exploit the possibilities
Showing 26 - 50 of 63 RSS Feed

Operating System: Windows Vista

Microsoft SRV2.SYS SMB Negotiate ProcessID Function Table Dereference
Posted Feb 26, 2010
Authored by H D Moore, laurent gaffie, sf | Site metasploit.com

This Metasploit module exploits an out of bounds function table dereference in the SMB request validation code of the SRV2.SYS driver included with Windows Vista, Windows 7 release candidates (not RTM), and Windows 2008 Server prior to R2. Windows Vista without SP1 does not seem affected by this flaw.

tags | exploit
systems | windows, vista, 7
advisories | CVE-2009-3103
MD5 | 3020f10279af4ec16b64a2fdc43b26b2
Microsoft SRV2.SYS SMB Negotiate ProcessID Function Table Dereference
Posted Sep 29, 2009
Authored by laurent gaffie

This Metasploit module exploits an out of bounds function table dereference in the SMB request validation code of the SRV2.SYS driver included with Windows Vista, Windows 7 release candidates (not RTM), and Windows 2008 Server prior to R2. Windows Vista without SP1 does not seem affected by this flaw.

tags | exploit
systems | windows, vista, 7
advisories | CVE-2009-3103
MD5 | bd62fbcf8cbf9573b7dfd23935b5cdb8
Lame Windows Vista / 7 / 2k8 SMB 2.0 Blue Screen Of Death
Posted Sep 10, 2009
Authored by Ricardo Almeida

Lame Windows Vista / Windows 7 / Win2k8 R1 SP2 and beta R2 SMB 2.0 NEGOTIATE PROTOCOL REQUEST remote blue screen of death denial of service exploit.

tags | exploit, remote, denial of service, protocol
systems | windows, vista, 7
MD5 | 578dbc974d2642ff92239f8888a5d53b
Microsoft Windows SMB Blue Screen Of Death
Posted Sep 10, 2009
Authored by laurent gaffie

Windows Vista/7 suffers from a denial of service vulnerability when passed a malformed SMB header for the NEGOTIATE PROTOCOL REQUEST. Proof of concept code included.

tags | exploit, denial of service, protocol, proof of concept
systems | windows, vista
MD5 | 1a409754c9d0e146cf0525a53f91488a
Secunia Security Advisory 36599
Posted Sep 9, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in Microsoft Windows Vista, which can be exploited by malicious people to compromise a vulnerable system.

tags | advisory
systems | windows, vista
MD5 | 1e913517b0ae894c18f97153be9f7d2a
iDEFENSE Security Advisory 2009-07-14.1
Posted Jul 16, 2009
Authored by iDefense Labs | Site idefense.com

iDefense Security Advisory 07.14.09 - Remote exploitation of a heap based buffer overflow vulnerability in Microsoft Corp.'s Embedded OpenType Font Engine (T2EMBED.DLL) could allow an attacker to execute arbitrary code with the privileges of the current user. During the processing of a malicious OpenType Font, an integer truncation issue can occur on a specific length value. This can result in a large overwrite of the heap using attacker controlled data. The attacker may gain arbitrary execution control by overwriting specific data structures on the heap, such as an object virtual function table. iDefense has confirmed the existence of this vulnerability in the Embedded OpenType Font Engine for Windows Vista SP1 (T2EMBED.DLL version 6.0.6001.18000) and Windows XP SP3 (T2EMBED.DLL version 5.1.2600.5512). Previous versions may also be affected.

tags | advisory, remote, overflow, arbitrary
systems | windows, xp, vista
advisories | CVE-2009-0231
MD5 | 779aa063fcc7380f50da5a7045798bbc
Secunia Security Advisory 34428
Posted Mar 27, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Some vulnerabilities have been reported in Windows 2008, Windows Vista, and Microsoft Windows Services for UNIX, which can potentially be exploited by malicious people to compromise a vulnerable system.

tags | advisory, vulnerability
systems | windows, unix, vista
MD5 | 060e830c64b24426422918a75dbe1339
Amaya Web Browser 11 Overflow For Vista
Posted Feb 4, 2009
Authored by Rob Carter

Amaya 11 remote stack overflow exploit for Windows Vista that makes use of the bdo tag.

tags | exploit, remote, overflow
systems | windows, vista
MD5 | e0bf5b0002eeacfed68cd83785ca068d
Whitepaper - Win Vista DLL Injection (32bit)
Posted Jan 25, 2009
Authored by George Nicolaou | Site astalavista.com

Whitepaper discussing DLL injection on Windows Vista (32bit). Includes an executable for injecting a DLL in a process of your choice and the original source code is in the pdf.

tags | paper
systems | windows, vista
MD5 | 2c4bfd5356eb9e87d14ba4703cb6f270
Secunia Security Advisory 32791
Posted Nov 24, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in Microsoft Windows Vista, which can be exploited by malicious, local users to cause a DoS (Denial of Service).

tags | advisory, denial of service, local
systems | windows, vista
MD5 | eb14eb1e630b0456e829ee86f8811ef0
msvista-overflow.txt
Posted Nov 19, 2008
Authored by Carson Hounshell, Marius Wachtler, Michael Burgbacher, Michael Craggs, Thomas Unterleitner | Site phion.com

The Microsoft Device IO Control wrapped by the iphlpapi.dll API shipping with Windows Vista 32 bit and 64 bit contains a possibly exploitable, buffer overflow corrupting kernel memory. Proof of concept test code included.

tags | exploit, overflow, kernel, proof of concept
systems | windows, vista
MD5 | 8d9062372b98a602f3a22fe236506963
Secunia Security Advisory 32115
Posted Oct 6, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Defsanguje has discovered a vulnerability in Microsoft Windows Vista, which can be exploited by malicious, local users to cause a DoS (Denial of Service).

tags | advisory, denial of service, local
systems | windows, vista
MD5 | 52c6602ffa771ac99367035758ce42ef
vista-access.txt
Posted Oct 6, 2008
Authored by Defsanguje

Microsoft Windows Vista access violation from limited account denial of service blue screen of death exploit.

tags | exploit, denial of service
systems | windows, vista
MD5 | 68e64c685219c6145071f4a9faebb354
Secunia Security Advisory 31883
Posted Sep 17, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in Microsoft Windows Vista, which can be exploited by malicious people to cause a DoS (Denial of Service).

tags | advisory, denial of service
systems | windows, vista
MD5 | 51a4560bf0058effa9dd9af806f5d4f3
secunia-iprintget.txt
Posted Aug 26, 2008
Authored by Carsten Eiram | Site secunia.com

Secunia Research has discovered a security issue in Novell iPrint Client, which can be exploited by malicious people to gain knowledge of potentially sensitive information. Novell iPrint Client 4.36 and Novell iPrint Client for Windows Vista 5.04 are affected. The insecurity lies in GetFileList().

tags | advisory
systems | windows, vista
advisories | CVE-2008-2432
MD5 | fdd4e1fe471d8f8909683736fc941234
Core Security Technologies Advisory 2008.0103
Posted Aug 13, 2008
Authored by Core Security Technologies, Jorge Luis Alvarez Medina | Site coresecurity.com

Core Security Technologies Advisory - A zone elevation vulnerability has been discovered in Internet Explorer versions 5 through 7 under Windows 2000, 2003, and XP. It also affects Windows Vista on IE 7 when protected mode is turned off.

tags | advisory
systems | windows, 2k, vista
advisories | CVE-2008-1448
MD5 | 7bcec620f32e9905726c1a58cd81f323
D2T1_-_Cesar_Cerrudo_-_Token_Kidnapping.zip
Posted Apr 21, 2008
Authored by Cesar Cerrudo | Site conference.hitb.org

Token Kidnapping - This presentation is about a new technique for elevating privileges on Windows mostly from services, this technique exploits design weaknesses in Microsoft Windows XP, 2003, Vista and even Windows 2008. While in Windows Vista and 2008 many new security protections have been added, because of other weaknesses some of the new protection mechanisms are almost useless.

systems | windows, xp, vista
MD5 | c6b3d60974ac3f57fd6280046e499b17
iDEFENSE Security Advisory 2008-04-08.3
Posted Apr 9, 2008
Authored by iDefense Labs, Jun Mao | Site idefense.com

iDefense Security Advisory 04.08.08 - Remote exploitation of a heap based buffer overflow vulnerability in multiple versions of Microsoft Corp.'s Windows operating system could allow an attacker to execute arbitrary code with the privileges of the current user. iDefense has confirmed the existence of this vulnerability in Windows 2000 Service Pack 4, Windows XP Service Pack 2, Windows Server 2003 Service Pack 1, Windows Server 2003 Service Pack 2, and Windows Vista.

tags | advisory, remote, overflow, arbitrary
systems | windows, 2k, xp, vista
advisories | CVE-2008-1083
MD5 | 60f3fc7a671c6778db875e863f646c5d
Secunia Security Advisory 29458
Posted Mar 21, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - CERT/CC has reported a security issue in Windows Vista, which can be exploited by malicious people to bypass certain security settings.

tags | advisory
systems | windows, vista
MD5 | cfa30e7736a44952304eb2112116c038
Vista_Physical_Attacks.pdf
Posted Mar 12, 2008
Authored by Peter Panholzer | Site sec-consult.com

Physical Security Attacks On Windows Vista - A short whitepaper discussing the firewire unlock attack.

tags | paper
systems | windows, vista
MD5 | 38aa74a1488c9b7c08630e81c4343ba5
Secunia Security Advisory 28828
Posted Feb 13, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in Windows Vista, which can be exploited by malicious people to cause a DoS (Denial of Service).

tags | advisory, denial of service
systems | windows, vista
MD5 | 843feaa802e7c733d6266b782115bb6b
iDEFENSE Security Advisory 2008-02-08.2
Posted Feb 11, 2008
Authored by iDefense Labs, Greg MacManus | Site idefense.com

iDefense Security Advisory 02.08.08 - Remote exploitation of an unsafe library path vulnerability in Adobe Systems Inc.'s Adobe Reader may allow attackers to execute arbitrary code as the current user. This vulnerability is due to Adobe Reader using a path for "Security Provider" libraries that contains the directory the application was started in. Security Provider libraries provide encryption and signature verification routines to applications. If the current directory contains a file with the same name as a Security Provider library, the file will be loaded into the application, potentially allowing code execution. iDefense has confirmed this vulnerability exists in Adobe Reader 8.1 installed on Windows XP and Windows Vista. Previous versions, as well as those for other platforms, may also be affected.

tags | advisory, remote, arbitrary, code execution
systems | windows, xp, vista
advisories | CVE-2007-5666
MD5 | 38a5bc58a8ae1fc704006f3dbc4c00ed
paper-wdm.pdf
Posted Jan 7, 2008
Authored by Ruben Santamarta | Site reversemode.com

Whitepaper called Exploiting WDM Audio Drivers. This paper explains an attack vector inherent to certain WDM audio drivers running on Windows Vista, XP, 2000 and 2003. Successful exploitation could lead to local escalation of privileges.

tags | paper, local
systems | windows, vista
MD5 | 5403e1e3aa12ae8907339208b57ba4ed
Secunia Security Advisory 27997
Posted Dec 12, 2007
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in Microsoft Windows Vista, which can be exploited by malicious people to compromise a user's system.

tags | advisory
systems | windows, vista
MD5 | 47352a7fc5fc75a4de4721eb14a749d1
Secunia Security Advisory 28015
Posted Dec 12, 2007
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in Microsoft Windows Vista, which can be exploited by malicious, local users to gain escalated privileges.

tags | advisory, local
systems | windows, vista
MD5 | 800fc135320541d9def06c43b39c27c7
Page 2 of 3
Back123Next

File Archive:

October 2020

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Oct 1st
    25 Files
  • 2
    Oct 2nd
    13 Files
  • 3
    Oct 3rd
    1 Files
  • 4
    Oct 4th
    1 Files
  • 5
    Oct 5th
    15 Files
  • 6
    Oct 6th
    15 Files
  • 7
    Oct 7th
    15 Files
  • 8
    Oct 8th
    11 Files
  • 9
    Oct 9th
    3 Files
  • 10
    Oct 10th
    1 Files
  • 11
    Oct 11th
    1 Files
  • 12
    Oct 12th
    8 Files
  • 13
    Oct 13th
    12 Files
  • 14
    Oct 14th
    23 Files
  • 15
    Oct 15th
    4 Files
  • 16
    Oct 16th
    13 Files
  • 17
    Oct 17th
    1 Files
  • 18
    Oct 18th
    1 Files
  • 19
    Oct 19th
    27 Files
  • 20
    Oct 20th
    41 Files
  • 21
    Oct 21st
    18 Files
  • 22
    Oct 22nd
    16 Files
  • 23
    Oct 23rd
    2 Files
  • 24
    Oct 24th
    0 Files
  • 25
    Oct 25th
    0 Files
  • 26
    Oct 26th
    0 Files
  • 27
    Oct 27th
    0 Files
  • 28
    Oct 28th
    0 Files
  • 29
    Oct 29th
    0 Files
  • 30
    Oct 30th
    0 Files
  • 31
    Oct 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2020 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close