what you don't know can hurt you
Showing 1 - 8 of 8 RSS Feed

Files Date: 2021-08-11

Canon TR150 Driver 3.71.2.10 Privilege Escalation
Posted Aug 11, 2021
Authored by Jacob Baines, Shelby Pace | Site metasploit.com

Canon TR150 print drivers versions 3.71.2.10 and below allow local users to read/write files within the "CanonBJ" directory and its subdirectories. By overwriting the DLL at C:\ProgramData\CanonBJ\IJPrinter\CNMWINDOWS\Canon TR150 series\LanguageModules\040C\CNMurGE.dll with a malicious DLL at the right time whilst running the C:\Windows\System32\Printing_Admin_Scripts\en-US\prnmngr.vbs script to install a new printer, a timing issue can be exploited to cause the PrintIsolationHost.exe program, which runs as NT AUTHORITY\SYSTEM, to successfully load the malicious DLL. Successful exploitation will grant attackers code execution as the NT AUTHORITY\SYSTEM user. This Metasploit module leverages the prnmngr.vbs script to add and delete printers. Multiple runs of this module may be required given successful exploitation is time-sensitive.

tags | exploit, local, code execution
systems | windows
advisories | CVE-2021-38085
MD5 | b54013c8b14ce15b29f5eb5b487ecde4
Faraday 3.17.0
Posted Aug 11, 2021
Authored by Francisco Amato | Site github.com

Faraday is a tool that introduces a new concept called IPE, or Integrated Penetration-Test Environment. It is a multiuser penetration test IDE designed for distribution, indexation and analysis of the generated data during the process of a security audit. The main purpose of Faraday is to re-use the available tools in the community to take advantage of them in a multiuser way.

Changes: Added --data parameter to faraday-manage settings. Modifications include process report files in a separate process and making bulk_create requests asynchronous.
tags | tool, rootkit
systems | unix
MD5 | ed9053a282a5d30c36aeaa75ec5a5b84
Red Hat Security Advisory 2021-2977-01
Posted Aug 11, 2021
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2021-2977-01 - Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments.

tags | advisory
systems | linux, redhat
advisories | CVE-2021-3121
MD5 | ba2bedb2050c3f61182fd5c138b7f3d7
HackTool.Win32.Hidd.b Buffer Overflow
Posted Aug 11, 2021
Authored by malvuln | Site malvuln.com

HackTool.Win32.Hidd.b malware suffers from a buffer overflow vulnerability.

tags | exploit, overflow
systems | windows
MD5 | 675c76b5fc09565c24742f22499795c3
Ubuntu Security Notice USN-5034-2
Posted Aug 11, 2021
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 5034-2 - USN-5034-1 fixed a vulnerability in c-ares. This update provides the corresponding update for Ubuntu 16.04 ESM. Philipp Jeitner and Haya Shulman discovered that c-ares incorrectly validated certain hostnames returned by DNS servers. A remote attacker could possibly use this issue to perform Domain Hijacking attacks. Various other issues were also addressed.

tags | advisory, remote
systems | linux, ubuntu
advisories | CVE-2021-3672
MD5 | 992ae7acf26b237623506fa6019c78e7
Backdoor.Win32.IRCBot.gen Hardcoded Credential
Posted Aug 11, 2021
Authored by malvuln | Site malvuln.com

Backdoor.Win32.IRCBot.gen malware suffers from a hardcoded credential vulnerability.

tags | exploit
systems | windows
MD5 | 713a5ecaaa4f74f116d19a2cce2fdbdb
Red Hat Security Advisory 2021-3119-01
Posted Aug 11, 2021
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2021-3119-01 - OpenShift Virtualization is Red Hat's virtualization solution designed for Red Hat OpenShift Container Platform. This advisory addresses a wide array of vulnerabilities.

tags | advisory, vulnerability
systems | linux, redhat
advisories | CVE-2016-10228, CVE-2017-14502, CVE-2019-13012, CVE-2019-14866, CVE-2019-25013, CVE-2019-25032, CVE-2019-25034, CVE-2019-25035, CVE-2019-25036, CVE-2019-25037, CVE-2019-25038, CVE-2019-25039, CVE-2019-25040, CVE-2019-25041, CVE-2019-25042, CVE-2019-2708, CVE-2019-9169, CVE-2020-12362, CVE-2020-12363, CVE-2020-12364, CVE-2020-13434, CVE-2020-13543, CVE-2020-13584, CVE-2020-14344, CVE-2020-14345, CVE-2020-14346
MD5 | aa24fa038bb2c4b496a226038d9b282b
Trojan-Proxy.Win32.Raznew.gen Unauthenticated Open Proxy
Posted Aug 11, 2021
Authored by malvuln | Site malvuln.com

Trojan-Proxy.Win32.Raznew.gen malware suffers from an unauthenticated open proxy vulnerability.

tags | exploit, trojan
systems | windows
MD5 | 5503423c307a4accb81feb9cc2b30fb8
Page 1 of 1
Back1Next

File Archive:

September 2021

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Sep 1st
    14 Files
  • 2
    Sep 2nd
    19 Files
  • 3
    Sep 3rd
    9 Files
  • 4
    Sep 4th
    1 Files
  • 5
    Sep 5th
    2 Files
  • 6
    Sep 6th
    3 Files
  • 7
    Sep 7th
    12 Files
  • 8
    Sep 8th
    22 Files
  • 9
    Sep 9th
    17 Files
  • 10
    Sep 10th
    19 Files
  • 11
    Sep 11th
    3 Files
  • 12
    Sep 12th
    2 Files
  • 13
    Sep 13th
    15 Files
  • 14
    Sep 14th
    16 Files
  • 15
    Sep 15th
    15 Files
  • 16
    Sep 16th
    7 Files
  • 17
    Sep 17th
    13 Files
  • 18
    Sep 18th
    2 Files
  • 19
    Sep 19th
    2 Files
  • 20
    Sep 20th
    14 Files
  • 21
    Sep 21st
    20 Files
  • 22
    Sep 22nd
    28 Files
  • 23
    Sep 23rd
    13 Files
  • 24
    Sep 24th
    10 Files
  • 25
    Sep 25th
    1 Files
  • 26
    Sep 26th
    1 Files
  • 27
    Sep 27th
    20 Files
  • 28
    Sep 28th
    0 Files
  • 29
    Sep 29th
    0 Files
  • 30
    Sep 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2020 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close