exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 25 of 49 RSS Feed

Files Date: 2007-04-11

Ubuntu Security Notice 451-1
Posted Apr 11, 2007
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 451-1 - The kernel key management code did not correctly handle key reuse. A local attacker could create many key requests, leading to a denial of service. The kernel NFS code did not correctly validate NFSACL2 ACCESS requests. If a system was serving NFS mounts, a remote attacker could send a specially crafted packet, leading to a denial of service. When dumping core, the kernel did not correctly handle PT_INTERP processes. A local attacker could create situations where they could read the contents of otherwise unreadable executable programs.

tags | advisory, remote, denial of service, kernel, local
systems | linux, ubuntu
advisories | CVE-2007-0006, CVE-2007-0772, CVE-2007-0958
SHA-256 | ff3824ab5fb0d91b93cf9fd86ef36b10445d9258052d8e2ae3f5c67eb9e29834
Mandriva Linux Security Advisory 2007.080
Posted Apr 11, 2007
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory - Local exploitation of a memory corruption vulnerability in the X.Org and XFree86 X server could allow an attacker to execute arbitrary code with privileges of the X server, typically root. iDefense reported two integer overflows in the way X.org handled various font files. A malicious local user could exploit these issues to potentially execute arbitrary code with the privileges of the X.org server.

tags | advisory, overflow, arbitrary, local, root
systems | linux, mandriva
advisories | CVE-2007-1003, CVE-2007-1351, CVE-2007-1352
SHA-256 | 3b1c1631f20743de09f36c1b9347ec5d750ad65a0831fd14b5f97665d3ee9d84
Mandriva Linux Security Advisory 2007.081
Posted Apr 11, 2007
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory - iDefense integer overflows in the way freetype handled various font files. A malicious local user could exploit these issues to potentially execute arbitrary code.

tags | advisory, overflow, arbitrary, local
systems | linux, mandriva
advisories | CVE-2007-1351
SHA-256 | bc6cbfe05e8ed044092c8a0a2255e89e4673cf27af3a68a15c9ae33150f3e5da
Technical Cyber Security Alert 2007-100A
Posted Apr 11, 2007
Authored by US-CERT | Site us-cert.gov

Technical Cyber Security Alert TA07-100A - Microsoft has released updates that address critical vulnerabilities in Microsoft Windows and Microsoft Content Management Server. Exploitation of these vulnerabilities could allow a remote, unauthenticated attacker to execute arbitrary code or cause a denial of service on a vulnerable system.

tags | advisory, remote, denial of service, arbitrary, vulnerability
systems | windows
SHA-256 | 74f6e787e66d07b6ade59058fb26ddbbc68deca40a3bd9da5411e25573279530
Mandriva Linux Security Advisory 2007.077
Posted Apr 11, 2007
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory - A vulnerability was found in the username handling of the MIT krb5 telnet daemon. A remote attacker that could access the telnet port of a target machine could login as root without requiring a password. Buffer overflows in the kadmin server daemon were discovered that could be exploited by a remote attacker able to access the KDC. Successful exploitation could allow for the execution of arbitrary code with the privileges of the KDC or kadmin server processes. Finally, a double-free flaw was discovered in the GSSAPI library used by the kadmin server daemon, which could lead to a denial of service condition or the execution of arbitrary code with the privileges of the KDC or kadmin server processes.

tags | advisory, remote, denial of service, overflow, arbitrary, root
systems | linux, mandriva
advisories | CVE-2007-0956, CVE-2007-0957, CVE-2007-1216
SHA-256 | 6a6d99a418acc8305f4de65a97346cfbfc444a7240458f96d1bbc4da290014ae
iDEFENSE Security Advisory 2007-04-10.1
Posted Apr 11, 2007
Authored by iDefense Labs, Greg MacManus | Site idefense.com

iDefense Security Advisory 04.10.07 - Remote exploitation of a buffer overflow vulnerability in the Universal Plug-and-Play (UPnP) component of Microsoft Windows could allow an attacker to execute code in the context of the vulnerable service. The vulnerability specifically exists in the handling of HTTP headers sent to the UPnP control point as part of a request or notification. Because it processes certain fields without checking if there is enough storage space, a malicious request may cause a stack-based buffer overflow, potentially resulting in code execution.

tags | advisory, remote, web, overflow, code execution
systems | windows
advisories | CVE-2007-1204
SHA-256 | ab4897dd132f3ada926ed5cc95e25ce1257277131f313e19bec3542fc3a1c865
secunia-maurl.txt
Posted Apr 11, 2007
Authored by Carsten Eiram, JJ Reyes | Site secunia.com

Secunia Research has discovered a vulnerability in Microsoft Windows, which can be exploited by malicious people to compromise a user's system. The vulnerability is caused due to an error in Microsoft Agent (agentsvr.exe) when processing specially crafted URLs passed as arguments to certain methods. Successful exploitation allows execution of arbitrary code when a user e.g. visits a malicious website with Internet Explorer.

tags | advisory, arbitrary
systems | windows
advisories | CVE-2007-1205
SHA-256 | bdde87351842554b64a7f572e06a8bf191f711e8287cec7413c92c3510614663
poc301-rfi.txt
Posted Apr 11, 2007
Authored by SekoMirza

PhpOpenChat versions 3.0.1 and below suffer from multiple remote file inclusion vulnerabilities in poc.php.

tags | exploit, remote, php, vulnerability, code execution, file inclusion
SHA-256 | a2073ab4ed90293a48b1907c942e35622b9490073ac86eadc7034651da231515
EEYE-csrss.txt
Posted Apr 11, 2007
Authored by Derek Soeder | Site eeye.com

eEye Digital Security has discovered a local privilege escalation vulnerability in Windows Vista that allows a program executing without privileges to fully compromise an affected system. A malicious user or malware program could exploit this vulnerability to execute arbitrary code with SYSTEM privileges within the CSRSS process, permitting the bypass of Vista's vaunted user privilege limitations and administrator approval mode. By establishing and closing multiple connections to CSRSS's "ApiPort", an application may cause a private data structure within CSRSS that describes its process to be used after it has been freed, creating an exploitable "dangling pointer" condition. This vulnerability is entirely separate from the CSRSS NtRaiseHardError message box flaw publicly disclosed in December 2006, although both affect code within the CSRSS process. It is interesting to note that this vulnerability only affects Windows Vista, due to new, flawed code added to CSRSRV.DLL in support of functionality introduced in Vista.

tags | advisory, arbitrary, local
systems | windows
SHA-256 | 9e3f9423f653ac1b326017f5be448337555ba6f9473c7cb24c27270a9d983e2d
EEYE-vdmzero.txt
Posted Apr 11, 2007
Authored by Derek Soeder | Site eeye.com

eEye Digital Security has discovered a local privilege escalation vulnerability in the Windows kernel that allows an unprivileged user with the ability to execute a program to fully compromise an affected system. All x86 versions of Windows up to and including Windows Server 2003 SP2 are vulnerable. The Windows kernel's Virtual DOS Machine (VDM) implementation features a race condition through which a malicious program can modify the first 4KB page of physical memory (also known as the "zero page"). The data in this region of memory is trusted and may be subsequently used by other Virtual DOS Machines, including a VDM instantiated by the Windows kernel as part of hibernating or effecting a blue-screen crash. Exploitation of this vulnerability therefore allows arbitrary code to run within other users' VDM processes, and even within the kernel if hibernation or a blue-screen can be provoked by any available means.

tags | advisory, arbitrary, x86, kernel, local
systems | windows
SHA-256 | caf6c1119af3dab28ff1f2c0a10db34ba618823144b84c2fc3c5d0c70a778133
AKLINK-SA-2007-002.txt
Posted Apr 11, 2007
Authored by Alexander Klink | Site cynops.de

DropAFew versions 0.2 and below suffer from SQL injection vulnerabilities.

tags | exploit, vulnerability, sql injection
advisories | CVE-2007-1363, CVE-2007-1364
SHA-256 | d70a0ebccd74c188c38dd1d78303d396a7e2aa349786b47a134cca14004840c7
defcon2007-cfp.txt
Posted Apr 11, 2007
Site defcon.org

Papers and presentations are now being accepted for DEFCON 15, the conference your mother and ISC(2) warned you about. DEFCON will take place at the Riviera in Las Vegas, NV, USA, August 3-5, 2007.

tags | paper, conference
SHA-256 | f0d57c5c8b36f9fa407ce4965d1aa7b8ee4250dac44e402c6474213d37f7e67c
kadmind-overflow.txt
Posted Apr 11, 2007
Authored by c0ntex | Site open-security.org

Kerberos version 1.5.1 kadmind remote root buffer overflow exploit.

tags | exploit, remote, overflow, root
advisories | CVE-2007-0957
SHA-256 | e8db9a1943cc4ec249fdac17fbfedb8363cfeb66696583954fa18de60266c597
plphp-multi.txt
Posted Apr 11, 2007
Authored by Omnipresent

pL-PHP beta version 0.9 suffers from SQL injection, administrative bypass, and local file inclusion vulnerabilities.

tags | exploit, local, php, vulnerability, sql injection, file inclusion
SHA-256 | 55781adadecc25967793eb70dfce2465b352aec8c5eb04c30ed289f92567a30e
taskhopper-rfi.txt
Posted Apr 11, 2007
Authored by Cold z3ro | Site hack-teach.com

The Joomla/Mambo component Taskhopper version 1.1 suffer from a remote file inclusion vulnerability.

tags | exploit, remote, code execution, file inclusion
SHA-256 | 82123d7e8605ff2f6576a1286d87930aac9f0074087fd3cb9f388c556666edfa
inout-exec.txt
Posted Apr 11, 2007
Authored by BlackHawk | Site itablackhawk.altervista.org

InoutMailingListManager versions 3.1 and below remote command execution exploit.

tags | exploit, remote
SHA-256 | 2e67e5d4cfd708352305417789b2ff5bd75ad09dd076ff3d57e9ce2ff734d828
creabook-bypass.txt
Posted Apr 11, 2007
Authored by Xst3nZ

Crea-Book versions 1.0 and below suffer from administrative bypass, database disclosure, and code execution flaws.

tags | exploit, code execution, bypass
SHA-256 | 4e96baf238f03a998aec9797a04a922034e438cc3596c49b73a64a66e1c89c6f
weatimages-rfi.txt
Posted Apr 11, 2007
Authored by Co-Sarper-Der

Weatimages versions 1.7.1 and below suffer from a remote file inclusion vulnerability.

tags | exploit, remote, code execution, file inclusion
SHA-256 | c486e7252cd5fdc10d235f3ebbebde7f3bc64284068131abf74da34512754a7f
pgs-rfi.txt
Posted Apr 11, 2007
Authored by z12xxa

phpGalleryScript version 1.0 suffers from a remote file inclusion vulnerability.

tags | exploit, remote, code execution, file inclusion
SHA-256 | ba863c12f0e2db29b6f7e1869fb4a42f53cb839420d5e8edd85fb0f3a4152fa7
hgb-exec.txt
Posted Apr 11, 2007
Authored by Dj7xpl

HIOX Guest Book (HGB) version 4.0 suffers from a remote code execution vulnerability.

tags | exploit, remote, code execution
SHA-256 | d39ba099a2a60f418aa63783b6c5533200394c780cdf16f9f80e8ff1bca2eef8
Secunia Security Advisory 22896
Posted Apr 11, 2007
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Secunia Research has discovered a vulnerability in Microsoft Windows, which can be exploited by malicious people to compromise a user's system.

tags | advisory
systems | windows
SHA-256 | c72fe4566bf9790025f1281c245b916418dff7c447485de4ac3eefa640e5924a
Secunia Security Advisory 24747
Posted Apr 11, 2007
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in AOL Instant Messenger (AIM), which potentially can be exploited by malicious users to compromise another user's system.

tags | advisory
SHA-256 | c082be7fc379098667a39542620969a6e777a748578a0c9fc15ce2f38c30e7f5
Secunia Security Advisory 24793
Posted Apr 11, 2007
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in the Linux Kernel, which can be exploited by malicious people to cause a DoS (Denial of Service).

tags | advisory, denial of service, kernel
systems | linux
SHA-256 | 0f739da6969f0e2b28aa0a1e2aa1174802098b087df439518629c2d84186e693
Secunia Security Advisory 24796
Posted Apr 11, 2007
Authored by Secunia | Site secunia.com

Secunia Security Advisory - BeyazKurt has reported a vulnerability in ScarNews, which can be exploited by malicious people to compromise a vulnerable system.

tags | advisory
SHA-256 | 2705e6274131ebff26240ad16993913e5ccae75f1454cfdf255b6df518f9dc57
Secunia Security Advisory 24802
Posted Apr 11, 2007
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Kacper has reported a vulnerability in SmodBIP, which can be exploited by malicious people to conduct SQL injection attacks.

tags | advisory, sql injection
SHA-256 | 70567ef9ad53ae3c0d55d618f812473e10f51025727727eb459bfddb809925db
Page 1 of 2
Back12Next

File Archive:

November 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    30 Files
  • 2
    Nov 2nd
    0 Files
  • 3
    Nov 3rd
    0 Files
  • 4
    Nov 4th
    12 Files
  • 5
    Nov 5th
    44 Files
  • 6
    Nov 6th
    18 Files
  • 7
    Nov 7th
    9 Files
  • 8
    Nov 8th
    8 Files
  • 9
    Nov 9th
    3 Files
  • 10
    Nov 10th
    0 Files
  • 11
    Nov 11th
    14 Files
  • 12
    Nov 12th
    20 Files
  • 13
    Nov 13th
    63 Files
  • 14
    Nov 14th
    18 Files
  • 15
    Nov 15th
    8 Files
  • 16
    Nov 16th
    0 Files
  • 17
    Nov 17th
    0 Files
  • 18
    Nov 18th
    18 Files
  • 19
    Nov 19th
    7 Files
  • 20
    Nov 20th
    13 Files
  • 21
    Nov 21st
    6 Files
  • 22
    Nov 22nd
    48 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    60 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    44 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close