PHPKIT versions 1.6.1 R2 and below suffer from cross site scripting, SQL injection, information disclosure, password hash disclosure, local file disclosure, and arbitrary code execution flaws. Various sample exploitation details provided.
a91e4d42b773ee597b5ea0162d7a64232a6a053f5d7b8e1af72709197633e2f8
CMS PHPKit WCMS version 1.6.6 suffers from a cross site scripting vulnerability.
bc631a532ede7f396bf10e2908c4f90fd2b39943a411c0476b46853b7947dd90
PHPkit is a simple PHP based backdoor, leveraging include() and php://input to allow the attacker to execute arbitrary PHP code on the infected server. The actual backdoor contains no suspicious calls such as eval() or system(), as the PHP code is executed in memory by include().
9ae6f1db9ff8c94146491368c999d0b4d6a0a9cfe7316a6f72a899025250bf36
PHPkit is a simple PHP based backdoor, leveraging include() and php://input to allow the attacker to execute arbitrary PHP code on the infected server. The actual backdoor contains no suspicious calls such as eval() or system(), as the PHP code is executed in memory by include().
3078b9daa99d887414dbe12584cdafa91a5f3554f05f8ad34cdf5d3ffe218a26
PHPkit is a simple PHP based backdoor, leveraging include() and php:// input to allow the attacker to execute arbitrary PHP code on the infected server. The actual backdoor contains no suspicious calls such as eval() or system(), as the PHP code is executed in memory by include(). Includes a simple python client that gives a "shell" on the server.
a0b89f7413840636a73320699e779bec747d2127f4e7880708cb96dae4596056
sudo versions 1.8.0 through 1.8.3p1 suffer from a format string vulnerability that allows for privilege escalation.
81fb04538af951a21c660e19f143b2d360f83aa70ff21c86befc1fc8af952094
Gitorious versions prior to 2.1.1 suffer from a remote command execution vulnerability.
6eaad22fe33effe3e4d1a3e355ffa9f4cb239465e6efdd17446f0304e8263e07
PHPKit versions 1.6.1 R2 and below remote SQL injection exploit that leverages overview.php.
60f29fc5837355fd5ef838e4225260e314c73abe5d8f82833f62aba28fcff37f
PHPKIT WCMS vesion 1.6.5 suffers from a reflected cross site scripting vulnerability.
4e462957f2e106b8bb64e9043371757932788cc4d9d401bc835d3d3f0cd266b0
PHPKIT WCMS version 1.6.5 suffers from multiple cross site scripting vulnerabilities.
ecd55597608e71646904db6946b845c4681b1cddfd49ad04710cd12a26efcbdf
Secunia Security Advisory - David Vieira-Kurz has discovered some vulnerabilities in PHPKIT, which can be exploited by malicious people to conduct cross-site scripting and cross-site request forgery attacks.
2f92acf6e156c1b9c43559eef5782c2ab94114691c3c22a9ff57da42720de674
KIS 2008 and Kaspersky AntiVirus for Workstations suffer from a local privilege escalation vulnerability in Klim5.sys.
986d0ad816e789cda1a3b6e60acf76a92dd2c3e35c8b13cf6af11184f8f77d00
Microsoft Windows Kernel is prone to a local privilege escalation due to an integer overflow error within the IopfCompleteRequest function. This vulnerability may allow attackers to execute arbitrary code in the kernel context, thus allowing to escalate privileges to SYSTEM.
83416b5326404b535c7aca5df86a5d9d9c86e01657b803c965feda37f7d987fa
PHPKIT version 1.6.4 PL1 suffers from multiple cross site request forgery vulnerabilities.
bd686a8d96632c15e6c574107869fd642622cbadb3de3bd820f5ae158927a167
PHPkit version 1.6.1 suffers from a remote file inclusion vulnerability.
673400a894bf744378440e29d2c810971d88724b774f606c4b331a80034588b7
PHPKIT version 1.64pl1 remote SQL injection exploit that makes use of article.php.
ca0c31027f6c298a77162e72a5c9a4aa71ff48b5029e5e57e130278a2364fb16
Secunia Security Advisory - shadowleet has discovered a vulnerability in PHPKIT, which can be exploited by malicious people to conduct SQL injection attacks.
411e2716eae01f291ee33a6a3fc74b4431744b489233827137dea1cff6545a8a
Microsoft Windows 2003 SP2 and Microsoft Windows 2000 SP4 Server suffer from a predictable DNS transaction ID vulnerability.
17df89085333f3c12c52a302a32379289e5cde6b3d5bc244cb20b4eadc104298
Google suffers from re-authentication a bypass vulnerability with the SID and LSID cookies.
4f025da75376d5304616a5f06e5e0cbc824d41e86de0ab0e7ddad020d50ade61
KDE Security Advisory - The KDE FTP ioslave parses the host address in the PASV response of a FTP server response. mark from bindshell.net pointed out that this could be exploited via JavaScript for automated port scanning. It was not possible to demonstrate the vulnerability via JavaScript with Konqueror from KDE 3.5.x. However, other scenarios are possible. Systems affected are KDE up to and including KDE version 3.5.6.
11a8b2185f26494437aee4a5b794dd9dfc7df3072b51c8db1a96b3d190915204
Hardened PHP Project Security Advisory - Multiple browsers suffers from a cross domain charset inheritance vulnerability. Affected include Firefox versions 2.0.0.1 and below, Internet Explorer 7,and Opera 9.
dcd8c435391d3c078ac9563c091bc0f6313cafd8de503cb88d02e58310efcc93
KDE Security Advisory - kpdf, the KDE pdf viewer, shares code with xpdf. xpdf contains a vulnerability that can cause denial of service (infinite loop) via a PDF file that contains a crafted catalog dictionary or a crafted Pages attribute that references an invalid page tree node.
42812a15864105269027b14064b13deb20beeca385431654ec9eb079ccaf20c4
KDE Security Advisory - On 2006-12-27, a proof of concept for arbitrary code execution in ksirc was published by Federico L. Bossi Bonin. The published exploit triggers an assertion in ksirc and results in a a NULL pointer dereference (crash) for non-debug builds.
bbe226f8526b19cff802b45793648da93e38d02f08a6eb41783cd101bf62423d
Hardened PHP Project Security Advisory - WordPress versions 2.0.5 and below are susceptible to SQL injection and arbitrary PHP code execution vulnerabilities.
6ae242405ad8f267856415ba69fbe2d72b0564bc948f563c7faddf7468dc8a27
Hardened PHP Project Security Advisory - WordPress versions 2.0.5 and below are susceptible to a cross site scripting vulnerability.
2e3cbc0dfeeffe8d32e3e64641b81da4f32b8024d0bbc6b54762599b015b0f9a
KDE Security Advisory - The OLE import filter, which is used in KPresenter to open Microsoft Powerpoint files is vulnerable to an integer overflow problem that can be exploited to expose an heap memory overflow. This issue was reported by Kees Cook from Ubuntu security. KOffice versions 1.4.x and 1.6.0 are affected.
5e616116d126762e0386e401b5ffeb2270a95ffca025fe458d9dd87fc7b1f07b