what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 176 - 200 of 6,650 RSS Feed

Operating System: Windows

Windows Kerberos RC4 MD4 Encryption Downgrade Privilege Escalation
Posted Oct 3, 2022
Authored by James Forshaw, Google Security Research

The Windows KDC allows an interposing attacker to downgrade to RC4 MD4 encryption in compromising the user's TGT session key resulting in escalation of privilege.

tags | advisory
systems | windows
SHA-256 | 7cbb12797e608e56c65513653347b2c0b4cee93da07a7ca593f276da0197c595
Backdoor.Win32.Augudor.b MVID-2022-0644 Code Execution
Posted Sep 26, 2022
Authored by malvuln | Site malvuln.com

Backdoor.Win32.Augudor.b malware suffers from a code execution vulnerability.

tags | exploit, code execution
systems | windows
SHA-256 | eb63fba65d43437a287680fff71157dd2127d980055e141a70d67d2a9e75bbe9
Backdoor.Win32.Psychward.b MVID-2022-0645 Hardcoded Credential
Posted Sep 26, 2022
Authored by malvuln | Site malvuln.com

Backdoor.Win32.Psychward.b malware suffers from a hardcoded credential vulnerability.

tags | exploit
systems | windows
SHA-256 | 4a196172d709119bf5c9fd8264d2064a406a4232f965f914f828caf704ad4124
Backdoor.Win32.Bingle.b MVID-2022-0643 Hardcoded Credential
Posted Sep 26, 2022
Authored by malvuln | Site malvuln.com

Backdoor.Win32.Bingle.b malware suffers from a hardcoded credential vulnerability.

tags | exploit
systems | windows
SHA-256 | 2071a5c002ce27b0ea6b560999d5a672774467ed9490813fdbb0280c50591569
Unified Remote Authentication Bypass / Code Execution
Posted Sep 21, 2022
Authored by h00die, H4rk3nz0 | Site metasploit.com

This Metasploit module utilizes the Unified Remote remote control protocol to type out and deploy a payload. The remote control protocol can be configured to have no passwords, a group password, or individual user accounts. If the web page is accessible, the access control is set to no password for exploitation, then reverted. If the web page is not accessible, exploitation will be tried blindly. This module has been successfully tested against version 3.11.0.2483 (50) on Windows 10.

tags | exploit, remote, web, protocol
systems | windows
advisories | CVE-2022-3229
SHA-256 | 6c2eb4ad5b1e41ad931f1a7eef24882ce7a6fe92ea15f97c143643b989a7e758
Backdoor.Win32.Hellza.120 MVID-2022-0641 Remote Command Execution
Posted Sep 20, 2022
Authored by malvuln | Site malvuln.com

Backdoor.Win32.Hellza.120 malware suffers from a remote command execution vulnerability.

tags | exploit, remote
systems | windows
SHA-256 | cdc70328ddf40e49dc5b1f2be3419c1dac2bfb6b0721efd3f3603444e744fbd5
Backdoor.Win32.Hellza.120 MVID-2022-0642 Authentication Bypass
Posted Sep 20, 2022
Authored by malvuln | Site malvuln.com

Backdoor.Win32.Hellza.120 malware suffers from an authentication bypass vulnerability.

tags | exploit, bypass
systems | windows
SHA-256 | adbd455e6069c90acd875b4a68a6da7ff2670fe9ef0da2ea17802f855cdd6cda
Trojan.Ransom.Ryuk.A MVID-2022-0640 Code Execution
Posted Sep 20, 2022
Authored by malvuln | Site malvuln.com

Trojan.Ransom.Ryuk.A ransomware looks for and executes DLLs in its current directory. Therefore, we can potentially hijack a DLL, execute our own code, and control and terminate the malware pre-encryption. Once loaded the exploit dll will check if the current directory is "C:\Windows\System32" and if not, we grab our process ID and terminate. All basic tests were conducted successfully in a virtual machine environment.

tags | exploit, trojan
systems | windows
SHA-256 | cf8ca0f9491742132b26f99723587a07bd7827506a1fb18e871a77bfbc3b9a62
Trojan-Dropper.Win32.Corty.10 MVID-2022-0639 Insecure Credential Storage
Posted Sep 20, 2022
Authored by malvuln | Site malvuln.com

Trojan-Dropper.Win32.Corty.10 malware suffers from an insecure credential storage vulnerability.

tags | exploit, trojan
systems | windows
SHA-256 | 32271f7a5d8be605d0185b7cf8397b7bf3093ad269844c0104016e34a6185027
Windows Credential Guard TGT Renewal Information Disclosure
Posted Sep 9, 2022
Authored by James Forshaw, Google Security Research

On Windows, the Kerberos ticket renewal process can be used with CG to get an unencrypted TGT session key for a currently authenticated user leading to information disclosure.

tags | exploit, info disclosure
systems | windows
advisories | CVE-2022-35822
SHA-256 | 1f9bd51e7f807ea1be820b38b4053f9b704e41211fd5779bce57f43bf497716a
Windows Credential Guard Non-Constant Time Comparison Information Disclosure
Posted Sep 9, 2022
Authored by James Forshaw, Google Security Research

On Windows, the handling of cryptographic data comparison in the CG secure process does not use constant time algorithms resulting in information disclosure.

tags | advisory, info disclosure
systems | windows
advisories | CVE-2022-34704
SHA-256 | 1eae27125e32160c8f3573cd0f12536dc12d59971e45282431a815f2a69f4009
Windows Credential Guard KerbIumGetNtlmSupplementalCredential Information Disclosure
Posted Sep 9, 2022
Authored by James Forshaw, Google Security Research

On Windows, the KerbIumGetNtlmSupplementalCredential CG API does not check the encryption key type leading to information disclosure of key material.

tags | exploit, info disclosure
systems | windows
advisories | CVE-2022-34712
SHA-256 | bfc4de1d074e4d56008f260f7b9c997af5b2161990204d92efb3480c889c7baa
Windows Credential Guard KerbIumCreateApReqAuthenticator Key Information Disclosure
Posted Sep 9, 2022
Authored by James Forshaw, Google Security Research

On Windows, CG API KerbIumCreateApReqAuthenticator can be used to decrypt arbitrary encrypted Kerberos keys leading to information disclosure.

tags | exploit, arbitrary, info disclosure
systems | windows
advisories | CVE-2022-34711
SHA-256 | 795dc1d7b2670d24abb7d74a9852a53667f29e9616266571270c30ddde0cf221
Windows Credential Guard Kerberos Change Password Privilege Escalation
Posted Sep 9, 2022
Authored by James Forshaw, Google Security Research

Windows Credential guard does not prevent using encrypted Kerberos keys to change a user's password leading to elevation of privilege.

tags | exploit
systems | windows
advisories | CVE-2022-35771
SHA-256 | 963aa15cc46082f2880e53f09434bff0855b293f238fa1b7b59fcc34a5c7c568
Windows Credential Guard Insufficient Checks On Kerberos Encryption Type Use
Posted Sep 9, 2022
Authored by James Forshaw, Google Security Research

Windows CG APIs, which take encrypted keys, do not limit what encryption or checksum types can be used with those keys. This can result in using weak encryption algorithms which could be abused to either generate keystreams or brute force encryption keys.

tags | exploit
systems | windows
advisories | CVE-2022-34710
SHA-256 | a89b74c0dc18c8ac3c1161dc1b3af00aa0758ae52080749f23434cc90472d8b2
Windows Credential Guard BCrypt Context Use-After-Free Privilege Escalation
Posted Sep 9, 2022
Authored by James Forshaw, Google Security Research

On Windows, the method for allocating a context when using the CG BCrypt APIs is insecure leading to use-after-free of secure memory resulting in elevation of privilege.

tags | exploit
systems | windows
advisories | CVE-2022-34705
SHA-256 | c22c4583f57e6b94c3c87d7e06f1807aec4eb6add28377b878080567d6bba7a8
Windows Credential Guard ASN1 Decoder Type Confusion Privilege Escalation
Posted Sep 9, 2022
Authored by James Forshaw, Google Security Research

On Windows, a number of Kerberos CG APIs do not verify the ASN1 PDU type when decoding and encoding Kerberos ASN1 structures leading to type confusion and elevation of privilege.

tags | exploit
systems | windows
advisories | CVE-2022-34709
SHA-256 | af00e87e42028f79ab35606912cd654841bc7965655e5d68e202a8ef913306f4
Windows Kernel Registry Hive Memory Problems
Posted Sep 9, 2022
Authored by Google Security Research, mjurczyk

The Windows kernel suffers from multiple memory problems when handling incorrectly formatted security descriptors in registry hives.

tags | exploit, kernel, registry
systems | windows
advisories | CVE-2022-35768
SHA-256 | 293c30cffcbb94043ce3d944e538e450e3725f0cfaac4a97ac6e1fd8f5cb1152
Windows Kernel Unchecked Blink Cell Index Invalid Read/Write
Posted Sep 9, 2022
Authored by Google Security Research, mjurczyk

The Windows kernel suffers from an invalid read/write condition due to an unchecked Blink cell index in the root security descriptor.

tags | exploit, kernel, root
systems | windows
advisories | CVE-2022-34708
SHA-256 | f5ef4884111855adc3fd46bc812f23d93a2b2cd3ea5d058dca7ff112e15a1d10
Windows Kernel Refcount Overflow Use-After-Free
Posted Sep 9, 2022
Authored by Google Security Research, mjurczyk

The Windows kernel suffers from a use-after-free vulnerability due to a refcount overflow in the registry hive security descriptors.

tags | exploit, overflow, kernel, registry
systems | windows
advisories | CVE-2022-34707
SHA-256 | 887d2c7083667658525f99cb11e9070e5fce0488ac2056ebd3b6c51b176ad7c3
Wireshark Analyzer 3.6.8
Posted Sep 8, 2022
Authored by Gerald Combs | Site wireshark.org

Wireshark is a GTK+-based network protocol analyzer that lets you capture and interactively browse the contents of network frames. The goal of the project is to create a commercial-quality analyzer for Unix and Win32 and to give Wireshark features that are missing from closed-source sniffers. This is the source code release.

Changes: An infinite loop vulnerability in the F5 Ethernet Trailer dissector has been fixed. 14 other bugs have also been addressed. Updated protocol support for BGP, BICC, BT ATT, CBSP, Couchbase, F5 Ethernet Trailer, Frame, GTP, GTP (prime), IPsec, ISUP, L2TP, NAS-5GS, Protobuf, SCCP, TCP, and TLS.
tags | tool, sniffer, protocol
systems | windows, unix
SHA-256 | 67ab23ee09a646ab8cc0ddcc985209f24f253337461e3d9644c6cfe1c097260c
Trojan-Ransom.Win32.Hive.bv MVID-2022-0636 Code Execution
Posted Sep 7, 2022
Authored by malvuln | Site malvuln.com

Trojan-Ransom.Win32.Hive.bv malware suffers from a code execution vulnerability.

tags | exploit, trojan, code execution
systems | windows
SHA-256 | f83469a387bb85b1095ec29c4bce40b4dee2ed888fd5d49f25e84791155b9806
Trojan.Win32.Autoit.fhj MVID-2022-0638 NULL DACL
Posted Sep 7, 2022
Authored by malvuln | Site malvuln.com

Trojan.Win32.Autoit.fhj malware creates two processes "xservice.exe" and a child process "xps.exe". The process creates an IPC pipe with a NULL DACL allowing RW for the Everyone user group.

tags | exploit, trojan
systems | windows
SHA-256 | 9841ae12eb6bf5ae767a59bd72cbbd7fd293da629995025465c618d5121bbc7e
Trojan-Spy.Win32.Pophot.bsl MVID-2022-0635 Insecure Permissions
Posted Sep 7, 2022
Authored by malvuln | Site malvuln.com

Trojan-Spy.Win32.Pophot.bsl malware suffers from an insecure permissions vulnerability.

tags | exploit, trojan
systems | windows
SHA-256 | d84abac25b9b004380790dd21ceec9c49b73c59db79cee24d39decbe0e1623e1
Backdoor.Win32.Hupigon.aspg MVID-2022-0634 Unquoted Service Path
Posted Sep 7, 2022
Authored by malvuln | Site malvuln.com

Backdoor.Win32.Hupigon.aspg malware suffers from an unquoted service path vulnerability.

tags | exploit
systems | windows
SHA-256 | 887752ece5bea2b15b4d32426b1e97bffee8aa1a6842c8f917087432b7ff5e71
Page 8 of 266
Back678910Next

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    8 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    11 Files
  • 23
    Apr 23rd
    68 Files
  • 24
    Apr 24th
    23 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close