exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 5 of 5 RSS Feed

Files from Collin Mulliner

Email addresscollin.mulliner at sit.fraunhofer.de
First Active2006-08-27
Last Active2009-06-19
Nokia Denial Of Service / Spoofing
Posted Jun 19, 2009
Authored by Collin Mulliner

The Nokia 6212 Classic suffers from denial of service and URL spoofing vulnerabilities.

tags | advisory, denial of service, spoof, vulnerability
SHA-256 | f924130f46c774dfe95a5814310493331cfaa964f415837fbb22a8db6ce22bd6
iPhone Safari Phone Auto Dial
Posted Jun 19, 2009
Authored by Collin Mulliner

Safari on the Apple iPhone suffers from a vulnerability that allows an attacker to auto-dial a number.

tags | exploit
systems | apple, iphone
SHA-256 | 750d96b2e5b025f4f460cec5ea7897e6f417588a419c661fea5d7b95be167b5c
nokia-spoof.txt
Posted Aug 18, 2008
Authored by Collin Mulliner

The Nokia 6131 NFC mobile phone suffers from URI/URL spoofing vulnerabilities.

tags | exploit, spoof, vulnerability
SHA-256 | 56973b2ee36d33e3f30c5601df9e1e0b0815ab273c2f6bdc529634b2c78d9567
raidsonic-disclose.txt
Posted Mar 17, 2008
Authored by Collin Mulliner | Site mulliner.org

RaidSonic version 2.6.0-n stores the encryption key in plain text on an unencrypted partition.

tags | exploit, info disclosure
SHA-256 | 7236f5bb5c52ecb5f0e6dac6ef96f1543f48c62d8f7ac948c37e43a6bc110d9b
pocketpc.txt
Posted Aug 27, 2006
Authored by Collin Mulliner, Prof. Giovanni Vigna

MMS composer versions 1.5.5.6 and 2.0.0.13 suffer from multiple buffer overflows in the MMS parsing code allowing for arbitrary code execution and denial of service conditions.

tags | advisory, denial of service, overflow, arbitrary, code execution
SHA-256 | 85797acd23078e7a0402ffbedbb3a17a3a05d8df947fd121802d1fb83dc94927
Page 1 of 1
Back1Next

File Archive:

May 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    May 1st
    44 Files
  • 2
    May 2nd
    5 Files
  • 3
    May 3rd
    11 Files
  • 4
    May 4th
    0 Files
  • 5
    May 5th
    0 Files
  • 6
    May 6th
    28 Files
  • 7
    May 7th
    3 Files
  • 8
    May 8th
    4 Files
  • 9
    May 9th
    53 Files
  • 10
    May 10th
    0 Files
  • 11
    May 11th
    0 Files
  • 12
    May 12th
    0 Files
  • 13
    May 13th
    0 Files
  • 14
    May 14th
    0 Files
  • 15
    May 15th
    0 Files
  • 16
    May 16th
    0 Files
  • 17
    May 17th
    0 Files
  • 18
    May 18th
    0 Files
  • 19
    May 19th
    0 Files
  • 20
    May 20th
    0 Files
  • 21
    May 21st
    0 Files
  • 22
    May 22nd
    0 Files
  • 23
    May 23rd
    0 Files
  • 24
    May 24th
    0 Files
  • 25
    May 25th
    0 Files
  • 26
    May 26th
    0 Files
  • 27
    May 27th
    0 Files
  • 28
    May 28th
    0 Files
  • 29
    May 29th
    0 Files
  • 30
    May 30th
    0 Files
  • 31
    May 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close