exploit the possibilities
Showing 101 - 125 of 5,809 RSS Feed

Operating System: Windows

NTLM BITS SYSTEM Token Impersonation
Posted Jan 6, 2021
Authored by Andrea Pierini, Cassandre, Roberto, Antonio Cocomazzi | Site metasploit.com

This Metasploit module exploit BITS behavior which tries to connect to the local Windows Remote Management server (WinRM) every times it starts. The module launches a fake WinRM server which listen on port 5985 and triggers BITS. When BITS starts, it tries to authenticate to the Rogue WinRM server, which allows to steal a SYSTEM token. This token is then used to launch a new process as SYSTEM user. In the case of this exploit, notepad.exe is launched as SYSTEM. Then, it writes shellcode in its previous memory space and trigger its execution. As this exploit uses reflective dll injection, it does not write any file on the disk. Vulnerable operating systems are Windows 10 and Windows servers where WinRM is not running. Lab experiments has shown that Windows 7 does not exhibit the vulnerable behavior.

tags | exploit, remote, local, shellcode
systems | windows, 7
MD5 | c3736b57f1257197d426a69fdf409d38
Backdoor.Win32.Zombam.k Stack Buffer Overflow
Posted Jan 5, 2021
Authored by malvuln | Site malvuln.com

Backdoor.Win32.Zombam.k malware suffers from a remote string dereference stack buffer overflow vulnerability.

tags | exploit, remote, overflow
systems | windows
MD5 | 05421fbc3ad7da507f99f68ed1a1e1a0
BACKDOOR.WIN32.BNLITE Remote Heap Corruption
Posted Jan 4, 2021
Authored by malvuln | Site malvuln.com

BACKDOOR.WIN32.BNLITE malware suffers from a remote heap corruption vulnerability.

tags | exploit, remote
systems | windows
MD5 | 1350fe87125f382e8b464f50e1026574
TROJAN.WIN32.JORIK.DMSPAMMER.SZ Remote Memory Corruption
Posted Jan 4, 2021
Authored by malvuln | Site malvuln.com

TROJAN.WIN32.JORIK.DMSPAMMER.SZ malware suffers from a remote memory corruption vulnerability.

tags | exploit, remote, trojan
systems | windows
MD5 | 55fd186c4f2c6e538578030ac38957e3
HEUR.RISKTOOL.WIN32.BITMINER.GEN Remote Memory Corruption / Null Pointer
Posted Jan 4, 2021
Authored by malvuln | Site malvuln.com

HEUR.RISKTOOL.WIN32.BITMINER.GEN malware suffers from a null pointer vulnerability.

tags | exploit
systems | windows
MD5 | 601917f8df7d6350a3eb11666ce5459c
Backdoor.Win32.Zombam.j Remote Stack Buffer Overflow
Posted Jan 4, 2021
Authored by malvuln | Site malvuln.com

Backdoor.Win32.Zombam.j malware suffers from a remote stack buffer overflow vulnerability.

tags | exploit, remote, overflow
systems | windows
MD5 | 182a0fbbaac8073813086e67cf27b8ad
BACKDOOR.WIN32.REMOTEMANIPULATOR Insecure Permissions
Posted Jan 4, 2021
Authored by malvuln | Site malvuln.com

BACKDOOR.WIN32.REMOTEMANIPULATOR malware suffers from an insecure permissions vulnerability.

tags | exploit
systems | windows
MD5 | 7864c5aeb2b19a8922a5abecf439eba2
BACKDOOR.WIN32.ADVERBOT Remote Stack Corruption
Posted Jan 4, 2021
Authored by malvuln | Site malvuln.com

BACKDOOR.WIN32.ADVERBOT malware suffers from a remote stack corruption vulnerability.

tags | exploit, remote
systems | windows
MD5 | 7f28cc1158eba60a0170ed99309f564f
Trojan:Win32/Alyak.B Remote Stack Corruption
Posted Jan 4, 2021
Authored by malvuln | Site malvuln.com

Trojan:Win32/Alyak.B malware suffers from a remote stack corruption vulnerability.

tags | exploit, remote, trojan
systems | windows
MD5 | 06f8543da6c6582b57fde48c8e24b0a6
Email-Worm.Win32.Zhelatin.ago Remote Stack Buffer Overflow
Posted Jan 4, 2021
Authored by malvuln | Site malvuln.com

Email-Worm.Win32.Zhelatin.ago malware suffers from a remote stack buffer overflow vulnerability.

tags | exploit, worm, remote, overflow
systems | windows
MD5 | 8bd0a581f8bc5944d334d3e2733b636f
Trojan.Win32.Bayrob.cgau Insecure Permissions / Privilege Escalation
Posted Jan 4, 2021
Authored by malvuln | Site malvuln.com

Trojan.Win32.Bayrob.cgau malware suffers from an insecure permissions vulnerability that can allow for privilege escalation.

tags | exploit, trojan
systems | windows
MD5 | 846139c1b2a63ba6cc03a4216d4531c4
Trojan.Win32.Barjac Remote Stack Buffer Overflow
Posted Jan 4, 2021
Authored by malvuln | Site malvuln.com

Trojan.Win32.Barjac malware suffers from a remote stack buffer overflow vulnerability.

tags | exploit, remote, overflow, trojan
systems | windows
MD5 | de7ba11ed626c2d3eb52927ed32f9e6b
Backdoor.Win32.Infexor.b Remote SEH Stack Buffer Overflow
Posted Jan 4, 2021
Authored by malvuln | Site malvuln.com

Backdoor.Win32.Infexor.b malware suffers from a remote SEH stack buffer overflow vulnerability.

tags | exploit, remote, overflow
systems | windows
MD5 | 9660441017edea19845ef376e2a1e070
Win32 Backdoor 2019-02-ARTRADOWNLOADER SEH Buffer Overflow
Posted Jan 4, 2021
Authored by malvuln | Site malvuln.com

Win32 backdoor 2019-02-ARTRADOWNLOADER suffers from a remote SEH buffer overflow vulnerability.

tags | exploit, remote, overflow
systems | windows
MD5 | 48de69aab1ed6bfc5fd14563a697a420
Trojan.Win32.Antavka.bz Insecure Permissions / Privilege Escalation
Posted Jan 4, 2021
Authored by malvuln | Site malvuln.com

Trojan.Win32.Antavka.bz malware suffers from an insecure permissions vulnerability that can allow for privilege escalation.

tags | exploit, trojan
systems | windows
MD5 | e6caa6b4d13212a574220913e5388693
Wireshark Analyzer 3.4.2
Posted Dec 21, 2020
Authored by Gerald Combs | Site wireshark.org

Wireshark is a GTK+-based network protocol analyzer that lets you capture and interactively browse the contents of network frames. The goal of the project is to create a commercial-quality analyzer for Unix and Win32 and to give Wireshark features that are missing from closed-source sniffers. This is the source code release.

Changes: A QUIC dissector crash has been addressed. Various updates and new features.
tags | tool, sniffer, protocol
systems | windows, unix
MD5 | cf35d1413e7e3b1429ac7f12c823ccd4
Microsoft Windows DrawIconEx Local Privilege Escalation
Posted Dec 15, 2020
Authored by timwr, bee13oy, Yoav Alon, Netanel Ben-Simon | Site metasploit.com

This Metasploit module exploits CVE-2020-1054, an out of bounds write reachable from DrawIconEx within win32k. The out of bounds write can be used to overwrite the pvbits of a SURFOBJ. By utilizing this vulnerability to execute controlled writes to kernel memory, an attacker can gain arbitrary code execution as the SYSTEM user. This module has been tested against a fully updated Windows 7 x64 SP1. Offsets within the exploit code may need to be adjusted to work with other versions of Windows.

tags | exploit, arbitrary, kernel, code execution
systems | windows, 7
advisories | CVE-2020-1054
MD5 | a2dcd90d07d8ceca312311ee5cfc7a43
Wireshark Analyzer 3.4.1
Posted Dec 10, 2020
Authored by Gerald Combs | Site wireshark.org

Wireshark is a GTK+-based network protocol analyzer that lets you capture and interactively browse the contents of network frames. The goal of the project is to create a commercial-quality analyzer for Unix and Win32 and to give Wireshark features that are missing from closed-source sniffers. This is the source code release.

Changes: Multiple security bug fixes as well as new and updated features.
tags | tool, sniffer, protocol
systems | windows, unix
advisories | CVE-2020-26418, CVE-2020-26419, CVE-2020-26420, CVE-2020-26421
MD5 | 62304df45b3c6b7825a09cbb1793906e
Microsoft Windows WOF FSCTL_SET_REPARSE_POINT_EX Cached Signing Level Bypass
Posted Dec 9, 2020
Authored by James Forshaw, Google Security Research

The Microsoft Windows WOF filter driver does not correctly handle the reparse point setting which allows for an arbitrary file to be cached signed leading to a bypass of UMCI.

tags | exploit, arbitrary
systems | windows
advisories | CVE-2020-17139
MD5 | 6ef17e92e2a41526202eea6e0a2e23cb
Microsoft Windows Cloud Filter HsmOsBlockPlaceholderAccess Registry Key Creation / Privilege Escalation
Posted Dec 9, 2020
Authored by James Forshaw, Google Security Research

The Microsoft Windows Cloud Filter HsmOsBlockPlaceholderAccess function allows a user to create arbitrary registry keys in the .DEFAULT users hive leading to elevation of privilege.

tags | exploit, arbitrary, registry
systems | windows
advisories | CVE-2020-17103
MD5 | 1dedadce5dfb6b98c3be28c5271c765b
Microsoft Windows Cloud Filter HsmpAccessCheck Bypass / Privilege Escalation
Posted Dec 9, 2020
Authored by James Forshaw, Google Security Research

The Microsoft Windows Cloud Filter access check does not take into account restrictions such as Mandatory Labels allowing a user to bypass security checks.

tags | exploit
systems | windows
advisories | CVE-2020-17134
MD5 | 294319a3f3e1683a3a6a445f71aca87b
Microsoft Windows Cloud Filter Arbitrary File Creation / Privilege Escalation
Posted Dec 9, 2020
Authored by James Forshaw, Google Security Research

The Microsoft Windows Cloud Filter driver can be abused to create arbitrary files and directories leading to elevation of privilege.

tags | exploit, arbitrary
systems | windows
advisories | CVE-2020-17136
MD5 | f7cc7661ed092a8d29bb9c6c8f666a6e
Druva inSync Windows Client 6.6.3 Privilege Escalation
Posted Dec 8, 2020
Authored by Matteo Malvica

Druva inSync Windows Client version 6.6.3 suffers from a local privilege escalation vulnerability.

tags | exploit, local
systems | windows
advisories | CVE-2020-5752
MD5 | ca5c63a167b7f2e6b4df5a18b94a5e30
Oracle WebLogic Server Administration Console Handle Remote Code Execution
Posted Nov 19, 2020
Authored by wvu, Jang, voidfyoo | Site metasploit.com

This Metasploit module exploits a path traversal and a Java class instantiation in the handle implementation of WebLogic's Administration Console to execute code as the WebLogic user. Versions 10.3.6.0.0, 12.1.3.0.0, 12.2.1.3.0, 12.2.1.4.0, and 14.1.1.0.0 are known to be affected. Tested against 12.2.1.3.0 from Vulhub (Linux) and on Windows. Warning! Multiple sessions may be created by exploiting this vuln.

tags | exploit, java
systems | linux, windows
advisories | CVE-2020-14750, CVE-2020-14882, CVE-2020-14883
MD5 | 5405ea15491baee8139d2505e9a04d02
Microsoft Windows WindowsCodecsRaw!CCanonRawImageRep::GetNamedWhiteBalances Out-Of-Bounds Read
Posted Nov 13, 2020
Authored by Ivan Fratric, Google Security Research

There is an out-of bounds read vulnerability in WindowsCodecsRaw.dll while processing a malformed Canon raw image. This can potentially lead to disclosing the memory of the affected process. All applications that use Windows Image Codecs for image parsing are potentially affected. The vulnerability has been confirmed on Windows 10 v2004 with the most recent patches applied.

tags | advisory
systems | windows
advisories | CVE-2020-17113
MD5 | 1ea2260b2783f8f68dc9be4f978b3561
Page 5 of 233
Back34567Next

File Archive:

February 2021

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Feb 1st
    33 Files
  • 2
    Feb 2nd
    30 Files
  • 3
    Feb 3rd
    15 Files
  • 4
    Feb 4th
    8 Files
  • 5
    Feb 5th
    11 Files
  • 6
    Feb 6th
    2 Files
  • 7
    Feb 7th
    1 Files
  • 8
    Feb 8th
    37 Files
  • 9
    Feb 9th
    15 Files
  • 10
    Feb 10th
    11 Files
  • 11
    Feb 11th
    26 Files
  • 12
    Feb 12th
    8 Files
  • 13
    Feb 13th
    1 Files
  • 14
    Feb 14th
    1 Files
  • 15
    Feb 15th
    9 Files
  • 16
    Feb 16th
    33 Files
  • 17
    Feb 17th
    6 Files
  • 18
    Feb 18th
    10 Files
  • 19
    Feb 19th
    20 Files
  • 20
    Feb 20th
    1 Files
  • 21
    Feb 21st
    1 Files
  • 22
    Feb 22nd
    17 Files
  • 23
    Feb 23rd
    15 Files
  • 24
    Feb 24th
    16 Files
  • 25
    Feb 25th
    28 Files
  • 26
    Feb 26th
    0 Files
  • 27
    Feb 27th
    0 Files
  • 28
    Feb 28th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2020 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close