«
Expand/Collapse
142 items tagged "zip"
Related tags:
zip extension [+],
tugzip [+],
extension [+],
exploits [+],
day [+],
null pointer [+],
proof [+],
name [+],
libzip [+],
zipgenius [+],
vulnerability [+],
tool [+],
remote buffer overflow [+],
openmyzip [+],
based buffer overflow [+],
zipcentral [+],
zip name [+],
tool packages [+],
security scanner [+],
security checks [+],
security [+],
quickzip [+],
poc [+],
mikeyzip [+],
microsoft windows [+],
malicious attacker [+],
limny [+],
jtiny [+],
inclusion [+],
heap [+],
corruption [+],
cms [+],
buck security [+],
buck [+],
zipper [+],
wizard [+],
version [+],
vallen [+],
unzip [+],
system [+],
remote buffer overflow vulnerability [+],
memory corruption [+],
memory [+],
mandriva linux [+],
mandriva [+],
linux security [+],
linux [+],
ezip wizard [+],
ezip [+],
archive [+],
archiv [+],
arbitrary code [+],
zipx [+],
zipitfast [+],
zip proof [+],
zip internet [+],
wireshark [+],
windows version [+],
windows [+],
win [+],
webraider [+],
vmware [+],
virtual machine [+],
unix flavors [+],
txt [+],
traffic generator [+],
stock [+],
stack [+],
smart security [+],
shellzip [+],
shell out [+],
seh [+],
scoopyng [+],
scanner service [+],
sap logon [+],
sap gui [+],
rootkits [+],
rogue [+],
remote [+],
ravage [+],
quiksoft reverse [+],
quality tool [+],
process dumper [+],
process [+],
packet traffic [+],
ostinato [+],
oracle [+],
nsopoc [+],
nod32 antivirus [+],
ninga [+],
microsoft [+],
master password [+],
malware [+],
lzh [+],
kitrap [+],
jerry [+],
internetexploiter [+],
internet exploiter [+],
hide folder [+],
ftpd [+],
freeunhidefolder [+],
freebsd [+],
forgery [+],
execution [+],
eset [+],
escalation [+],
dos [+],
document capture [+],
disclosure [+],
dhcp server [+],
detection mechanisms [+],
dep [+],
demonstration code [+],
cve [+],
crash [+],
chimichurri [+],
buffer overflow exploit [+],
beta 3 [+],
beta [+],
asset [+],
antimeter [+],
aim application [+],
aim [+],
administrator account [+],
active x control [+],
active x [+],
buffer overflow [+],
buffer overflow vulnerability [+],
zip file [+],
zipwrangler [+],
zippho [+],
zipitfree [+],
zip v1 [+],
zip code [+],
vulnerable [+],
util [+],
urgent [+],
unspecified [+],
unicode [+],
traffic [+],
streamarmor [+],
stack overflow [+],
squipy [+],
speed commander [+],
sophisticated tool [+],
shell [+],
segmentation fault [+],
searcher [+],
python [+],
proxy server [+],
proxy [+],
pro zip [+],
php shell [+],
peazip [+],
party [+],
overflow vulnerability [+],
oracle java [+],
optimal [+],
netzip [+],
local buffer overflow [+],
local [+],
keimpx [+],
jzip [+],
java [+],
itsecteam [+],
image viewer [+],
hidden streams [+],
easyzip 2000 [+],
easyzip [+],
dnsspoofer [+],
dnsfucker [+],
dns spoofing [+],
devshell [+],
cutezip [+],
credentials [+],
coolzip [+],
commander [+],
command execution [+],
clickunzip [+],
classic [+],
chilkatzip [+],
chilkat [+],
cgi backdoor [+],
cgi [+],
brazip [+],
arbitrary command [+],
anyzip [+],
alternate data streams [+],
abc [+],
denial of service [+],
stack buffer [+],
service vulnerability [+],
file [+],
php [+],
buffer [+],
proof of concept [+]
-
-
17:00
»
SecuriTeam
CuteZip is prone to a buffer-overflow vulnerability because it fails to perform adequate boundary checks on user-supplied data.
-
-
17:00
»
SecuriTeam
ZipItFast PRO is prone to a heap-based buffer-overflow vulnerability because it fails to perform adequate boundary checks on user-supplied data.
-
-
17:00
»
SecuriTeam
ZipItFree is prone to a heap-based buffer-overflow vulnerability because it fails to perform adequate boundary checks on user-supplied data.
-
-
18:37
»
Packet Storm Security Advisories
PRE-CERT Security Advisory - The function countCENHeaders() in zip_util.c of the java.util.zip implementation contains an off-by-one bug. The bug can be exploited via corrupted ZIP files to cause an endless recursion. The endless recursion results in a segmentation fault of the JVM. Oracle Java SE and IcedTea6 have multiple affected versions.
-
-
18:51
»
Packet Storm Security Exploits
This Metasploit module exploits a stack-based buffer overflow vulnerability in the latest version 3.5 of TugZip archiving utility. In order to trigger the vulnerability, an attacker must convince someone to load a specially crafted zip file with TugZip by double click or file open. By doing so, an attacker can execute arbitrary code as the victim user.
-
18:51
»
Packet Storm Security Recent Files
This Metasploit module exploits a stack-based buffer overflow vulnerability in the latest version 3.5 of TugZip archiving utility. In order to trigger the vulnerability, an attacker must convince someone to load a specially crafted zip file with TugZip by double click or file open. By doing so, an attacker can execute arbitrary code as the victim user.
-
18:51
»
Packet Storm Security Misc. Files
This Metasploit module exploits a stack-based buffer overflow vulnerability in the latest version 3.5 of TugZip archiving utility. In order to trigger the vulnerability, an attacker must convince someone to load a specially crafted zip file with TugZip by double click or file open. By doing so, an attacker can execute arbitrary code as the victim user.
-
-
21:20
»
Packet Storm Security Exploits
This Metasploit module exploits a stack buffer overflow in ZipGenius version 6.3.2.3000. It creates a specially crafted .zip file that allows an attacker to execute arbitrary code.
-
21:20
»
Packet Storm Security Recent Files
This Metasploit module exploits a stack buffer overflow in ZipGenius version 6.3.2.3000. It creates a specially crafted .zip file that allows an attacker to execute arbitrary code.
-
21:20
»
Packet Storm Security Misc. Files
This Metasploit module exploits a stack buffer overflow in ZipGenius version 6.3.2.3000. It creates a specially crafted .zip file that allows an attacker to execute arbitrary code.
-
-
22:04
»
Packet Storm Security Advisories
Mandriva Linux Security Advisory 2011-099 - The _zip_name_locate function in zip_name_locate.c in the Zip extension in PHP before 5.3.6 does not properly handle a ZIPARCHIVE::FL_UNCHANGED argument, which might allow context-dependent attackers to cause a denial of service via an empty ZIP archive that is processed with a statName operation.
-
22:04
»
Packet Storm Security Recent Files
Mandriva Linux Security Advisory 2011-099 - The _zip_name_locate function in zip_name_locate.c in the Zip extension in PHP before 5.3.6 does not properly handle a ZIPARCHIVE::FL_UNCHANGED argument, which might allow context-dependent attackers to cause a denial of service via an empty ZIP archive that is processed with a statName operation.
-
22:04
»
Packet Storm Security Misc. Files
Mandriva Linux Security Advisory 2011-099 - The _zip_name_locate function in zip_name_locate.c in the Zip extension in PHP before 5.3.6 does not properly handle a ZIPARCHIVE::FL_UNCHANGED argument, which might allow context-dependent attackers to cause a denial of service via an empty ZIP archive that is processed with a statName operation.
-
-
17:13
»
Packet Storm Security Recent Files
This tool is a proof of concept utility that demonstrates how CleanerSoft's Free Hide Folder is insecure. It uncovers the master password, shows what folders are hidden and can unhide them.
-
17:10
»
Packet Storm Security Exploits
This tool is a proof of concept utility that demonstrates how CleanerSoft's Free Hide Folder is insecure. It uncovers the master password, shows what folders are hidden and can unhide them.
-
-
21:02
»
Packet Storm Security Tools
DnsFucker is a DNS spoofing tool. It can be used effectively in both packet switched and hubbed networks. Written in Python.
-
-
13:02
»
Packet Storm Security Tools
Ostinato is an open-source, cross-platform packet/traffic generator and analyzer with a friendly GUI. It aims to be Wireshark in Reverse and thus become complementary to Wireshark. This is the windows binary release.
-
13:02
»
Packet Storm Security Recent Files
Ostinato is an open-source, cross-platform packet/traffic generator and analyzer with a friendly GUI. It aims to be Wireshark in Reverse and thus become complementary to Wireshark. This is the windows binary release.
-
-
23:01
»
Packet Storm Security Tools
ScoopyNG combines the detection tricks of Scoopy Doo and Jerry as well as some new techniques to determine if a current OS is running inside a VMware Virtual Machine (VM) or on a native system. ScoopyNG should work on all modern uni-, multi- and multi-core cpu's. ScoopyNG is able to detect VMware even if anti-detection-mechanisms are deployed.
-
23:01
»
Packet Storm Security Tools
Process Dumper is able to make a dump of a running process in a forensical manner. Windows version.
-
23:00
»
Packet Storm Security Recent Files
ScoopyNG combines the detection tricks of Scoopy Doo and Jerry as well as some new techniques to determine if a current OS is running inside a VMware Virtual Machine (VM) or on a native system. ScoopyNG should work on all modern uni-, multi- and multi-core cpu's. ScoopyNG is able to detect VMware even if anti-detection-mechanisms are deployed.
-
23:00
»
Packet Storm Security Recent Files
Process Dumper is able to make a dump of a running process in a forensical manner. Windows version.
-
-
21:00
»
Packet Storm Security Recent Files
Buck-Security is a security scanner for Debian and Ubuntu Linux. It helps you to harden your system by running some important security checks. For example, it finds world-writable files and directories, setuid and setgid programs, superuser accounts, and installed attack tool packages. It also checks your umask and checks if the sticky bit is set for /tmp, among other checks.
-
20:00
»
Packet Storm Security Tools
Buck-Security is a security scanner for Debian and Ubuntu Linux. It helps you to harden your system by running some important security checks. For example, it finds world-writable files and directories, setuid and setgid programs, superuser accounts, and installed attack tool packages. It also checks your umask and checks if the sticky bit is set for /tmp, among other checks.
-
-
21:36
»
Packet Storm Security Tools
StreamArmor is a sophisticated tool for discovering hidden alternate data streams (ADS) that can also clean them completely from the system. StreamArmor comes with a fast multi-threaded ADS scanner which can recursively scan over the entire system and quickly uncover all hidden streams. All such discovered streams are represented using specific color patterns based on threat level which makes it easy for human eye to distinguish between suspicious and normal streams.
-
21:36
»
Packet Storm Security Tools
The Asset Integrity Manager (AIM) application was designed to detect rootkits on various UNIX flavors and has the capability to organize client/asset information.
-
21:36
»
Packet Storm Security Recent Files
The Asset Integrity Manager (AIM) application was designed to detect rootkits on various UNIX flavors and has the capability to organize client/asset information.
-
-
23:00
»
Packet Storm Security Tools
Buck-Security is a security scanner for Debian and Ubuntu Linux. It helps you to harden your system by running some important security checks. For example, it finds world-writable files and directories, setuid and setgid programs, superuser accounts, and installed attack tool packages. It also checks your umask and checks if the sticky bit is set for /tmp, among other checks.
-
23:00
»
Packet Storm Security Recent Files
Buck-Security is a security scanner for Debian and Ubuntu Linux. It helps you to harden your system by running some important security checks. For example, it finds world-writable files and directories, setuid and setgid programs, superuser accounts, and installed attack tool packages. It also checks your umask and checks if the sticky bit is set for /tmp, among other checks.
-
-
19:43
»
Packet Storm Security Tools
WebRaider is a proof of concept quality tool to get a reverse shell out of SQL injection (MS-SQL) by using One Click Ownage.
-
-
17:00
»
Packet Storm Security Recent Files
Limny CMS version 2.0 suffers from a cross site request forgery vulnerability that allows for a malicious attacker to have an administrator account created. Proof of concept code included.
-
17:00
»
Packet Storm Security Recent Files
Limny CMS version 2.0 suffers from a cross site request forgery vulnerability that allows for a malicious attacker to have an account's password and email address changed. Proof of concept code included.
-
17:00
»
Packet Storm Security Exploits
Limny CMS version 2.0 suffers from a cross site request forgery vulnerability that allows for a malicious attacker to have an administrator account created. Proof of concept code included.
-
17:00
»
Packet Storm Security Exploits
Limny CMS version 2.0 suffers from a cross site request forgery vulnerability that allows for a malicious attacker to have an account's password and email address changed. Proof of concept code included.