c9ffa34602f18f0acbbae0925dd23310379
Secunia Security Advisory 21834
Posted Sep 8, 2006
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Core Security Technologies has reported a vulnerability in ICQ Pro 2003b, which can be exploited by malicious people to compromise a user's system.

tags | advisory
SHA-256 | fda05f0a122c62bf8cea152904543f97f61b7ac90f015b1151f2db0d3d7727b1
Page 2 of 4
Back1234Next

File Archive:

October 2022

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Oct 1st
    10 Files
  • 2
    Oct 2nd
    0 Files
  • 3
    Oct 3rd
    12 Files
  • 4
    Oct 4th
    15 Files
  • 5
    Oct 5th
    18 Files
  • 6
    Oct 6th
    0 Files
  • 7
    Oct 7th
    0 Files
  • 8
    Oct 8th
    0 Files
  • 9
    Oct 9th
    0 Files
  • 10
    Oct 10th
    0 Files
  • 11
    Oct 11th
    0 Files
  • 12
    Oct 12th
    0 Files
  • 13
    Oct 13th
    0 Files
  • 14
    Oct 14th
    0 Files
  • 15
    Oct 15th
    0 Files
  • 16
    Oct 16th
    0 Files
  • 17
    Oct 17th
    0 Files
  • 18
    Oct 18th
    0 Files
  • 19
    Oct 19th
    0 Files
  • 20
    Oct 20th
    0 Files
  • 21
    Oct 21st
    0 Files
  • 22
    Oct 22nd
    0 Files
  • 23
    Oct 23rd
    0 Files
  • 24
    Oct 24th
    0 Files
  • 25
    Oct 25th
    0 Files
  • 26
    Oct 26th
    0 Files
  • 27
    Oct 27th
    0 Files
  • 28
    Oct 28th
    0 Files
  • 29
    Oct 29th
    0 Files
  • 30
    Oct 30th
    0 Files
  • 31
    Oct 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Hosting By
Rokasec
close