what you don't know can hurt you
Showing 51 - 63 of 63 RSS Feed

Operating System: Windows Vista

iDEFENSE Security Advisory 2007-08-14.1
Posted Aug 15, 2007
Authored by iDefense Labs, Aviv Raff | Site idefense.com

iDefense Security Advisory 08.14.07 - Remote exploitation of a Cross Site Scripting (XSS) vulnerability in the Windows Vista Sidebar RSS Gadget allows an attacker to execute arbitrary code with the privileges of the logged in user. The vulnerability exists within the parsing of the certain elements of the items in an RSS feed. A properly crafted HTML tag within these elements will not be removed, and will be rendered by the RSS gadget. Since the RSS gadget runs in the local zone, the injected JavaScript has full access to the system. iDefense has confirmed the existence of this vulnerability in Microsoft Windows Vista Business. Other versions are suspected to be vulnerable.

tags | advisory, remote, arbitrary, local, javascript, xss
systems | windows, vista
advisories | CVE-2007-3033
MD5 | 1aa166600fa7109e872458bec4156bc6
Secunia Security Advisory 26439
Posted Aug 15, 2007
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Three vulnerabilities have been reported in Microsoft Windows Vista, which can be exploited by malicious people to compromise a user's system.

tags | advisory, vulnerability
systems | windows, vista
MD5 | 7d7521c51c1704bf1e41c7c05570060f
Technical Cyber Security Alert 2007-191A
Posted Jul 11, 2007
Authored by US-CERT | Site us-cert.gov

Technical Cyber Security Alert TA07-191A - Microsoft has released updates that address critical vulnerabilities in Microsoft Windows, Excel, Publisher, .NET Framework, Internet Information Services, and Windows Vista Firewall. Exploitation of these vulnerabilities could allow a remote, unauthenticated attacker to execute arbitrary code or cause a denial of service on a vulnerable system.

tags | advisory, remote, denial of service, arbitrary, vulnerability
systems | windows, vista
MD5 | 3ba69b3268d35605b44ae45334dbd5d9
Secunia Security Advisory 26001
Posted Jul 11, 2007
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A security issue has been reported in Windows Vista, which can be exploited by malicious people to bypass certain security restrictions.

tags | advisory
systems | windows, vista
MD5 | 7e18a1db3d6e91f45fbd4ac821eb35c3
arp-dos.txt
Posted May 16, 2007
Authored by Kristian Hermansen

Microsoft Windows Vista forged ARP packet network stack denial of service exploit.

tags | exploit, denial of service
systems | windows, vista
advisories | CVE-2007-1531
MD5 | ab48c028aa04f2202ca832d3800f7082
EEYE-csrss.txt
Posted Apr 11, 2007
Authored by Derek Soeder | Site eeye.com

eEye Digital Security has discovered a local privilege escalation vulnerability in Windows Vista that allows a program executing without privileges to fully compromise an affected system. A malicious user or malware program could exploit this vulnerability to execute arbitrary code with SYSTEM privileges within the CSRSS process, permitting the bypass of Vista's vaunted user privilege limitations and administrator approval mode. By establishing and closing multiple connections to CSRSS's "ApiPort", an application may cause a private data structure within CSRSS that describes its process to be used after it has been freed, creating an exploitable "dangling pointer" condition. This vulnerability is entirely separate from the CSRSS NtRaiseHardError message box flaw publicly disclosed in December 2006, although both affect code within the CSRSS process. It is interesting to note that this vulnerability only affects Windows Vista, due to new, flawed code added to CSRSRV.DLL in support of functionality introduced in Vista.

tags | advisory, arbitrary, local
systems | windows, vista
MD5 | 142455a90333b87b5d6c76789dddf56e
Secunia Security Advisory 24823
Posted Apr 11, 2007
Authored by Secunia | Site secunia.com

Secunia Security Advisory - eEye Digital Security has reported a vulnerability in Windows Vista, which can be exploited by malicious, local users to gain escalated privileges.

tags | advisory, local
systems | windows, vista
MD5 | a7b14cc9f0566a51537cb7fcd5cd901f
Secunia Security Advisory 24667
Posted Apr 2, 2007
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A weakness has been reported in Windows Vista, which can be exploited by malicious, local users to cause a DoS (Denial of Service).

tags | advisory, denial of service, local
systems | windows, vista
MD5 | db636e5a958775755a35fb72c99ef205
msfilemanagement.txt
Posted Mar 9, 2007
Authored by 3APA3A | Site securityvulns.com

Article discussing file management security issues in Microsoft Windows Vista/2003/XP/2000.

tags | advisory
systems | windows, vista
MD5 | 60fcecd6b876c994b1fd5658afc80a4f
Windows_Vista_64bits_and_unexported_kernel_symbols.pdf
Posted Jan 3, 2007
Authored by Matthieu Suiche | Site msuiche.net

Whitepaper entitled Windows Vista 64bits And Unexported Kernel Symbols.

tags | paper, kernel
systems | windows, vista
MD5 | d3517b08b5aaeb3831f9c6e828a16dd2
DAY_2_-_Douglas_MacIver_-_Pentesting_BitLocker.pdf
Posted Oct 9, 2006
Authored by Douglas MacIver | Site conference.hitb.org

HITBSecConf2006 Presentation - Pen Testing Windows Vista BitLocker Drive Encryption from the Inside.

systems | windows, vista
MD5 | 6f36b19a594bd1a41de0f152495b84d9
DAY_1_-_Ian_Hellen_and_Vishal_Kumar_-_Security_Engineering_in_Vista.pdf
Posted Oct 9, 2006
Authored by Ian Hellen, Vishal Kumar | Site conference.hitb.org

HITBSecConf2006 Presentation - Security Engineering in Windows Vista.

systems | windows, vista
MD5 | 36d624c595f039a615a7cb25b433c8be
Analysis-of-Microsoft-Windows-Vistas-ASLR.pdf
Posted Oct 4, 2006
Authored by Renaud Lifchitz | Site sysdream.com

Windows Vista includes a new memory protection system called ASLR. Its goal is to escape buffer overflow attacks in vulnerable programs. Ali Rahbar, has made a complete study of this security mechanism, and found a new implementation flaw that allows to bypass this protection.

tags | paper, overflow
systems | windows, vista
MD5 | 72474dfdfa0795f1434c9375d5690367
Page 3 of 3
Back123Next

File Archive:

September 2019

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Sep 1st
    1 Files
  • 2
    Sep 2nd
    38 Files
  • 3
    Sep 3rd
    30 Files
  • 4
    Sep 4th
    15 Files
  • 5
    Sep 5th
    12 Files
  • 6
    Sep 6th
    17 Files
  • 7
    Sep 7th
    3 Files
  • 8
    Sep 8th
    1 Files
  • 9
    Sep 9th
    24 Files
  • 10
    Sep 10th
    22 Files
  • 11
    Sep 11th
    22 Files
  • 12
    Sep 12th
    15 Files
  • 13
    Sep 13th
    5 Files
  • 14
    Sep 14th
    2 Files
  • 15
    Sep 15th
    1 Files
  • 16
    Sep 16th
    11 Files
  • 17
    Sep 17th
    16 Files
  • 18
    Sep 18th
    8 Files
  • 19
    Sep 19th
    14 Files
  • 20
    Sep 20th
    20 Files
  • 21
    Sep 21st
    3 Files
  • 22
    Sep 22nd
    0 Files
  • 23
    Sep 23rd
    12 Files
  • 24
    Sep 24th
    0 Files
  • 25
    Sep 25th
    0 Files
  • 26
    Sep 26th
    0 Files
  • 27
    Sep 27th
    0 Files
  • 28
    Sep 28th
    0 Files
  • 29
    Sep 29th
    0 Files
  • 30
    Sep 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2019 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close