j

KVM kvm_inject_page_fault Uninitialized Memory Leak

KVM suffers from an uninitialized memory leak vulnerability in kvm_inject_page_fault.




j

XRIX SQL Injection

Sites designed by IRIX suffer from a remote SQL injection vulnerability. Note that this finding houses site-specific data.





j

Dridex Trojan Updated With AtomBombing Evasion Techniques












j

NanoCore Trojan Is Protected In Memory From Being Killed Off













j

Bull / IBM AIX Clusterwatch / Watchware File Write / Command Injection

Bull / IBM AIX Clusterwatch / Watchware suffers from having trivial admin credentials, system file writes, and OS command injection vulnerabilities.









j

aspjarPatch.txt

Unofficial patch for the ASPjar Guestbook login.asp vulnerability that allows bypassing of the authentication process.




j

silc-join-hmac.patch

Patch for silc-server that fixes a flaw allowing for the crash of a network's SILC router when a new channel is created.








j

Create-Project Manager 1.07 Cross Site Scripting / HTML Injection

Create-Project Manager version 1.07 suffers from cross site scripting and html injection vulnerabilities.







j

Windows Vista/7 lpksetup.exe DLL Hijacking

Microsoft Windows Vista/7 suffers from a DLL hijacking vulnerability in lpksetup.exe.




j

Quest InTrust Annotation Objects Uninitialized Pointer

This Metasploit module exploits an uninitialized variable vulnerability in the Annotation Objects ActiveX component. The activeX component loads into memory without opting into ALSR so this module exploits the vulnerability against windows Vista and Windows 7 targets. A large heap spray is required to fulfill the requirement that EAX points to part of the ROP chain in a heap chunk and the calculated call will hit the pivot in a separate heap chunk. This will take some time in the users browser.




j

Internet Explorer Script Interjection Code Execution

The vulnerability described in this document can be exploited by a malicious Web page to execute arbitrary code with low integrity. Active scripting must be enabled, and the present exploitation techniques require that font downloading be set to "Enable" or "Prompt" and that the "mailto:" protocol be present. (These requirements are satisfied by default on Windows XP, Windows Vista, and Windows 7.) The user is presented with a message box which must be dismissed before code execution can occur.




j

Internet Explorer Script Interjection Code Execution

The vulnerability described in this document can be exploited by a malicious Web page to execute arbitrary code with low integrity. Active scripting must be enabled, and the present exploitation techniques require that font downloading be set to "Enable" or "Prompt" and that the "mailto:" protocol be present. (These requirements are satisfied by default on Windows XP, Windows Vista, and Windows 7.) The user is presented with a message box which must be dismissed before code execution can occur.




j

NPS Datastore Server DLL Hijacking

A DLL side loading vulnerability was found in the NPS Datastore server DLL that ships with Windows Vista. This issue can be exploited by loading the affected DLL as an embedded OLE object. When instantiating the object Windows will try to load the DLL iasdatastore2.dll from the current working directory. If an attacker convinces the user to open a specially crafted (Office) document from a directory also containing the attacker's DLL file, it is possible to execute arbitrary code with the privileges of the target user. This can potentially result in the attacker taking complete control of the affected system.




j

BDA MPEG2 Transport Information Filter DLL Hijacking

A DLL side loading vulnerability was found in the BDA MPEG2 Transport Information Filter that ships with Windows Vista. This issue can be exploited by loading the filter as an embedded OLE object. When instantiating the object Windows will try to load the DLL ehTrace.dll from the current working directory. If an attacker convinces the user to open a specially crafted (Office) document from a directory also containing the attacker's DLL file, it is possible to execute arbitrary code with the privileges of the target user. This can potentially result in the attacker taking complete control of the affected system.




j

.NET Framework 4.6 DLL Hijacking

A DLL side loading vulnerability was found in the .NET Framework version 4.6 when running on Windows Vista or Windows 7. This issue can be exploited by luring a victim into opening an Office document from the attacker's share. An attacker can use this issue to execute arbitrary code with the privileges of the target user. This can potentially result in the attacker taking complete control of the affected system. If the WebDAV Mini-Redirector is enabled, it is possible to exploit this issue over the internet. This issue can be exploited even if the Office document is opened in Protected View.







j

Another Day, Another Mass Domain Hijacking




j

Hacker's Hijack Security Firm Fox-IT's Domain