Exploit the possiblities
Showing 26 - 50 of 5,229 RSS Feed

Operating System: Windows

Windows Kernel Pool Ntfs!LfsRestartLogFile Memory Disclosure
Posted Oct 16, 2017
Authored by Google Security Research, mjurczyk

This advisory discusses a Microsoft Windows kernel pool memory disclosure into NTFS metadata ($LogFile) in Ntfs!LfsRestartLogFile.

tags | advisory, kernel
systems | windows
advisories | CVE-2017-11817
MD5 | f4472007f780b633aa086c20fa3c9ee8
Windows Kernel Pool nt!RtlpCopyLegacyContextX86 Memory Disclosure
Posted Oct 16, 2017
Authored by Google Security Research, mjurczyk

The Microsoft Windows kernel pool suffers from a nt!RtlpCopyLegacyContextX86 related memory disclosure vulnerability.

tags | advisory, kernel
systems | windows
advisories | CVE-2017-11784
MD5 | e7fc69388cdf09d854702265504b52eb
Windows x64 API Hooking Shellcode
Posted Oct 16, 2017
Authored by Roziul Hasan Khan Shifat

117 bytes small Windows x64 API hooking shellcode.

tags | shellcode
systems | windows
MD5 | 0e1f30f71a25c4a08e91b66ad4ca90de
SyncBreeze 10.1.16 SEH GET Overflow
Posted Oct 13, 2017
Authored by wetw0rk | Site metasploit.com

There exists an unauthenticated SEH based vulnerability in the HTTP server of Sync Breeze Enterprise version 10.1.16, when sending a GET request with an excessive length it is possible for a malicious user to overwrite the SEH record and execute a payload that would run under the Windows NT AUTHORITY\SYSTEM account. The SEH record is overwritten with a "POP,POP,RET" pointer from the application library libspp.dll. This exploit has been successfully tested on Windows XP, 7 and 10 (x86->x64). It should work against all versions of Windows and service packs.

tags | exploit, web, x86
systems | windows, nt, xp
MD5 | d7371f0084bb280d35baaca73d2c929d
Windows Escalate UAC Protection Bypass (In Memory Injection) Abusing WinSXS
Posted Oct 12, 2017
Authored by Ernesto Fernandez | Site metasploit.com

This Metasploit module will bypass Windows UAC by utilizing the trusted publisher certificate through process injection. It will spawn a second shell that has the UAC flag turned off by abusing the way "WinSxS" works in Windows systems. This Metasploit module uses the Reflective DLL Injection technique to drop only the DLL payload binary instead of three separate binaries in the standard technique. However, it requires the correct architecture to be selected, (use x64 for SYSWOW64 systems also).

tags | exploit, shell
systems | windows
MD5 | 168e1d24d366b109430b6a8f6c85ad79
Wireshark Analyzer 2.4.2
Posted Oct 10, 2017
Authored by Gerald Combs | Site wireshark.org

Wireshark is a GTK+-based network protocol analyzer that lets you capture and interactively browse the contents of network frames. The goal of the project is to create a commercial-quality analyzer for Unix and Win32 and to give Wireshark features that are missing from closed-source sniffers.

Changes: Various updates.
tags | tool, sniffer, protocol
systems | windows, unix
MD5 | 237525d8f189f1253ca18b00a055eccb
PostgreSQL 10 Installer For Windows DLL Hijacking
Posted Oct 10, 2017
Authored by Stefan Kanthak

The PostgreSQL 10 installer for Windows suffers from a dll hijacking vulnerability.

tags | exploit
systems | windows
MD5 | f46c2b1ad8a1d5e4276cb73262711868
Microsoft Windows 10 x64 RS2 win32kfull!bFill Overflow
Posted Oct 6, 2017
Authored by siberas

This is a collection of exploits for the recently-patched win32kfull!bFill vulnerability. Executing the Palette or Bitmap exploit will give you SYSTEM privileges on the affected system. The exploits should work fine on Windows 10 x64 with Creators Update, build 15063.540 (latest version of Win10 before the release of Microsoft's September Updates).

tags | exploit, overflow
systems | windows
advisories | CVE-2016-3309
MD5 | 1bbb2193435fcfc4958108cf2fde83e9
HP Security Bulletin HPESBMU03753 1
Posted Oct 3, 2017
Authored by HP | Site hp.com

HP Security Bulletin HPESBMU03753 1 - Several potential security vulnerabilities have been identified in HPE System Management Homepage (SMH) on Windows and Linux. The vulnerabilities could be exploited remotely resulting in Cross-site scripting, local and remote Denial of Service, local and remote execution of arbitrary code, local elevation of privilege and local unqualified configuration change. Revision 1 of this advisory.

tags | advisory, remote, denial of service, arbitrary, local, vulnerability, xss
systems | linux, windows
advisories | CVE-2016-8743, CVE-2017-12544, CVE-2017-12545, CVE-2017-12546, CVE-2017-12547, CVE-2017-12548, CVE-2017-12549, CVE-2017-12550, CVE-2017-12551, CVE-2017-12552, CVE-2017-12553
MD5 | 3610a8a805b73bebd3f6895b697cadac
EMC AppSync Host Plug-In 3.5 Denial Of Service
Posted Sep 28, 2017
Site emc.com

EMC AppSync host plug-in on Windows platform includes a denial of service (DoS) vulnerability that could potentially be exploited by malicious users to compromise the affected system. Versions 3.5 and below are affected.

tags | advisory, denial of service
systems | windows
advisories | CVE-2017-8018
MD5 | 0dc5c768a6b91e7f30ed970745210698
Apple Security Advisory 2017-09-25-8
Posted Sep 28, 2017
Authored by Apple | Site apple.com

Apple Security Advisory 2017-09-25-8 - iTunes 12.7 for Windows addresses code execution, memory corruption, and various other vulnerabilities.

tags | advisory, vulnerability, code execution
systems | windows, apple
advisories | CVE-2017-7081, CVE-2017-7087, CVE-2017-7090, CVE-2017-7091, CVE-2017-7092, CVE-2017-7093, CVE-2017-7094, CVE-2017-7095, CVE-2017-7096, CVE-2017-7098, CVE-2017-7099, CVE-2017-7100, CVE-2017-7102, CVE-2017-7104, CVE-2017-7107, CVE-2017-7109, CVE-2017-7111, CVE-2017-7117, CVE-2017-7120
MD5 | 306ff87175ca8e8645b30d800ae4ccb2
Apple Security Advisory 2017-09-25-2
Posted Sep 28, 2017
Authored by Apple | Site apple.com

Apple Security Advisory 2017-09-25-2 - iCloud for Windows 7 is now available and addresses memory corruption, arbitrary code execution, and various other vulnerabilities.

tags | advisory, arbitrary, vulnerability, code execution
systems | windows, apple, 7
advisories | CVE-2017-7081, CVE-2017-7087, CVE-2017-7089, CVE-2017-7090, CVE-2017-7091, CVE-2017-7092, CVE-2017-7093, CVE-2017-7094, CVE-2017-7095, CVE-2017-7096, CVE-2017-7098, CVE-2017-7099, CVE-2017-7100, CVE-2017-7102, CVE-2017-7104, CVE-2017-7106, CVE-2017-7107, CVE-2017-7109, CVE-2017-7111, CVE-2017-7117, CVE-2017-7120, CVE-2017-7127
MD5 | 4e44e4b681ebf9ba18ffaf6ae1da2982
Disk Pulse Enterprise 9.9.16 GET Buffer Overflow
Posted Sep 21, 2017
Authored by Nipun Jaswal, Chance Johnson, Anurag Srivastava | Site metasploit.com

This Metasploit module exploits an SEH buffer overflow in Disk Pulse Enterprise version 9.9.16. If a malicious user sends a crafted HTTP GET request it is possible to execute a payload that would run under the Windows NT AUTHORITY\SYSTEM account.

tags | exploit, web, overflow
systems | windows, nt
MD5 | 4357afe77b3f0d509c9cfa2b76ef1a5a
Microsoft Windows Kernel win32k!NtQueryCompositionSurfaceBinding Memory Disclosure
Posted Sep 19, 2017
Authored by Google Security Research, mjurczyk

The Microsoft Windows kernel suffers from a stack memory disclosure vulnerability in win32k!NtQueryCompositionSurfaceBinding.

tags | exploit, kernel
systems | windows
advisories | CVE-2017-8678
MD5 | 73d3685f1e900f98c6cd4f3a23681176
Microsoft Windows Kernel win32k!NtGdiHLSurfGetInformation Memory Disclosure
Posted Sep 19, 2017
Authored by Google Security Research, mjurczyk

The Microsoft Windows kernel suffers from a stack memory disclosure vulnerability in win32k!NtGdiHLSurfGetInformation.

tags | advisory, kernel
systems | windows
advisories | CVE-2017-8677
MD5 | ea7057c9591140087eed136016fbcd5a
Microsoft Windows Kernel win32k!NtGdiDoBanding Memory Disclosure
Posted Sep 19, 2017
Authored by Google Security Research, mjurczyk

The Microsoft Windows kernel suffers from a stack memory disclosure vulnerability in win32k!NtGdiDoBanding.

tags | exploit, kernel
systems | windows
advisories | CVE-2017-8687
MD5 | fe4029deb9c5251a89ca66ad88be9adc
Microsoft Windows Kernel win32k!NtGdiEngCreatePalette Memory Disclosure
Posted Sep 19, 2017
Authored by Google Security Research, mjurczyk

The Microsoft Windows kernel suffers from a stack memory disclosure vulnerability in win32k!NtGdiEngCreatePalette.

tags | exploit, kernel
systems | windows
advisories | CVE-2017-8685
MD5 | 83ee676927d72312fbb286ed64a835d8
Microsoft Windows Kernel win32k!NtGdiGetFontResourceInfoInternalW Memory Disclosure
Posted Sep 19, 2017
Authored by Google Security Research, mjurczyk

The Microsoft Windows kernel suffers from a stack memory disclosure vulnerability in win32k!NtGdiGetFontResourceInfoInternalW.

tags | exploit, kernel
systems | windows
advisories | CVE-2017-8684
MD5 | 61dc2229ecbf3b49ce1abc604e7d026d
Microsoft Windows Kernel TTF Font Processing glyf Out-Of-Bounds Read
Posted Sep 19, 2017
Authored by Google Security Research, mjurczyk

The Microsoft Windows kernel win32k.sys TTF font processing suffers from an out-of-bounds read vulnerability with a malformed glyf table.

tags | exploit, kernel
systems | windows
advisories | CVE-2017-8683
MD5 | 6641efba2930501968ff7f836aa362bc
Microsoft Windows Kernel TTF Font Processing Out-Of-Bounds
Posted Sep 19, 2017
Authored by Google Security Research, mjurczyk

The Microsoft Windows kernel win32k.sys TTF font procession functionality suffers from out-of-bounds read/write vulnerabilities.

tags | exploit, kernel, vulnerability
systems | windows
advisories | CVE-2017-8682
MD5 | aa8a1953e3c70722e1dd32b005aa020c
Microsoft Windows Kernel nt!NtSetIoCompletion / nt!NtRemoveIoCompletion Memory Disclosure
Posted Sep 19, 2017
Authored by Google Security Research, mjurczyk

The Microsoft Windows kernel pool suffers from a memory disclosure vulnerability in nt!NtSetIoCompletion and nt!NtRemoveIoCompletion.

tags | exploit, kernel
systems | windows
advisories | CVE-2017-8708
MD5 | fd5025fc6a75cc5dbc1f54b354b0c2e7
Microsoft Windows Kernel win32k!NtGdiGetPhysicalMonitorDescription Memory Disclosure
Posted Sep 19, 2017
Authored by Google Security Research, mjurczyk

The Microsoft Windows kernel suffers from a memory disclosure in win32k!NtGdiGetPhysicalMonitorDescription.

tags | exploit, kernel
systems | windows
advisories | CVE-2017-8681
MD5 | 890bef0c1635255b9915dcca14ad5865
Microsoft Windows Kernel win32k!NtGdiGetGlyphOutline Memory Disclosure
Posted Sep 19, 2017
Authored by Google Security Research, mjurczyk

The Microsoft Windows kernel pool suffers from a memory disclosure vulnerability in win32k!NtGdiGetGlyphOutline.

tags | exploit, kernel
systems | windows
advisories | CVE-2017-8680
MD5 | 5b64942e584a037e7e24695cad37a8d2
Red Hat Security Advisory 2017-2675-01
Posted Sep 18, 2017
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2017-2675-01 - Red Hat Mobile Application Platform 4.5 consists of three main components: Core - development and management of apps occurs in the RHMAP Core, which can be installed either in an on-premise installation of OpenShift Container Platform 3.x. MBaaS - Application data, runtimes, and integrations are deployed to the RHMAP MBaaS installed on OpenShift Container Platform 3.x. Build Farm - deployed separately from the Core and the MBaaS, the Build Farm is shared between all instances of RHMAP. Third-party Linux, Windows, and Apple server hosting providers are used to support building client app binaries for all platforms.

tags | advisory
systems | linux, redhat, windows, apple
advisories | CVE-2017-1000117, CVE-2017-7552, CVE-2017-7553, CVE-2017-7554
MD5 | 99a6e0d3fc9dfeb7ace4c6a777026fdb
Microsoft Edge DuplicateHandle ACG Bypass
Posted Sep 15, 2017
Authored by Ivan Fratric, Google Security Research

ACG (Arbitrary Code Guard) in Microsoft Edge is bypassable. The bypass has been tested on Microsoft Edge 40.15063.0.0 running on Windows 10 Enterprise 64-bit with Creators Update (Version 1703, OS build 15063.413).

tags | exploit, arbitrary
systems | windows
MD5 | e55e370f65b1a357d3ec51c50261ae1c
Page 2 of 210
Back12345Next

File Archive:

December 2017

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Dec 1st
    15 Files
  • 2
    Dec 2nd
    2 Files
  • 3
    Dec 3rd
    1 Files
  • 4
    Dec 4th
    15 Files
  • 5
    Dec 5th
    15 Files
  • 6
    Dec 6th
    18 Files
  • 7
    Dec 7th
    17 Files
  • 8
    Dec 8th
    15 Files
  • 9
    Dec 9th
    13 Files
  • 10
    Dec 10th
    4 Files
  • 11
    Dec 11th
    41 Files
  • 12
    Dec 12th
    42 Files
  • 13
    Dec 13th
    0 Files
  • 14
    Dec 14th
    0 Files
  • 15
    Dec 15th
    0 Files
  • 16
    Dec 16th
    0 Files
  • 17
    Dec 17th
    0 Files
  • 18
    Dec 18th
    0 Files
  • 19
    Dec 19th
    0 Files
  • 20
    Dec 20th
    0 Files
  • 21
    Dec 21st
    0 Files
  • 22
    Dec 22nd
    0 Files
  • 23
    Dec 23rd
    0 Files
  • 24
    Dec 24th
    0 Files
  • 25
    Dec 25th
    0 Files
  • 26
    Dec 26th
    0 Files
  • 27
    Dec 27th
    0 Files
  • 28
    Dec 28th
    0 Files
  • 29
    Dec 29th
    0 Files
  • 30
    Dec 30th
    0 Files
  • 31
    Dec 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2016 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close