iDefense Security Advisory 08.04.09 - Local exploitation of an arbitrary file creation vulnerability in IBM Corp.'s Advanced Interactive eXecutive (AIX) Operating System allows attackers to execute arbitrary code with super-user privileges. iDefense has confirmed the existence of this vulnerability in IBM Corp.'s AIX version 5.3. Other versions may also be affected.
c2f93a0a5ddb535bfba9a73e58921b94de4aee8dfa76f6dbea11cf4494f746d2
Two vulnerabilities exist in the update function for Panda Security ActiveScan version 2.0. Remote buffer overflow exploit included.
fc8c8168cc278ad654aef72bed59d187fe305f76fbd2789031b91d1ca2a0d26a
Lesstif local root exploit for Mandrake Linux 2006 that makes use of the mtink binary which is setuid by default.
93c5c74660c45a18ce6ccea75249edf597881501453e35ba6adbd416614392f7
Vixie crontab allows reading other user's crontabs. Tested on FC3 with vixie-cron-4.1-24_FC3.
721b09218f838494b039e5a6cb4abd8c36023e6855c5829a54d5b50649c0b03f
iDEFENSE Security Advisory 02.07.05 - Remote exploitation of a command injection vulnerability in the Squirrelmail S/MIME plugin allows web mail users to execute arbitrary commands with the privileges of the web server.
35671328df6ad7b30df6bdca6e66a1bb2b1ad41710b19633efa94975faefefa3
Buffer overflows have been discovered in ncplogin and ncpmap in ncpfs.
c294b3360b3ddff9fac26764f6fdbeaf48fbc3a3c0cf6921df14103682138576
iDEFENSE Security Advisory 11.15.04 - Multiple vulnerabilities have been found in Fcron 2.0.1 and 2.9.4. Local exploitation of vulnerabilities in the fcronsighup component of Fcron may allow users to view the contents of root owned files, bypass access restrictions, and remove arbitrary files or create arbitrary empty files.
1e3a7a297e5c9cf6eef481188a172658e3a5fce82dfb0d82a7bcfd0ddfb53772
iDEFENSE Security Advisory 11.08.04 - Remote exploitation of an input validation error in Samba could allow an attacker to consume system resources and potentially cause the target system to crash.
131548f64663e091c700d9c86eed756350dffa82c05ce5da3dfe0dec012e41a5
cPanel 9.4.1 allows logged in users to change permission of any file to 755.
2dbd2ffc962d08b971f885ce0649ce6e7308777ab6e9b6843abb9792970232ac
cPanel 9.4.1 allows logged in users the ability to change ownership of any file to their uid:gid.
f2a62268ae0d95df13b67e1ba2aaa36b4ea8a6260de6349f34fa4b680d8793f5
cPanel 9.4.1 is susceptible to a classic symbolic link attack.
9d09c284862856b892c22b1f28f3233bec231367ca526c5480075e9ddc323a21
Samba versions 2.2.11 and below and versions below and equal to 3.0.5 allow a remote attacker that ability to gain access to files that exist outside of the share's defined path. Such files must still be readable by the account used for the connection.
4f9156f25d9d86303f9556eb907601a2fdfd174787601f7b6045e7dc7b476a98
iDEFENSE Security Advisory 05.12.04: Exploitation of an input validation vulnerability within Opera Software ASA.'s Opera Web Browser could allow remote attackers to create or truncate arbitrary files. The problem specifically exists within the telnet URI handler. Opera does not check for '-' at the beginning of hostname passed through the handler, which lets options pass to the telnet program, allowing file creation or overwriting.
88a3986f22d8cc48d56d3b3bad13399d7e191cf92cee76f2c337819dcbe15f61
iDEFENSE Security Advisory 06.16.03: The pam_wheel module of Linux-PAM uses getlogin() in an insecure manner, thereby allowing attackers to bypass certain restrictions. The pam_wheel module is often used with the su command to allow users belonging to a trusted group to utilize the command without supplying a password. The module utilizes the getlogin() function to determine the name of the currently logged in user. This name is then compared against a list of members of a trusted group as specified in the configuration file. If the trust option is enabled in the pam_wheel configuration file and the use_uid option is disabled, any local user may spoof the username returned by getlogin() and gain access to a super-user account without supplying a password.
c65f3b99c2e44aca0273c3c270501fa89200aeeec261693c53ac01a45de16c3e
iDEFENSE Security Advisory 01.21.03: Buffer Overflows in Mandrake Linux printer-drivers Package. Three vulnerabilities exist, the worst of which allows local root compromise. Overflows in the mtink and escputil binaries, which are set group id sys, allow an attacker to gain sys group privileges. A race condition in the ml85p binary, which is set user id root, allows an attacker to create a file with super user privileges.
7176f37ea45e1920e9e214222d1b7446b1bb27eb36daf186f9b7edeb3b38a417
iDEFENSE Security Advisory 10.31.2002b - Prometheus v6.0 and below is a web application framework written in PHP which allows remote attackers to execute arbitrary commands.
8a9f3b109a813e90ba5162e210fa2e3db32c9299a4328fbb8c040f64e6b82ff2