exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 14 of 14 RSS Feed

Files from Radu State

Email addressstate at loria.fr
First Active2007-03-20
Last Active2007-12-06
cisco7940-dos.txt
Posted Dec 6, 2007
Authored by Radu State, Humberto J. Abdelnur, Olivier Festor

The Cisco 7940 is susceptible to a denial of service vulnerability when sent a sequence of SIP INVITE transactions. Demonstration exploit included.

tags | exploit, denial of service
systems | cisco
SHA-256 | a26c3e610685427175a09dd9c6263f17dfcce7d29309566957189aa762b24539
nokia-dos.txt
Posted Dec 6, 2007
Authored by Radu State, Humberto J. Abdelnur, Olivier Festor

The Nokia RM-159 version 12.0.013 suffers from a denial of service vulnerability when accepting a special sequence of SIP messages. Demonstration exploit included.

tags | exploit, denial of service
SHA-256 | 982d32bb063c52ac57973b7647ceca386a41fd00f3d6fafc909e609396e52d0c
sip-fraud.txt
Posted Nov 5, 2007
Authored by Radu State, Humberto J. Abdelnur, Olivier Festor

SIP digest access authentication relay-attack for toll fraud.

tags | exploit
SHA-256 | ca104a5ef7c3ae9a777acdbf17be3e4db54266bec27c9beeaaf57be66696e2c5
phone-sqlxss.txt
Posted Oct 23, 2007
Authored by Radu State, Humberto J. Abdelnur, Olivier Festor

A SQL injection vulnerability exist in asterisk-addons and cross site scripting vulnerabilities exist in the web applications of Areski, FreePBX, and Trixbox. Proof of concept exploit included.

tags | exploit, web, vulnerability, xss, sql injection, proof of concept
SHA-256 | ac8845577d7b8ecd690c7c048b6fcd61fa4a4faf29e65522cf671da1bc0d25c4
AST-2007-023-poc.txt
Posted Oct 18, 2007
Authored by Radu State, Humberto J. Abdelnur, Olivier Festor | Site asterisk.org

Proof of concept exploit for the SQL injection vulnerability in Asterisk.

tags | exploit, sql injection, proof of concept
advisories | CVE-2007-5488
SHA-256 | 8b8626ec6a5addd7cb7920e989ccfc1fd63961b0ddb8279ce50445a78a0b1c10
ciscosip.txt
Posted Oct 15, 2007
Authored by Radu State, Humberto J. Abdelnur, Olivier Festor

Cisco CallManager and OpenSer suffer from a SIP toll fraud and authentication forward vulnerability.

tags | advisory
systems | cisco
SHA-256 | 307fabedfcbf506fb99a6552995cc77ab972b432724e2f4f2db52c932554bc72
sip-pwn.txt
Posted Oct 10, 2007
Authored by Radu State

The Linksys SPA-941 version 5.1.8 is susceptible to a cross site scripting vulnerability using SIP as a vector of attack.

tags | exploit, xss
SHA-256 | 0958d5a7f2e07f89b846c84b23a0dcf0bafece8411139aa26cd887a7b529b58f
thomsonsip-dos.txt
Posted Aug 24, 2007
Authored by Radu State, Humberto J. Abdelnur, Olivier Festor

The Thomson ST2030 SIP phone is susceptible to a denial of service vulnerability. Exploit included.

tags | exploit, denial of service
SHA-256 | fcc85d3d9b95f6bd30e103330b1aa858315aa973f24e7a77ced2548d94dbb610
grandstream-sip.txt
Posted Aug 23, 2007
Authored by Radu State, Humberto J. Abdelnur, Olivier Festor

The Grandstream SIP phone version GXV-3000 is susceptible to a denial of service vulnerability. Exploit included.

tags | exploit, denial of service
SHA-256 | 32216d7b8392c28bf46b588489ed61b7c1cd81e8d5af31403d8cc63041a20496
cisco-stateful-dos.txt
Posted Aug 21, 2007
Authored by Radu State

The Cisco 7940 phone is susceptible to a denial of service vulnerability when sent ten specially crafted SIP messages. Demonstration exploit included.

tags | exploit, denial of service
systems | cisco
SHA-256 | b5c33d9a6426c46d3becf4aa32e3e428f63412cdcf1674b31961ebc4b12302cc
cisco-dos.txt
Posted Aug 21, 2007
Authored by Radu State

The Cisco 7940 is susceptible to a denial of service vulnerability when sent three specially crafted SIP messages. Demonstration exploit included.

tags | exploit, denial of service
systems | cisco
SHA-256 | 134337ca6ad629cf4af363ffced7f718f0a59e26375e2aa87831e28d21612a40
asterisk-Invite.txt
Posted Mar 27, 2007
Authored by Radu State, Humberto J. Abdelnur, Olivier Festor

Proof of concept denial of service exploit for the Asterisk PBX that is susceptible to a remote denial of service vulnerability via a specially crafted INVITE message. Affected versions include 1.2.14, 1.2.15, 1.2.16, 1.4.1, and possibly earlier versions.

tags | exploit, remote, denial of service, proof of concept
SHA-256 | b028e135458f7be56bb5ab0eb5c49917c790fb16790858835b945e63e1a08061
grandstream-dos.txt
Posted Mar 22, 2007
Authored by Radu State, Humberto J. Abdelnur, Olivier Festor | Site madynes.loria.fr

The Grandstream Budge Tone-200 IP phone is susceptible to denial of service attacks. Exploit included.

tags | exploit, denial of service
SHA-256 | f5dc93dad4bacbdee275a437be8193e1f363f792cc4ec290c051f0122df4f5cf
asterisk-dos.txt
Posted Mar 20, 2007
Authored by Radu State, Humberto J. Abdelnur, Olivier Festor

The Asterisk PBX is susceptible to a remote denial of service vulnerability via a specially crafted INVITE message. Affected versions include 1.2.14, 1.2.15, 1.2.16, 1.4.1, and possibly earlier versions.

tags | advisory, remote, denial of service
SHA-256 | dcea662ad08cea899e48c0048baa82b147423db4985672cd1bb981e6a9194636
Page 1 of 1
Back1Next

File Archive:

March 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Mar 1st
    16 Files
  • 2
    Mar 2nd
    0 Files
  • 3
    Mar 3rd
    0 Files
  • 4
    Mar 4th
    32 Files
  • 5
    Mar 5th
    28 Files
  • 6
    Mar 6th
    42 Files
  • 7
    Mar 7th
    17 Files
  • 8
    Mar 8th
    13 Files
  • 9
    Mar 9th
    0 Files
  • 10
    Mar 10th
    0 Files
  • 11
    Mar 11th
    15 Files
  • 12
    Mar 12th
    19 Files
  • 13
    Mar 13th
    21 Files
  • 14
    Mar 14th
    38 Files
  • 15
    Mar 15th
    15 Files
  • 16
    Mar 16th
    0 Files
  • 17
    Mar 17th
    0 Files
  • 18
    Mar 18th
    10 Files
  • 19
    Mar 19th
    32 Files
  • 20
    Mar 20th
    46 Files
  • 21
    Mar 21st
    16 Files
  • 22
    Mar 22nd
    13 Files
  • 23
    Mar 23rd
    0 Files
  • 24
    Mar 24th
    0 Files
  • 25
    Mar 25th
    12 Files
  • 26
    Mar 26th
    31 Files
  • 27
    Mar 27th
    19 Files
  • 28
    Mar 28th
    42 Files
  • 29
    Mar 29th
    0 Files
  • 30
    Mar 30th
    0 Files
  • 31
    Mar 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close