what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 151 - 175 of 6,643 RSS Feed

Operating System: Windows

Windows Kernel Long Registry Key / Value Out-Of-Bounds Read
Posted Nov 10, 2022
Authored by Google Security Research, mjurczyk

The Windows kernel suffers from out-of-bounds reads and other issues when operating on long registry key and value names.

tags | exploit, kernel, registry
systems | windows
advisories | CVE-2022-37991
SHA-256 | 8b59c6140909e13954c81f8ebbddfeb70a1e3eaf5675031e13f783c0db187379
Windows Kernel Long Registry Path Memory Corruption
Posted Nov 10, 2022
Authored by Google Security Research, mjurczyk

The Windows kernel suffers from multiple memory corruption vulnerabilities when operating on very long registry paths.

tags | exploit, kernel, registry, vulnerability
systems | windows
advisories | CVE-2022-38038
SHA-256 | 98287a2f682dd844bcaa8bbc51f70cb0d694e997a42fcb83f27b010fb379d61d
Windows Kernel Type Confusion Memory Corruption
Posted Nov 8, 2022
Authored by Google Security Research, mjurczyk

The Windows Kernel suffers from a memory corruption vulnerability due to type confusion of subkey index leaves in registry hives.

tags | exploit, kernel, registry
systems | windows
advisories | CVE-2022-38037
SHA-256 | 5243d82498c43a219718d01db84be2571a427237b6a4a54d1f50e487c8526fea
Windows Kernel Registry Use-After-Free
Posted Nov 7, 2022
Authored by Google Security Research, mjurczyk

The Windows kernel registry suffers from a use-after-free vulnerability due to bad handling of failed reallocations under memory pressure.

tags | exploit, kernel, registry
systems | windows
advisories | CVE-2022-37988
SHA-256 | 8bfa22378d9e50ef4b418d4748365b0da33423d42dc3533797aebf4653bedc6d
Wireshark Analyzer 4.0.1
Posted Oct 27, 2022
Authored by Gerald Combs | Site wireshark.org

Wireshark is a GTK+-based network protocol analyzer that lets you capture and interactively browse the contents of network frames. The goal of the project is to create a commercial-quality analyzer for Unix and Win32 and to give Wireshark features that are missing from closed-source sniffers. This is the source code release.

Changes: 15 bug fixes. The experimental display filter syntax for literals using angle brackets that was introduced in Wireshark 4.0.0 has been removed. Updated protocol support for ASN.1 PER, CFDP, Diameter, DirectPlay, F5 Ethernet Trailer, GTP, H.223, H.248, H.264, H.265, IEEE 802.11, IPv4, MBIM, O-RAN FH CUS, PFCP, RTCP, SCTP, SMB, TCP, and TRANSUM.
tags | tool, sniffer, protocol
systems | windows, unix
SHA-256 | b3b002f99d13bbf47f9ed3be7eb372cb0c2454bd0faea29a756819ce019ffdc2
Backdoor.Win32.Psychward.10 MVID-2022-0651 Remote Command Execution
Posted Oct 24, 2022
Authored by malvuln | Site malvuln.com

Backdoor.Win32.Psychward.10 malware suffers from an unauthenticated remote command execution vulnerability.

tags | exploit, remote
systems | windows
SHA-256 | 50c8d45b439f940960ae1c8f607103a266bf0e358d5a088cf19752880f976bdf
Email-Worm.Win32.Kipis.c MVID-2022-0652 File Write / Code Execution
Posted Oct 24, 2022
Authored by malvuln | Site malvuln.com

Email-Worm.Win32.Kipis.c malware suffers from a remote file write vulnerability that allows for remote code execution.

tags | exploit, worm, remote, code execution
systems | windows
SHA-256 | a928474123c62826be6937b0f16cc3bd810a092305c80c11b1dba87312f0d8be
Backdoor.Win32.Delf.arh MVID-2022-0650 Authentication Bypass
Posted Oct 24, 2022
Authored by malvuln | Site malvuln.com

Backdoor.Win32.Delf.arh malware suffers from an authentication bypass vulnerability.

tags | exploit, bypass
systems | windows
SHA-256 | e5c413409b33c8c771245af2c651a2554e93871a2544df61fe5e997eedfd885b
Red Hat Security Advisory 2022-7051-01
Posted Oct 21, 2022
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2022-7051-01 - The OpenJDK 17 packages provide the OpenJDK 17 Java Runtime Environment and the OpenJDK 17 Java Software Development Kit. This release of the Red Hat build of OpenJDK 17 for Windows serves as a replacement for the Red Hat build of OpenJDK 17 and includes security and bug fixes, and enhancements. For further information, refer to the release notes linked to in the References section. Issues addressed include buffer overflow and randomization vulnerabilities.

tags | advisory, java, overflow, vulnerability
systems | linux, redhat, windows
advisories | CVE-2022-21618, CVE-2022-21619, CVE-2022-21624, CVE-2022-21626, CVE-2022-21628, CVE-2022-39399
SHA-256 | a080913060a11b7f8a978136654486737cc696ffe735cec2c2662f0a07265d2c
Red Hat Security Advisory 2022-7049-01
Posted Oct 21, 2022
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2022-7049-01 - The OpenJDK 8 packages provide the OpenJDK 8 Java Runtime Environment and the OpenJDK 8 Java Software Development Kit. This release of the Red Hat build of OpenJDK 8 for Windows serves as a replacement for the Red Hat build of OpenJDK 8 and includes security and bug fixes, and enhancements. For further information, refer to the release notes linked to in the References section. Issues addressed include a randomization vulnerability.

tags | advisory, java
systems | linux, redhat, windows
advisories | CVE-2022-21619, CVE-2022-21624, CVE-2022-21626, CVE-2022-21628
SHA-256 | d41a5792d2ab0d3943c82753d81dcac8a0f3e4862b51a4e3cf2650e3d778c915
MIMEDefang Email Scanner 3.2
Posted Oct 21, 2022
Authored by Dianne Skoll | Site mimedefang.org

MIMEDefang is a flexible MIME email scanner designed to protect Windows clients from viruses. Includes the ability to do many other kinds of mail processing, such as replacing parts of messages with URLs. It can alter or delete various parts of a MIME message according to a very flexible configuration file. It can also bounce messages with unacceptable attachments. MIMEDefang works with the Sendmail 8.11 and newer "Milter" API, which makes it more flexible and efficient than procmail-based approaches.

Changes: Made graphdefang compatible with current php versions.
systems | windows, unix
SHA-256 | ed1827d990957b413252d528ed0d09c6378146df5695390ac83dc1e7dbd9a4a6
Red Hat Security Advisory 2022-7052-01
Posted Oct 21, 2022
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2022-7052-01 - The OpenJDK 11 packages provide the OpenJDK 11 Java Runtime Environment and the OpenJDK 11 Java Software Development Kit. This release of the Red Hat build of OpenJDK 11 for Windows serves as a replacement for the Red Hat build of OpenJDK 11 and includes security and bug fixes, and enhancements. For further information, refer to the release notes linked to in the References section. Issues addressed include buffer overflow and randomization vulnerabilities.

tags | advisory, java, overflow, vulnerability
systems | linux, redhat, windows
advisories | CVE-2022-21618, CVE-2022-21619, CVE-2022-21624, CVE-2022-21626, CVE-2022-21628, CVE-2022-39399
SHA-256 | e4e461602427282507cfff577a94be990baa5d76b9530c333fbf9ab5fc4bf7c0
Backdoor.Win32.Redkod.d MVID-2022-0649 Hardcoded Credential
Posted Oct 17, 2022
Authored by malvuln | Site malvuln.com

Backdoor.Win32.Redkod.d malware suffers from a hardcoded credential vulnerability.

tags | exploit
systems | windows
SHA-256 | c8a2b863479547ba380b48a0438c4767f9701d170eaab936769fe27a7277e3d9
Backdoor.Win32.DarkSky.23 MVID-2022-0648 Buffer Overflow
Posted Oct 17, 2022
Authored by malvuln | Site malvuln.com

Backdoor.Win32.DarkSky.23 malware suffers from a buffer overflow vulnerability.

tags | exploit, overflow
systems | windows
SHA-256 | ccfdc5120ab2daf0c23bd4df3097f4eb8bff39aa1e7887bbd6954a2132619c04
Windows Kernel Registry Subkey Lists Integer Overflow
Posted Oct 17, 2022
Authored by Google Security Research, mjurczyk

The Windows Kernel suffers from integer overflow vulnerabilities in its registry subkey lists leading to memory corruption.

tags | exploit, overflow, kernel, registry, vulnerability
systems | windows
advisories | CVE-2022-37956
SHA-256 | 4f2712bf388769633e54ee7cdd01205295aa838cb4c905e9fab301e7f201a73e
Wireshark Analyzer 4.0.0
Posted Oct 5, 2022
Authored by Gerald Combs | Site wireshark.org

Wireshark is a GTK+-based network protocol analyzer that lets you capture and interactively browse the contents of network frames. The goal of the project is to create a commercial-quality analyzer for Unix and Win32 and to give Wireshark features that are missing from closed-source sniffers. This is the source code release.

Changes: The macOS packages now ship with Qt 6.2.4 and require macOS 10.14. They previously shipped with Qt 5.15.3. The Windows installers now ship with Npcap 1.71. They previously shipped with Npcap 1.70.
tags | tool, sniffer, protocol
systems | windows, unix
SHA-256 | 3dc125ef85e85c2a756a74cc739b3eb11ce38e30a08e085e77d378ee7fdcaded
Backdoor.Win32.Delf.eg MVID-2022-0647 Remote Command Execution
Posted Oct 3, 2022
Authored by malvuln | Site malvuln.com

Backdoor.Win32.Delf.eg malware suffers from an unauthenticated remote command execution vulnerability.

tags | exploit, remote
systems | windows
SHA-256 | 647bd7e9095b288a89ae94fb9fdf863e6f1885af0b181b032ba01f65602b3f36
Backdoor.Win32.NTRC MVID-2022-0646 Hardcoded Credential
Posted Oct 3, 2022
Authored by malvuln | Site malvuln.com

Backdoor.Win32.NTRC malware suffers from a hardcoded credential vulnerability.

tags | exploit
systems | windows
SHA-256 | a322e5735d0deb5c868f091706d37757fb129052cbe2bf666954811ee4775878
Windows Kerberos RC4 MD4 Encryption Downgrade Privilege Escalation
Posted Oct 3, 2022
Authored by James Forshaw, Google Security Research

The Windows KDC allows an interposing attacker to downgrade to RC4 MD4 encryption in compromising the user's TGT session key resulting in escalation of privilege.

tags | advisory
systems | windows
SHA-256 | 7cbb12797e608e56c65513653347b2c0b4cee93da07a7ca593f276da0197c595
Backdoor.Win32.Augudor.b MVID-2022-0644 Code Execution
Posted Sep 26, 2022
Authored by malvuln | Site malvuln.com

Backdoor.Win32.Augudor.b malware suffers from a code execution vulnerability.

tags | exploit, code execution
systems | windows
SHA-256 | eb63fba65d43437a287680fff71157dd2127d980055e141a70d67d2a9e75bbe9
Backdoor.Win32.Psychward.b MVID-2022-0645 Hardcoded Credential
Posted Sep 26, 2022
Authored by malvuln | Site malvuln.com

Backdoor.Win32.Psychward.b malware suffers from a hardcoded credential vulnerability.

tags | exploit
systems | windows
SHA-256 | 4a196172d709119bf5c9fd8264d2064a406a4232f965f914f828caf704ad4124
Backdoor.Win32.Bingle.b MVID-2022-0643 Hardcoded Credential
Posted Sep 26, 2022
Authored by malvuln | Site malvuln.com

Backdoor.Win32.Bingle.b malware suffers from a hardcoded credential vulnerability.

tags | exploit
systems | windows
SHA-256 | 2071a5c002ce27b0ea6b560999d5a672774467ed9490813fdbb0280c50591569
Unified Remote Authentication Bypass / Code Execution
Posted Sep 21, 2022
Authored by h00die, H4rk3nz0 | Site metasploit.com

This Metasploit module utilizes the Unified Remote remote control protocol to type out and deploy a payload. The remote control protocol can be configured to have no passwords, a group password, or individual user accounts. If the web page is accessible, the access control is set to no password for exploitation, then reverted. If the web page is not accessible, exploitation will be tried blindly. This module has been successfully tested against version 3.11.0.2483 (50) on Windows 10.

tags | exploit, remote, web, protocol
systems | windows
advisories | CVE-2022-3229
SHA-256 | 6c2eb4ad5b1e41ad931f1a7eef24882ce7a6fe92ea15f97c143643b989a7e758
Backdoor.Win32.Hellza.120 MVID-2022-0641 Remote Command Execution
Posted Sep 20, 2022
Authored by malvuln | Site malvuln.com

Backdoor.Win32.Hellza.120 malware suffers from a remote command execution vulnerability.

tags | exploit, remote
systems | windows
SHA-256 | cdc70328ddf40e49dc5b1f2be3419c1dac2bfb6b0721efd3f3603444e744fbd5
Backdoor.Win32.Hellza.120 MVID-2022-0642 Authentication Bypass
Posted Sep 20, 2022
Authored by malvuln | Site malvuln.com

Backdoor.Win32.Hellza.120 malware suffers from an authentication bypass vulnerability.

tags | exploit, bypass
systems | windows
SHA-256 | adbd455e6069c90acd875b4a68a6da7ff2670fe9ef0da2ea17802f855cdd6cda
Page 7 of 266
Back56789Next

File Archive:

March 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Mar 1st
    16 Files
  • 2
    Mar 2nd
    0 Files
  • 3
    Mar 3rd
    0 Files
  • 4
    Mar 4th
    32 Files
  • 5
    Mar 5th
    28 Files
  • 6
    Mar 6th
    42 Files
  • 7
    Mar 7th
    17 Files
  • 8
    Mar 8th
    13 Files
  • 9
    Mar 9th
    0 Files
  • 10
    Mar 10th
    0 Files
  • 11
    Mar 11th
    15 Files
  • 12
    Mar 12th
    19 Files
  • 13
    Mar 13th
    21 Files
  • 14
    Mar 14th
    38 Files
  • 15
    Mar 15th
    15 Files
  • 16
    Mar 16th
    0 Files
  • 17
    Mar 17th
    0 Files
  • 18
    Mar 18th
    10 Files
  • 19
    Mar 19th
    32 Files
  • 20
    Mar 20th
    46 Files
  • 21
    Mar 21st
    16 Files
  • 22
    Mar 22nd
    13 Files
  • 23
    Mar 23rd
    0 Files
  • 24
    Mar 24th
    0 Files
  • 25
    Mar 25th
    12 Files
  • 26
    Mar 26th
    31 Files
  • 27
    Mar 27th
    19 Files
  • 28
    Mar 28th
    42 Files
  • 29
    Mar 29th
    0 Files
  • 30
    Mar 30th
    0 Files
  • 31
    Mar 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close