what you don't know can hurt you
Showing 101 - 125 of 5,651 RSS Feed

Operating System: Windows

Microsoft Windows Insecure CSharedStream Object Privilege Escalation
Posted Oct 28, 2019
Authored by James Forshaw, Google Security Research

Microsoft Windows suffers from an insecure CSharedStream object privilege escalation vulnerability.

tags | exploit
systems | windows
MD5 | 687f585eaab9feeb5d38e13cc05c1c00
Wireshark Analyzer 3.0.6
Posted Oct 23, 2019
Authored by Gerald Combs | Site wireshark.org

Wireshark is a GTK+-based network protocol analyzer that lets you capture and interactively browse the contents of network frames. The goal of the project is to create a commercial-quality analyzer for Unix and Win32 and to give Wireshark features that are missing from closed-source sniffers.

Changes: Multiple bug fixes have been applied.
tags | tool, sniffer, protocol
systems | windows, unix
MD5 | c6f8d12a3efe21cc7885f7cb0c4bd938
Adobe Acrobat Reader DC For Windows JP2 Stream Buffer Overflow
Posted Oct 16, 2019
Authored by Google Security Research, mjurczyk

Adobe Acrobat Reader DC for Windows suffers from a heap-based buffer overflow vulnerability that can be leveraged via malformed JP2 streams.

tags | exploit, overflow
systems | windows
advisories | CVE-2019-8197
MD5 | 6d502d5ca8f705d8234dd901fb623916
Microsoft Windows Kernel nt!MiRelocateImage Out-Of-Bounds Read
Posted Oct 10, 2019
Authored by Google Security Research, mjurczyk

The Microsoft Windows kernel suffers from an out-of-bounds read vulnerability in nt!MiRelocateImage while parsing a malformed PE file.

tags | exploit, kernel
systems | windows
advisories | CVE-2019-1347
MD5 | b11e264135a1ee9c14ee6d0a6b9be23a
Microsoft Windows Kernel CI!HashKComputeFirstPageHash Out-Of-Bounds Read
Posted Oct 10, 2019
Authored by Google Security Research, mjurczyk

The Microsoft Windows kernel suffers from an out-of-bounds read vulnerability in CI!HashKComputeFirstPageHash while parsing a malformed PE file.

tags | exploit, kernel
systems | windows
advisories | CVE-2019-1346
MD5 | 2b4d1890b1779ec523e266b0696a2645
Microsoft Windows Kernel nt!MiParseImageLoadConfig Out-Of-Bounds Read
Posted Oct 10, 2019
Authored by Google Security Research, mjurczyk

The Microsoft Windows kernel suffers from an out-of-bounds read in nt!MiParseImageLoadConfig while parsing a malformed PE file.

tags | exploit, kernel
systems | windows
advisories | CVE-2019-1345
MD5 | ed96bcdeedbf757ded338f82d7252f0d
Microsoft Windows Kernel CI!CipFixImageType Out-Of-Bounds Read
Posted Oct 10, 2019
Authored by Google Security Research, mjurczyk

The Microsoft Windows kernel suffers from an out-of-bounds read vulnerability in CI!CipFixImageType while parsing a malformed PE file.

tags | exploit, kernel
systems | windows
advisories | CVE-2019-1344
MD5 | 234236a84a29251053125f4a4e7b7d46
Microsoft Windows Kernel nt!MiOffsetToProtos NULL Pointer Dereference
Posted Oct 10, 2019
Authored by Google Security Research, mjurczyk

The Microsoft Windows kernel suffers from a null pointer dereference vulnerability in nt!MiOffsetToProtos while parsing a malformed PE file.

tags | exploit, kernel
systems | windows
advisories | CVE-2019-1343
MD5 | 00131f510a52f3d940c140421ce76ea4
Microsoft Windows Kernel win32k.sys TTF Font Processing win32k!ulClearTypeFilter Pool Corruption
Posted Oct 10, 2019
Authored by Google Security Research, mjurczyk

Microsoft Windows Kernel suffers from a TTF font processing win32k!ulClearTypeFilter pool corruption vulnerability in win32k.sys.

tags | exploit, kernel
systems | windows
advisories | CVE-2019-1364
MD5 | 119f19b3c20bb86e4d4a2c8e4636479c
ASX To MP3 Converter 3.1.3.7 Stack Overflow
Posted Oct 10, 2019
Authored by Maxim Guslyaev | Site metasploit.com

This Metasploit module exploits a stack buffer overflow in ASX to MP3 converter 3.1.3.7. By constructing a specially crafted ASX file and attempting to convert it to an MP3 file in the application, a buffer is overwritten, which allows for running shellcode. Tested on: Microsoft Windows 7 Enterprise, 6.1.7601 Service Pack 1 Build 7601, x64-based PC Microsoft Windows 10 Pro, 10.0.18362 N/A Build 18362, x64-based PC.

tags | exploit, overflow, shellcode
systems | windows, 7
advisories | CVE-2017-15221
MD5 | 56c0508be45bebf5e6af39311de96c27
Apple Security Advisory 2019-10-07-4
Posted Oct 8, 2019
Authored by Apple | Site apple.com

Apple Security Advisory 2019-10-07-4 - iCloud for Windows 7.14 is now available and addresses buffer overflow, code execution, and cross site scripting vulnerabilities.

tags | advisory, overflow, vulnerability, code execution, xss
systems | windows, apple, 7
advisories | CVE-2019-8625, CVE-2019-8707, CVE-2019-8719, CVE-2019-8726, CVE-2019-8733, CVE-2019-8735, CVE-2019-8745, CVE-2019-8763
MD5 | 674430b600662e944210bc20e841afd7
Apple Security Advisory 2019-10-07-3
Posted Oct 8, 2019
Authored by Apple | Site apple.com

Apple Security Advisory 2019-10-07-3 - iCloud for Windows 10.7 is now available and addresses buffer overflow, code execution, and cross site scripting vulnerabilities.

tags | advisory, overflow, vulnerability, code execution, xss
systems | windows, apple
advisories | CVE-2019-8625, CVE-2019-8707, CVE-2019-8719, CVE-2019-8726, CVE-2019-8733, CVE-2019-8735, CVE-2019-8745, CVE-2019-8763
MD5 | 60950df4e7126c0b4c002000d0054239
Apple Security Advisory 2019-10-07-2
Posted Oct 8, 2019
Authored by Apple | Site apple.com

Apple Security Advisory 2019-10-07-2 - iTunes for Windows 12.10.1 is now available and addresses buffer overflow, code execution, and cross site scripting vulnerabilities.

tags | advisory, overflow, vulnerability, code execution, xss
systems | windows, apple
advisories | CVE-2019-8625, CVE-2019-8707, CVE-2019-8719, CVE-2019-8720, CVE-2019-8726, CVE-2019-8733, CVE-2019-8735, CVE-2019-8745, CVE-2019-8763
MD5 | 9afe24ba991364697b29be8710f3f4af
Wireshark Analyzer 3.0.5
Posted Sep 20, 2019
Authored by Gerald Combs | Site wireshark.org

Wireshark is a GTK+-based network protocol analyzer that lets you capture and interactively browse the contents of network frames. The goal of the project is to create a commercial-quality analyzer for Unix and Win32 and to give Wireshark features that are missing from closed-source sniffers.

Changes: Multiple bug fixes have been applied.
tags | tool, sniffer, protocol
systems | windows, unix
MD5 | d01fdc4e78ef8ea70f20616c91419bd9
Web-Based Firewall Logging Tool 1.1.2
Posted Sep 20, 2019
Authored by Bob Hockney | Site webfwlog.sourceforge.net

Webfwlog is a Web-based firewall log reporting and analysis tool. It allows users to design reports to use on logged firewall data in whatever configuration they desire. Included are sample reports as a starting point. Reports can be sorted with a single click, or "drilled-down" all the way to the packet level, and saved for later use. Supported log formats are netfilter, ipfilter, ipfw, ipchains, and Windows XP. Netfilter support includes ulogd MySQL or PostgreSQL database logs using the iptables ULOG target.

Changes: Added geoip autonomous system fields. Added geoip is_in_european_union field. Multiple bug fixes. Various other updates.
tags | tool, web, firewall
systems | linux, windows, xp
MD5 | 7b7a6a01bc9d99ffe81928180bb7025c
Microsoft Windows Internet Settings Security Feature Bypass
Posted Sep 17, 2019
Authored by Eduardo Braun Prado

Microsoft Windows suffers from an Internet Settings misconfiguration security feature bypass vulnerability. Versions affected include Windows 7 SP1, 8.0, 8.1 x86 and x64 with full patches up to July 2019.

tags | exploit, x86, bypass
systems | windows, 7
MD5 | ff0c1e4363db410575808afd701e6662
Wireshark Analyzer 3.0.4
Posted Sep 12, 2019
Authored by Gerald Combs | Site wireshark.org

Wireshark is a GTK+-based network protocol analyzer that lets you capture and interactively browse the contents of network frames. The goal of the project is to create a commercial-quality analyzer for Unix and Win32 and to give Wireshark features that are missing from closed-source sniffers.

Changes: The Windows installers now ship with Npcap 0.9983. They previously shipped with Npcap 0.996. The macOS installer now ships with Qt 5.12.3. It previously shipped with Qt 5.12.4. Multiple bug fixes have been applied.
tags | tool, sniffer, protocol
systems | windows, unix
MD5 | 67f9227b181693dc873b1f25ba5e54b8
Red Hat Security Advisory 2019-2722-01
Posted Sep 11, 2019
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2019-2722-01 - The libwmf packages provide a library for reading and converting Windows Metafile Format vector graphics. The library is used by applications such as GIMP and ImageMagick. Multiple double-free vulnerabilities were addressed.

tags | advisory, vulnerability
systems | linux, redhat, windows
advisories | CVE-2019-6978
MD5 | d770b947ff129d4347b75170c531e764
Windows File Enumeration Intel Gathering Tool 2.1
Posted Sep 8, 2019
Authored by hyp3rlinx | Site hyp3rlinx.altervista.org

NtFileSins.py is a Windows file enumeration intel gathering tool.

tags | exploit
systems | windows
MD5 | df854b2ff767838ad9ede940d9a2edee
Microsoft Windows 10 UAC Protection Bypass Via Windows Store
Posted Sep 6, 2019
Authored by timwr, sailay1996, ACTIVELabs | Site metasploit.com

This Metasploit module exploits a flaw in the WSReset.exe Windows Store Reset Tool. The tool is run with the "autoElevate" property set to true, however it can be moved to a new Windows directory containing a space (C:\Windows \System32\) where, upon execution, it will load our payload dll (propsys.dll).

tags | exploit
systems | windows
MD5 | b188fc5d0237e2798ceb17453907bcbe
Microsoft Windows NTFS Privileged File Access Enumeration
Posted Sep 6, 2019
Authored by hyp3rlinx | Site hyp3rlinx.altervista.org

Microsoft Windows suffers from an NTFS privileged file access enumeration vulnerability. Attackers possessing user-only rights can gather intelligence or profile other user account activities by brute forcing a correct file name due to inconsistent error messaging.

tags | exploit
systems | windows
MD5 | 8f8a5a6cf1cf40cfec6b841ca09e2618
Windows 10 UAC Protection Bypass Via Windows Store (WSReset.exe) And Registry
Posted Sep 5, 2019
Authored by bwatters-r7, sailay1996, ACTIVELabs | Site metasploit.com

This Metasploit module exploits a flaw in the WSReset.exe file associated with the Windows Store. This binary has autoelevate privs, and it will run a binary file contained in a low-privilege registry location. By placing a link to the binary in the registry location, WSReset.exe will launch the binary as a privileged user.

tags | exploit, registry
systems | windows
MD5 | d470c356d7562ece1d5652e2d264a075
Exploitation Of Windows CVE-2019-0708 (BlueKeep)
Posted Aug 31, 2019
Authored by Palo Alto Networks

Whitepaper called Exploitation of Windows CVE-2019-0708 (BlueKeep): Three Ways to Write Data into the Kernel with RDP PDU.

tags | paper, kernel
systems | windows
advisories | CVE-2019-0708
MD5 | 6f462839db6bbcac1333d70c6161be2c
GGPowerShell / Windows PowerShell Remote Command Execution
Posted Aug 30, 2019
Authored by hyp3rlinx | Site hyp3rlinx.altervista.org

This python script mints a .ps file with an exploitable semicolon condition that allows for command execution from Microsoft Windows PowerShell.

tags | exploit, python
systems | windows
MD5 | 9592257d1332e2c7094af04e4b98bda7
Adobe Acrobat Reader DC For Windows JP2 Stream Double-Free
Posted Aug 15, 2019
Authored by Google Security Research, mjurczyk

Adobe Acrobat Reader DC for Windows suffers from a double-free vulnerability due to a malformed JP2 stream.

tags | exploit
systems | windows
advisories | CVE-2019-8044
MD5 | 160feb95df0fc9a1e82853c12dfe4902
Page 5 of 226
Back34567Next

File Archive:

July 2020

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jul 1st
    15 Files
  • 2
    Jul 2nd
    19 Files
  • 3
    Jul 3rd
    11 Files
  • 4
    Jul 4th
    0 Files
  • 5
    Jul 5th
    0 Files
  • 6
    Jul 6th
    0 Files
  • 7
    Jul 7th
    0 Files
  • 8
    Jul 8th
    0 Files
  • 9
    Jul 9th
    0 Files
  • 10
    Jul 10th
    0 Files
  • 11
    Jul 11th
    0 Files
  • 12
    Jul 12th
    0 Files
  • 13
    Jul 13th
    0 Files
  • 14
    Jul 14th
    0 Files
  • 15
    Jul 15th
    0 Files
  • 16
    Jul 16th
    0 Files
  • 17
    Jul 17th
    0 Files
  • 18
    Jul 18th
    0 Files
  • 19
    Jul 19th
    0 Files
  • 20
    Jul 20th
    0 Files
  • 21
    Jul 21st
    0 Files
  • 22
    Jul 22nd
    0 Files
  • 23
    Jul 23rd
    0 Files
  • 24
    Jul 24th
    0 Files
  • 25
    Jul 25th
    0 Files
  • 26
    Jul 26th
    0 Files
  • 27
    Jul 27th
    0 Files
  • 28
    Jul 28th
    0 Files
  • 29
    Jul 29th
    0 Files
  • 30
    Jul 30th
    0 Files
  • 31
    Jul 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2020 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close