Twenty Year Anniversary
Showing 101 - 125 of 5,387 RSS Feed

Operating System: Windows

Microsoft Windows Kernel NtQueryInformationThread(ThreadBasicInformation) Memory Disclosure
Posted Mar 21, 2018
Authored by Google Security Research, mjurczyk

The Microsoft Windows kernel suffers from a 64-bit stack memory disclosure vulnerability in NtQueryInformationThread(ThreadBasicInformation).

tags | exploit, kernel
systems | windows
advisories | CVE-2018-0895
MD5 | aec9ca1968214b0e3bca89220158b22c
Ubuntu Security Notice USN-3590-1
Posted Mar 6, 2018
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 3590-1 - It was discovered that Irssi incorrectly handled certain empty nick names. An attacker could possibly use this issue to cause a denial of service. It was discovered that Irssi incorrectly handled certain nick names. An attacker could possibly use this to access sensitive information. It was discovered that Irssi incorrectly handled an increase in the number of windows. An attacker could possibly use this issue to cause a denial of service. Various other issues were also addressed.

tags | advisory, denial of service
systems | linux, windows, ubuntu
advisories | CVE-2018-7050, CVE-2018-7051, CVE-2018-7052, CVE-2018-7053, CVE-2018-7054, CVE-2018-7073
MD5 | e0c5ff89c4f84881bb1572d2af1b6fb0
Microsoft Windows 8.1 / 2012 R2 SMB Denial Of Service
Posted Feb 27, 2018
Authored by Nabeel Ahmed

Microsoft Windows versions 8.1 and 2012 R2 SMB denial of service exploit.

tags | exploit, denial of service
systems | windows
advisories | CVE-2018-0833
MD5 | 2bfe01792d14bfc3f8a4bbfad81b0a4c
Wireshark Analyzer 2.4.5
Posted Feb 26, 2018
Authored by Gerald Combs | Site wireshark.org

Wireshark is a GTK+-based network protocol analyzer that lets you capture and interactively browse the contents of network frames. The goal of the project is to create a commercial-quality analyzer for Unix and Win32 and to give Wireshark features that are missing from closed-source sniffers.

Changes: Various updates.
tags | tool, sniffer, protocol
systems | windows, unix
MD5 | 2b6f1f37c72fa15a0a1863016a0abcc0
Disk Savvy Enterprise 10.4.18 Buffer Ovreflow
Posted Feb 23, 2018
Authored by Daniel Teixeira | Site metasploit.com

This Metasploit module exploits a stack-based buffer overflow vulnerability in Disk Savvy Enterprise version 10.4.18, caused by improper bounds checking of the request sent to the built-in server. This Metasploit module has been tested successfully on Windows 7 SP1 x86.

tags | exploit, overflow, x86
systems | windows, 7
MD5 | bfeae1744c34384854bd5326b5010471
CloudMe Sync 1.10.9 Buffer Overflow
Posted Feb 23, 2018
Authored by Daniel Teixeira, hyp3rlinx | Site metasploit.com

This Metasploit module exploits a stack-based buffer overflow vulnerability in the CloudMe Sync version 1.10.9 client application. This Metasploit module has been tested successfully on Windows 7 SP1 x86.

tags | exploit, overflow, x86
systems | windows, 7
advisories | CVE-2018-6892
MD5 | 41dab942f2886640903e2e9e54f5e2e7
NTCrackPipe 1.0 Local Windows Account Cracker
Posted Feb 23, 2018
Authored by hyp3rlinx | Site hyp3rlinx.altervista.org

NTCrackPipe is a basic local Windows account cracking tool.

tags | local, cracker
systems | windows
MD5 | 8ce40f865cb88712052d4f9ea1c811ea
Windows Kernel win32k!fnHkINLPMSLLHOOKSTRUCT Memory Disclosure
Posted Feb 22, 2018
Authored by Google Security Research, mjurczyk

The 64-bit Windows kernel suffers from a stack memory disclosure vulnerability in win32k!fnHkINLPMSLLHOOKSTRUCT (via user-mode callback).

tags | advisory, kernel
systems | windows
advisories | CVE-2018-0810
MD5 | f2649d29716451a098dfbf661fbfbe0a
Windows Kernel win32k!SfnINLPHELPINFOSTRUCT Memory Disclosure
Posted Feb 22, 2018
Authored by Google Security Research, mjurczyk

The 64-bit Windows kernel suffers from a stack memory disclosure vulnerability in win32k!SfnINLPHELPINFOSTRUCT (via user-mode callback).

tags | advisory, kernel
systems | windows
advisories | CVE-2018-0810
MD5 | 27c78eb28b55312aa2809afbc0d3b311
Windows Kernel win32k!fnHkINLPMOUSEHOOKSTRUCTEX Memory Disclosure
Posted Feb 22, 2018
Authored by Google Security Research, mjurczyk

The 64-bit Windows kernel suffers from a stack memory disclosure vulnerability in win32k!fnHkINLPMOUSEHOOKSTRUCTEX (via user-mode callback).

tags | advisory, kernel
systems | windows
advisories | CVE-2018-0810
MD5 | 51df2fe0cf72e749bba708e2ea83d84a
Windows Kernel win32k!SfnINOUTLPWINDOWPOS Memory Disclosure
Posted Feb 22, 2018
Authored by Google Security Research, mjurczyk

The 64-bit Windows kernel suffers from a pool memory disclosure vulnerability in win32k!SfnINOUTLPWINDOWPOS (via user-mode callback).

tags | advisory, kernel
systems | windows
advisories | CVE-2018-0810
MD5 | 9c567298b0ec80585c4b62f8cb2074d5
Windows Constrained Impersonation Capability Privilege Escalation
Posted Feb 22, 2018
Authored by James Forshaw, Google Security Research

Windows suffers from a Constrained Impersonation Capability privilege escalation vulnerability.

tags | exploit
systems | windows
advisories | CVE-2018-0821
MD5 | 1f17f321ec2055627ec4f2ce8c689dc4
Windows Kernel Double Fetches
Posted Feb 22, 2018
Authored by Google Security Research, mjurczyk

The Windows Kernel suffers from double fetches in win32kfull!xxxImeWindowPosChanged and win32kfull!InternalRebuildHwndListForIMEClass.

tags | advisory, kernel
systems | windows
advisories | CVE-2018-0809
MD5 | cda157a63a505b6dc3e57ec6e5981c51
Windows StorSvc SvcMoveFileInheritSecurity Arbitrary File Security Descriptor Overwrite
Posted Feb 22, 2018
Authored by James Forshaw, Google Security Research

Windows StorSvc SvcMoveFileInheritSecurity suffers from an arbitrary file security descriptor overwrite vulnerability that allows for privilege escalation.

tags | exploit, arbitrary
systems | windows
MD5 | c23ff1030843d4b2a8918b43f35200c0
Windows NPFS Symlink Security Feature Bypass / Privilege Escalation
Posted Feb 20, 2018
Authored by James Forshaw, Google Security Research

Windows suffers from NPFS Symlink security feature bypass and privilege escalation vulnerabilities.

tags | exploit, vulnerability
systems | windows
advisories | CVE-2018-0823
MD5 | 351a799b32a8be9550b61628f66dea60
Windows Global Reparse Point Security Feature Bypass / Privilege Escalation
Posted Feb 20, 2018
Authored by James Forshaw, Google Security Research

Windows suffer from Global Reparse Point security feature bypass and privilege escalation vulnerabilities.

tags | exploit, vulnerability
systems | windows
advisories | CVE-2018-0822
MD5 | 84a050a0c09ac8b610c64807057eb756
Windows Kernel nt!RtlpCopyLegacyContextX86 Stack Memory Disclosure
Posted Feb 20, 2018
Authored by Google Security Research, mjurczyk

The Windows kernel suffers from a nt!RtlpCopyLegacyContextX86 stack memory disclosure vulnerability.

tags | exploit, kernel
systems | windows
advisories | CVE-2018-0832
MD5 | 377dfc9711b87f3d2d74deede52a59ef
Mozilla Executable Installer DLL Hijacking
Posted Feb 20, 2018
Authored by Stefan Kanthak

Mozilla's executable installers are vulnerable to dll hijacking.

tags | advisory
systems | windows
MD5 | 8915a3fa0d07a20bdf3b322c2c1e4179
Zero Day Zen Garden: Windows Exploits Development - Part 5
Posted Feb 16, 2018
Authored by Steve Patterson

Whitepaper called Zero Day Zen Garden: Windows Exploit Development Part 5 [Return Oriented Programming Chains].

tags | paper
systems | windows
MD5 | 3e997bff18215da9f06ce4af9ce36ef1
Advantech WebAccess Node 8.3.0 DLL Hijacking
Posted Feb 12, 2018
Authored by Nassim Asrir

Advantech WebAccess Node version 8.3.0 suffers from an AspVBObj.dll code execution dll hijacking vulnerability.

tags | exploit, code execution
systems | windows
advisories | CVE-2018-6911
MD5 | d399329ffa7fecc776e24fe1316f6ea9
Microsoft Skype DLL Hijacking
Posted Feb 9, 2018
Authored by Stefan Kanthak

Microsoft's Skype home-grown updater suffers from a dll hijacking vulnerability.

tags | exploit
systems | windows
MD5 | e378e1abd2417b24f1e060626ed42449
Microsoft Windows Subsystem For Linux Local Privilege Escalation
Posted Feb 2, 2018
Authored by Saar Amar

Microsoft Windows Subsystem for Linux execve() local privilege escalation exploit.

tags | exploit, local
systems | linux, windows
advisories | CVE-2018-0743
MD5 | 0903b2d21e77a9343b434798a05ca282
SourceTree Remote Command Injection
Posted Feb 1, 2018
Authored by Atlassian

Sourcetree for macOS versions 1.0b2 up to 2.7.0 and Sourcetree for Windows versions 0.5.1.0 up to 2.4.7.0 suffers from multiple command injection vulnerabilities.

tags | advisory, vulnerability
systems | windows
advisories | CVE-2017-14592, CVE-2017-14593, CVE-2017-17458, CVE-2017-17831
MD5 | b6f6d427c28112f1184e24193c496c12
BMC Server Automation RSCD Agent NSH Remote Command Execution
Posted Jan 31, 2018
Authored by Nicky Bloor, Olga Yanushkevich | Site metasploit.com

This Metasploit module exploits a weak access control check in the BMC Server Automation RSCD agent that allows arbitrary operating system commands to be executed without authentication. Note: Under Windows, non-powershell commands may need to be prefixed with 'cmd /c'.

tags | exploit, arbitrary
systems | windows
advisories | CVE-2016-1542, CVE-2016-1543
MD5 | 21c820bdd8fcc8d4555e107c87aa2da7
BMC BladeLogic RSCD Agent 8.3.00.64 Windows Users Disclosure
Posted Jan 30, 2018
Authored by Paul Taylor

BMC BladeLogic RSCD Agent version 8.3.00.64 suffers from a windows users disclosure vulnerability.

tags | exploit
systems | windows
advisories | CVE-2016-5063
MD5 | 9a5bc055f019f7c0dbca70e7a76dd801
Page 5 of 216
Back34567Next

File Archive:

October 2018

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Oct 1st
    26 Files
  • 2
    Oct 2nd
    15 Files
  • 3
    Oct 3rd
    15 Files
  • 4
    Oct 4th
    15 Files
  • 5
    Oct 5th
    15 Files
  • 6
    Oct 6th
    2 Files
  • 7
    Oct 7th
    3 Files
  • 8
    Oct 8th
    23 Files
  • 9
    Oct 9th
    16 Files
  • 10
    Oct 10th
    15 Files
  • 11
    Oct 11th
    19 Files
  • 12
    Oct 12th
    16 Files
  • 13
    Oct 13th
    2 Files
  • 14
    Oct 14th
    2 Files
  • 15
    Oct 15th
    15 Files
  • 16
    Oct 16th
    20 Files
  • 17
    Oct 17th
    19 Files
  • 18
    Oct 18th
    21 Files
  • 19
    Oct 19th
    16 Files
  • 20
    Oct 20th
    0 Files
  • 21
    Oct 21st
    0 Files
  • 22
    Oct 22nd
    19 Files
  • 23
    Oct 23rd
    24 Files
  • 24
    Oct 24th
    0 Files
  • 25
    Oct 25th
    0 Files
  • 26
    Oct 26th
    0 Files
  • 27
    Oct 27th
    0 Files
  • 28
    Oct 28th
    0 Files
  • 29
    Oct 29th
    0 Files
  • 30
    Oct 30th
    0 Files
  • 31
    Oct 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2018 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close