Packet Storm new exploits for February, 2007.
9f1ccd16a65b94c43779bced0a437aaa3b766da7cd2b4f3dcbc540367234d5db
Netragard, L.L.C Advisory - McAfee Virex contains an exploitable feature that enables users to define what files should be excluded for scanning. This feature relies on a configuration file with insecure privileges and is located in /Library/Application Support. Any user on the system can modify or delete the configuration file thus affecting what Virex will scan. Versions 7.7 and below are affected.
a3cb1e800dcc7d0c7dfc001dd8db9bc345f0a9944f95a36846b83a05d5b0d489
Kiwi CatTools TFTP versions up to 3.2.8 suffer from information disclosure and remote code execution flaws.
b460190db2a31b951af2921dbad695e292bf78d82c4b55011f8f1fc5898c889d
Nullsoft ShoutcastServer version 1.9.7/Win32 suffers from a cross site scripting flaw.
3bf24f0b623740d3815290eddaef8217cbdffa3288a70496b73e3c7cf46d83a9
Wordpress version 2.1.1 suffers from multiple script injection vulnerabilities.
320ad72a9624d1ad179a3e1b799e10c1d6227c85f7dace56163df741a18b7e80
SEC Consult Security Advisory 20070226-0 - The 3rd party module Pagesetter for PostNuke is susceptible to a local file inclusion vulnerability. Versions 6.2.0 and 6.3.0 beta 5 are affected.
575fbb65bb1e067007269f53fe512d45d47ee97dd535d2999d2ace632822781a
It appears that the un.org web site suffers from SQL injection vulnerabilities.
8edf0f91665807343bb0e713e66964ee4d23be23665f7b848ae9dcf9eb64d76b
SQLiteManager version 1.2.0 suffers from local file inclusion and multiple cross site scripting vulnerabilities.
0801568530feffe7fc7f87e429113facaddaa00f9cb11a79d66f5f6bea21c0cd
Coppermine Photo Gallery version 1.3.x blind SQL injection exploit.
628c7641d783fec5ce41a8c30c833f58cce4757bd991f43dbe66239702e430b6
Photostand version 1.2.0 suffers from multiple cross site scripting vulnerabilities.
2d9f1ac802579e3d728f4e09487463c8e1dc0732380ae4ba86e9ca2d450ed9f3
ActiveCalendar version 1.2.0 suffers from cross site scripting and local file inclusion vulnerabilities.
513b48e4fd48b42dbb697f29d0b224b641534ba4e92774151fd71c49c5916e88
Pickle suffers from a local file download vulnerability.
053c72f707859708312af60d0f95b7649892cd38e5fc1ba8d432d8ae2f4dbf0e
Simple One-File Gallery suffers from local file inclusion and cross site scripting vulnerabilities.
4feb613dd583b4d8271756458f9ab29be34f28254f4ed8fd60d37927e6c4d673
sitex suffers from upload and cross site scripting vulnerabilities.
d049e5066c8158f632c257a7fa9b3d8ab821a800a4fd277933d64782e4252604
xtcommerce suffers from a local file inclusion vulnerability.
8070ab6b95167cf3f45d03975c76ffa091773e0bae4571689598a543043f23ab
shopkitplus suffers from a local file inclusion vulnerability.
a2fe61b34783c5c8d358bd2db267c4531bbd826ead31da808b56c84445a2edd4
ZPanel suffers from a remote file inclusion vulnerability.
4a39bf3c9c6b6df1e3441f7a0ffee9ceaada3bbdfb746c94cc410f462ed867b6
Exploit that demonstrates the vulnerability in ReadDirectoryChangesW() for Microsoft Windows 2000/XP/2003/Vista.
4478745e135e06387cd47d9eeaa660d45d71036448847dcdbc5d5e4abacc8449
WebSpell versions greater than 4.0 suffer from authentication bypass and arbitrary code execution flaws.
8467b9c101022d381e98b3f6b888b3fa5bea9ca1d685b2b19003a3b4eb7b32ee
SaphpLesson version 3.0 suffers from a remote SQL injection vulnerability.
4191c77b83545b3a5230769cdf352867d4e1d60895f0e0a3ec3622ef2c788439
Pheap CMS suffers from a local file inclusion vulnerability that allows for the editing of the file.
842a4df23f9fcebd6f8dbbf0b19d3f06ea6eca1f4fb7445f7998f76cb1e57915
LoveCMS version 1.4 suffers from remote file inclusion, local file inclusion, upload, and cross site scripting vulnerabilities.
b4c06f402594787fbc8b67891cda22645a46914265b6ada776a3002230fd2924
Plantilla PHP suffers from local file inclusion and arbitrary file upload vulnerabilities.
d53e7f84c572bf34aa070959ae84e569085bd859b897f5c9f4d3e2a490b8d59e
It appears that JBrowser may allow arbitrary access to admin/config files.
163a53866c4d1a2a6661658c02b315252b9f2ed5699f413d10c1fb1b0fb29dbb
Oracle 10g KUPW$WORKER.MAIN Grant/Revoke dba permission exploit.
2b2a2c1994b6e9c6d95cb67871f10ed05558ba23f150d2c9d6502ec1ac587ef1