Twenty Year Anniversary
Showing 1 - 25 of 5,385 RSS Feed

Operating System: Windows

Microsoft Windows FSCTL_FIND_FILES_BY_SID Information Disclosure
Posted Oct 16, 2018
Authored by James Forshaw, Google Security Research

On Microsoft Windows, the FSCTL_FIND_FILES_BY_SID control code does not check for permissions to list a directory leading to disclosure of file names when a user is not granted FILE_LIST_DIRECTORY access.

tags | exploit
systems | windows
advisories | CVE-2018-8411
MD5 | 1ad1fd11e41df6d259aeb00e3e6cc367
Wireshark Analyzer 2.6.4
Posted Oct 12, 2018
Authored by Gerald Combs | Site wireshark.org

Wireshark is a GTK+-based network protocol analyzer that lets you capture and interactively browse the contents of network frames. The goal of the project is to create a commercial-quality analyzer for Unix and Win32 and to give Wireshark features that are missing from closed-source sniffers.

Changes: Multiple crash vulnerabilities fixed. Various other updates.
tags | tool, sniffer, protocol
systems | windows, unix
advisories | CVE-2018-18225, CVE-2018-18226, CVE-2018-18227
MD5 | 8aa7b8c8ce0b6ce4256a081493819d6f
VLC Media Player 2.2.8 MKV Use-After-Free
Posted Oct 11, 2018
Authored by Eugene NG, Winston Ho | Site metasploit.com

This Metasploit module exploits a use-after-free vulnerability in VideoLAN VLC versions 2.2.8 and below. The vulnerability exists in the parsing of MKV files and affects both 32 bits and 64 bits. In order to exploit this, this module will generate two files: The first .mkv file contains the main vulnerability and heap spray, the second .mkv file is required in order to take the vulnerable code path and should be placed under the same directory as the .mkv file. This Metasploit module has been tested against VLC v2.2.8. Tested with payloads windows/exec, windows/x64/exec, windows/shell/reverse_tcp, windows/x64/shell/reverse_tcp. Meterpreter payloads if used can cause the application to crash instead.

tags | exploit, shell
systems | windows
advisories | CVE-2018-11529
MD5 | 8a992cc20fa2660fbd011bbae7fa991c
Apple Security Advisory 2018-10-08-2
Posted Oct 9, 2018
Authored by Apple | Site apple.com

Apple Security Advisory 2018-10-08-2 - iCloud for Windows 7.7 is now available and addresses code execution vulnerabilities.

tags | advisory, vulnerability, code execution
systems | windows, apple, 7
advisories | CVE-2018-4191, CVE-2018-4197, CVE-2018-4299, CVE-2018-4306, CVE-2018-4309, CVE-2018-4311, CVE-2018-4312, CVE-2018-4314, CVE-2018-4315, CVE-2018-4316, CVE-2018-4317, CVE-2018-4318, CVE-2018-4319, CVE-2018-4323, CVE-2018-4328, CVE-2018-4345, CVE-2018-4358, CVE-2018-4359, CVE-2018-4360, CVE-2018-4361
MD5 | 6ea4e06a91c7ab3be1a284ea0c10eab3
Delta Electronics Delta Industrial Automation COMMGR 1.08 Stack Buffer Overflow
Posted Oct 8, 2018
Authored by t4rkd3vilz, hubertwslin | Site metasploit.com

This Metasploit module exploits a stack based buffer overflow in Delta Electronics Delta Industrial Automation COMMGR 1.08. The vulnerability exists in COMMGR.exe when handling specially crafted packets. This Metasploit module has been tested successfully on Delta Electronics Delta Industrial Automation COMMGR 1.08 over Windows XP SP3, Windows 7 SP1, and Windows 8.1.

tags | exploit, overflow
systems | windows, xp, 7
advisories | CVE-2018-10594
MD5 | 6d71ad614ad723a5e3774b3af8fa38d7
Ivanti Workspace Control Registry Stored Credentials
Posted Oct 1, 2018
Authored by Yorick Koster, Securify B.V.

A flaw was found in Workspace Control that allows a local unprivileged user to retrieve the database or Relay server credentials from the Windows Registry. These credentials are encrypted, however the encryption that is used is reversible. This issue was successfully verified on Ivanti Workspace Control version 10.2.700.1 and 10.2.950.0.

tags | advisory, local, registry
systems | windows
MD5 | 40fda4c2a16f2e00046340df84539054
Apple Security Advisory 2018-9-24-2
Posted Sep 25, 2018
Authored by Apple | Site apple.com

Apple Security Advisory 2018-9-24-2 - iTunes 12.9 for Windows addresses code execution and memory corruption vulnerabilities.

tags | advisory, vulnerability, code execution
systems | windows, apple
advisories | CVE-2018-4191, CVE-2018-4197, CVE-2018-4299, CVE-2018-4306, CVE-2018-4309, CVE-2018-4311, CVE-2018-4312, CVE-2018-4314, CVE-2018-4315, CVE-2018-4316, CVE-2018-4317, CVE-2018-4318, CVE-2018-4319, CVE-2018-4323, CVE-2018-4328, CVE-2018-4345, CVE-2018-4358, CVE-2018-4359, CVE-2018-4361
MD5 | e60ee5bf120f5fe1b7c16631dd116fd8
Microsoft Windows ALPC Task Scheduler Local Privilege Elevation
Posted Sep 22, 2018
Authored by Jacob Robles, bwatters-r7, SandboxEscaper, asoto-r7 | Site metasploit.com

On vulnerable versions of Windows the alpc endpoint method SchRpcSetSecurity implemented by the task scheduler service can be used to write arbitrary DACLs to .job files located in c:\windows\tasks because the scheduler does not use impersonation when checking this location. Since users can create files in the c:\windows\tasks folder, a hardlink can be created to a file the user has read access to. After creating a hardlink, the vulnerability can be triggered to set the DACL on the linked file. WARNING: The PrintConfig.dll (%windir%\system32\driverstor\filerepository\prnms003*) on the target host will be overwritten when the exploit runs. This Metasploit module has been tested against Windows 10 Pro x64.

tags | exploit, arbitrary
systems | windows
advisories | CVE-2018-8440
MD5 | 75182edcb972e293d73fef17dd332fcc
Microsoft Windows NtEnumerateKey Privilege Escalation
Posted Sep 19, 2018
Authored by James Forshaw, Google Security Research

Microsoft Windows suffers from a double dereference in NtEnumerateKey that leads to elevation of privilege.

tags | exploit
systems | windows
advisories | CVE-2018-8410
MD5 | 4f74d58bd627bf009b466bba6d3ced66
Microsoft Windows CiSetFileCache TOCTOU Security Feature Bypass
Posted Sep 19, 2018
Authored by James Forshaw, Google Security Research

Microsoft Windows suffers from a CiSetFileCache TOCTOU CVE-2017-11830 variant WDAC security feature bypass vulnerability.

tags | exploit, bypass
systems | windows
advisories | CVE-2017-11830, CVE-2018-8449
MD5 | ec7d5c98907d960bda7e631701207804
Microsoft ADFS 4.0 Windows Server 2016 Server Side Request Forgery
Posted Sep 14, 2018
Authored by Alphan Yavas

Microsoft ADFS 4.0 Windows Server 2016 suffers from a server-side request forgery issue.

tags | advisory
systems | windows
advisories | CVE-2018-16794
MD5 | b9b1736724cd7a4fe104163dea8f32ad
Tor Browser SMB Deanonymization / Information Disclosure
Posted Sep 13, 2018
Authored by Filippo Cavallarin

Tor Browser versions prior to 8.0 are affected by an information disclosure vulnerability that allows remote attackers to bypass the intended anonymity feature and discover a client IP address. The vulnerability affects Windows users only and needs user interaction to be exploited.

tags | exploit, remote, info disclosure
systems | windows
advisories | CVE-2017-16639
MD5 | cf495bd49850c516bb8103c472dcfa4d
Microsoft Windows Explorer Out-Of-Bounds Read Denial Of Service
Posted Sep 3, 2018
Authored by Ghaaf

Microsoft Windows Explorer suffers from an out-of-bounds read denial of service vulnerability.

tags | exploit, denial of service
systems | windows
MD5 | 763c33cf352ce6e1f99971f4a1863dc9
Wireshark Analyzer 2.6.3
Posted Aug 31, 2018
Authored by Gerald Combs | Site wireshark.org

Wireshark is a GTK+-based network protocol analyzer that lets you capture and interactively browse the contents of network frames. The goal of the project is to create a commercial-quality analyzer for Unix and Win32 and to give Wireshark features that are missing from closed-source sniffers.

Changes: Reduce the Valgrind packet limit to 10,000 for Fuzz. Various other updates.
tags | tool, sniffer, protocol
systems | windows, unix
MD5 | 716100be9027e735bba82a40db828abc
Windows/x64 (10) WoW64 Egghunter Shellcode
Posted Aug 31, 2018
Authored by n30m1nd

50 bytes small Windows/x64 (10) WoW64 egghunter shellcode.

tags | shellcode
systems | windows
MD5 | 2faba3b212b6eb54df90ce13b7ff49ff
Microsoft Windows ALPC Local Privilege Escalation
Posted Aug 28, 2018
Authored by SandboxEscaper

Microsoft Windows Advanced Local Procedure Call (ALPC) local privilege escalation exploit.

tags | exploit, local
systems | windows
MD5 | dd5537a9a63d2a59cbd7132605107e01
Microsoft Windows JScript RegExp.lastIndex Use-After-Free
Posted Aug 28, 2018
Authored by Ivan Fratric, Google Security Research

There is a use-after-free vulnerability in jscript.dll related to how the lastIndex property of a RegExp object is handled. This vulnerability can be exploited through Internet Explorer or potentially through WPAD over local network. The vulnerability has been reproduced on multiple Windows versions with the most recent patches applied.

tags | exploit, local
systems | windows
advisories | CVE-2018-8353
MD5 | b2cf3dec9e5bd796bccbeb593fafdabd
Windows 10 Diagnostics Hub Standard Collector Service Privilege Escalation
Posted Aug 23, 2018
Authored by Atredis Partners

Windows 10 Diagnostics Hub Standard Collector Service suffers from a privilege escalation vulnerability.

tags | exploit
systems | windows
advisories | CVE-2018-0952
MD5 | 5520736f51585790b67e4af78de7b934
Easy RM To MP3 Converter 2.6 Stack Buffer Overflow
Posted Aug 16, 2018
Authored by Mohammadali Mohammadi

Easy RM to MP3 Converter version 2.6 stack buffer overflow exploit for Windows 7.

tags | exploit, overflow
systems | windows, 7
MD5 | 3e5fc628c09315d1b9ac22be64dc475a
VMware Security Advisory 2018-0019
Posted Aug 7, 2018
Authored by VMware | Site vmware.com

VMware Security Advisory 2018-0019 - Horizon 6, 7, and Horizon Client for Windows updates address an out-of-bounds read vulnerability.

tags | advisory
systems | windows
advisories | CVE-2018-6970
MD5 | b40331424283676a792f9c3b3bfd9373
Microsoft Windows SCF File Feature Bypass
Posted Aug 6, 2018
Authored by Eduardo Braun Prado

Microsoft Windows suffers from an SCF open file security warning feature bypass vulnerability.

tags | exploit, bypass
systems | windows
MD5 | 6040e3240487f072def3a3791d8f65ff
SMPlayer 18.6.0 DLL Hijacking
Posted Aug 6, 2018
Authored by ZwX

SMPlayer version 18.6.0 suffers from a dll hijacking vulnerability.

tags | exploit
systems | windows
MD5 | c560ece532c95ec9632fd2dcbade1e00
Sidify Music Converter 1.2.9 DLL Hijacking
Posted Aug 6, 2018
Authored by ZwX

Sidify Music Converter version 1.2.9 suffers from a dll hijacking vulnerability.

tags | exploit
systems | windows
MD5 | bbebec39f6f30063c8482128511ef045
Fortinet FortiClient 5.2.3 Local Privilege Escalation
Posted Aug 5, 2018
Authored by sickness, mschenk

Fortinet FortiClient version 5.2.3 (Windows 10 x64 Creators) suffers from a local privilege escalation vulnerability.

tags | exploit, local
systems | windows
advisories | CVE-2015-4077, CVE-2015-5736
MD5 | c481ba1c8cfdb5ac306d51bfefbf9590
VMWare Player 12.5.9 Privilege Escalation / Denial Of Service
Posted Aug 2, 2018
Authored by Stefan Kanthak

VMWare Player version 12.5.9 suffers from denial of service and privilege escalation vulnerabilities.

tags | exploit, denial of service, vulnerability
systems | windows
MD5 | 7c7fe612150cceaf8be1320706d1c05c
Page 1 of 216
Back12345Next

File Archive:

October 2018

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Oct 1st
    26 Files
  • 2
    Oct 2nd
    15 Files
  • 3
    Oct 3rd
    15 Files
  • 4
    Oct 4th
    15 Files
  • 5
    Oct 5th
    15 Files
  • 6
    Oct 6th
    2 Files
  • 7
    Oct 7th
    3 Files
  • 8
    Oct 8th
    23 Files
  • 9
    Oct 9th
    16 Files
  • 10
    Oct 10th
    15 Files
  • 11
    Oct 11th
    19 Files
  • 12
    Oct 12th
    16 Files
  • 13
    Oct 13th
    2 Files
  • 14
    Oct 14th
    2 Files
  • 15
    Oct 15th
    15 Files
  • 16
    Oct 16th
    20 Files
  • 17
    Oct 17th
    19 Files
  • 18
    Oct 18th
    21 Files
  • 19
    Oct 19th
    0 Files
  • 20
    Oct 20th
    0 Files
  • 21
    Oct 21st
    0 Files
  • 22
    Oct 22nd
    0 Files
  • 23
    Oct 23rd
    0 Files
  • 24
    Oct 24th
    0 Files
  • 25
    Oct 25th
    0 Files
  • 26
    Oct 26th
    0 Files
  • 27
    Oct 27th
    0 Files
  • 28
    Oct 28th
    0 Files
  • 29
    Oct 29th
    0 Files
  • 30
    Oct 30th
    0 Files
  • 31
    Oct 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2018 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close