exploit the possibilities
Showing 51 - 63 of 63 RSS Feed

Operating System: Windows Vista

iDEFENSE Security Advisory 2007-08-14.1
Posted Aug 15, 2007
Authored by iDefense Labs, Aviv Raff | Site idefense.com

iDefense Security Advisory 08.14.07 - Remote exploitation of a Cross Site Scripting (XSS) vulnerability in the Windows Vista Sidebar RSS Gadget allows an attacker to execute arbitrary code with the privileges of the logged in user. The vulnerability exists within the parsing of the certain elements of the items in an RSS feed. A properly crafted HTML tag within these elements will not be removed, and will be rendered by the RSS gadget. Since the RSS gadget runs in the local zone, the injected JavaScript has full access to the system. iDefense has confirmed the existence of this vulnerability in Microsoft Windows Vista Business. Other versions are suspected to be vulnerable.

tags | advisory, remote, arbitrary, local, javascript, xss
systems | windows, vista
advisories | CVE-2007-3033
MD5 | 1aa166600fa7109e872458bec4156bc6
Secunia Security Advisory 26439
Posted Aug 15, 2007
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Three vulnerabilities have been reported in Microsoft Windows Vista, which can be exploited by malicious people to compromise a user's system.

tags | advisory, vulnerability
systems | windows, vista
MD5 | 7d7521c51c1704bf1e41c7c05570060f
Technical Cyber Security Alert 2007-191A
Posted Jul 11, 2007
Authored by US-CERT | Site us-cert.gov

Technical Cyber Security Alert TA07-191A - Microsoft has released updates that address critical vulnerabilities in Microsoft Windows, Excel, Publisher, .NET Framework, Internet Information Services, and Windows Vista Firewall. Exploitation of these vulnerabilities could allow a remote, unauthenticated attacker to execute arbitrary code or cause a denial of service on a vulnerable system.

tags | advisory, remote, denial of service, arbitrary, vulnerability
systems | windows, vista
MD5 | 3ba69b3268d35605b44ae45334dbd5d9
Secunia Security Advisory 26001
Posted Jul 11, 2007
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A security issue has been reported in Windows Vista, which can be exploited by malicious people to bypass certain security restrictions.

tags | advisory
systems | windows, vista
MD5 | 7e18a1db3d6e91f45fbd4ac821eb35c3
arp-dos.txt
Posted May 16, 2007
Authored by Kristian Hermansen

Microsoft Windows Vista forged ARP packet network stack denial of service exploit.

tags | exploit, denial of service
systems | windows, vista
advisories | CVE-2007-1531
MD5 | ab48c028aa04f2202ca832d3800f7082
EEYE-csrss.txt
Posted Apr 11, 2007
Authored by Derek Soeder | Site eeye.com

eEye Digital Security has discovered a local privilege escalation vulnerability in Windows Vista that allows a program executing without privileges to fully compromise an affected system. A malicious user or malware program could exploit this vulnerability to execute arbitrary code with SYSTEM privileges within the CSRSS process, permitting the bypass of Vista's vaunted user privilege limitations and administrator approval mode. By establishing and closing multiple connections to CSRSS's "ApiPort", an application may cause a private data structure within CSRSS that describes its process to be used after it has been freed, creating an exploitable "dangling pointer" condition. This vulnerability is entirely separate from the CSRSS NtRaiseHardError message box flaw publicly disclosed in December 2006, although both affect code within the CSRSS process. It is interesting to note that this vulnerability only affects Windows Vista, due to new, flawed code added to CSRSRV.DLL in support of functionality introduced in Vista.

tags | advisory, arbitrary, local
systems | windows, vista
MD5 | 142455a90333b87b5d6c76789dddf56e
Secunia Security Advisory 24823
Posted Apr 11, 2007
Authored by Secunia | Site secunia.com

Secunia Security Advisory - eEye Digital Security has reported a vulnerability in Windows Vista, which can be exploited by malicious, local users to gain escalated privileges.

tags | advisory, local
systems | windows, vista
MD5 | a7b14cc9f0566a51537cb7fcd5cd901f
Secunia Security Advisory 24667
Posted Apr 2, 2007
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A weakness has been reported in Windows Vista, which can be exploited by malicious, local users to cause a DoS (Denial of Service).

tags | advisory, denial of service, local
systems | windows, vista
MD5 | db636e5a958775755a35fb72c99ef205
msfilemanagement.txt
Posted Mar 9, 2007
Authored by 3APA3A | Site securityvulns.com

Article discussing file management security issues in Microsoft Windows Vista/2003/XP/2000.

tags | advisory
systems | windows, vista
MD5 | 60fcecd6b876c994b1fd5658afc80a4f
Windows_Vista_64bits_and_unexported_kernel_symbols.pdf
Posted Jan 3, 2007
Authored by Matthieu Suiche | Site msuiche.net

Whitepaper entitled Windows Vista 64bits And Unexported Kernel Symbols.

tags | paper, kernel
systems | windows, vista
MD5 | d3517b08b5aaeb3831f9c6e828a16dd2
DAY_2_-_Douglas_MacIver_-_Pentesting_BitLocker.pdf
Posted Oct 9, 2006
Authored by Douglas MacIver | Site conference.hitb.org

HITBSecConf2006 Presentation - Pen Testing Windows Vista BitLocker Drive Encryption from the Inside.

systems | windows, vista
MD5 | 6f36b19a594bd1a41de0f152495b84d9
DAY_1_-_Ian_Hellen_and_Vishal_Kumar_-_Security_Engineering_in_Vista.pdf
Posted Oct 9, 2006
Authored by Ian Hellen, Vishal Kumar | Site conference.hitb.org

HITBSecConf2006 Presentation - Security Engineering in Windows Vista.

systems | windows, vista
MD5 | 36d624c595f039a615a7cb25b433c8be
Analysis-of-Microsoft-Windows-Vistas-ASLR.pdf
Posted Oct 4, 2006
Authored by Renaud Lifchitz | Site sysdream.com

Windows Vista includes a new memory protection system called ASLR. Its goal is to escape buffer overflow attacks in vulnerable programs. Ali Rahbar, has made a complete study of this security mechanism, and found a new implementation flaw that allows to bypass this protection.

tags | paper, overflow
systems | windows, vista
MD5 | 72474dfdfa0795f1434c9375d5690367
Page 3 of 3
Back123Next

File Archive:

May 2020

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    May 1st
    14 Files
  • 2
    May 2nd
    3 Files
  • 3
    May 3rd
    1 Files
  • 4
    May 4th
    18 Files
  • 5
    May 5th
    15 Files
  • 6
    May 6th
    21 Files
  • 7
    May 7th
    15 Files
  • 8
    May 8th
    19 Files
  • 9
    May 9th
    1 Files
  • 10
    May 10th
    2 Files
  • 11
    May 11th
    18 Files
  • 12
    May 12th
    39 Files
  • 13
    May 13th
    15 Files
  • 14
    May 14th
    17 Files
  • 15
    May 15th
    17 Files
  • 16
    May 16th
    2 Files
  • 17
    May 17th
    2 Files
  • 18
    May 18th
    15 Files
  • 19
    May 19th
    21 Files
  • 20
    May 20th
    15 Files
  • 21
    May 21st
    15 Files
  • 22
    May 22nd
    6 Files
  • 23
    May 23rd
    1 Files
  • 24
    May 24th
    1 Files
  • 25
    May 25th
    2 Files
  • 26
    May 26th
    23 Files
  • 27
    May 27th
    13 Files
  • 28
    May 28th
    18 Files
  • 29
    May 29th
    17 Files
  • 30
    May 30th
    0 Files
  • 31
    May 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2020 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close