exploit the possibilities
Showing 1 - 25 of 64 RSS Feed

Files

microsoft.netmeeting.txt
Posted Aug 17, 1999

Severe security vulnerabilities in Microsoft Netmeeting for Windows 9x/NT allow local users to gain root privileges, open up machines running Netmeeting to Denial of Service attacks, much more. No fix or vendor response.

tags | exploit, denial of service, local, root, vulnerability
systems | windows, 9x
MD5 | 83f2f8afd42e0807ab919ada926cd970

Related Files

Go Cryptography Libraries Cleartext Message Spoofing
Posted May 13, 2019
Authored by Aida Mynzhasova | Site sec-consult.com

During a short security test, SEC Consult found a severe security vulnerability in the clearsign package of supplementary Go cryptography libraries.

tags | exploit
advisories | CVE-2019-11841
MD5 | 59bca6acae6ad68908a50cb4c0847104
Microsoft Windows Contact File Format Arbitary Code Execution
Posted Apr 11, 2019
Authored by hyp3rlinx, Brenner Little | Site metasploit.com

This Metasploit module allows remote attackers to execute arbitrary code on vulnerable installations of Microsoft Windows. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The flaw is due to processing of contact files.

tags | exploit, remote, arbitrary
systems | windows
MD5 | 6ee12bdb2b9701fe2b95191dbd4279bd
Microsoft Internet Explorer 11 XML Injection
Posted Apr 11, 2019
Authored by hyp3rlinx | Site hyp3rlinx.altervista.org

Microsoft Internet Explorer 11 suffers from an XML external entity injection vulnerability.

tags | exploit
MD5 | 1bd0be320e4cc74b22614b72b93629bd
Microsoft Windows .Reg File / Dialog Box Message Spoofing
Posted Mar 11, 2019
Authored by hyp3rlinx | Site hyp3rlinx.altervista.org

The Windows registry editor allows specially crafted .reg filenames to spoof the default registry dialog warning box presented to an end user. This can potentially trick unsavvy users into choosing the wrong selection shown on the dialog box. Furthermore, we can deny the registry editor its ability to show the default secondary status dialog box (Win 10), thereby hiding the fact that our attack was successful.

tags | exploit, spoof, registry
systems | windows
MD5 | 105ff93a7fefdb9d6ae572f2070820c3
Microsoft Windows Contact File HTML Link Injection Remote Code Execution
Posted Jan 23, 2019
Authored by hyp3rlinx | Site hyp3rlinx.altervista.org

Microsoft Windows has a flaw where a contact file can be leveraged with a malicious mailto: link to achieve code execution.

tags | exploit, code execution
systems | windows
MD5 | 8da8aed6efa36cf9b75b407094e89ecd
Microsoft Windows .contact Arbitrary Code Execution
Posted Jan 16, 2019
Authored by hyp3rlinx | Site hyp3rlinx.altervista.org

This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Microsoft Windows. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The flaw is due to the processing of ".contact" files <c:Url> node param which takes an expected website value, however if an attacker references an executable file it will run that instead without warning instead of performing expected web navigation. This is dangerous and would be unexpected to an end user.

tags | exploit, remote, web, arbitrary
systems | windows
MD5 | 400f7619bf34f3975072761dde4b36b7
Microsoft Windows VCF Remote Code Execution
Posted Jan 11, 2019
Authored by hyp3rlinx | Site hyp3rlinx.altervista.org

This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Microsoft Windows. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the processing of VCard files. Crafted data in a VCard file can cause Windows to display a dangerous hyperlink. The user interface fails to provide any indication of the hazard. An attacker can leverage this vulnerability to execute code in the context of the current user.

tags | exploit, remote, arbitrary
systems | windows
MD5 | b357f9ac49a1d5e1b09b2def64c183cf
Microsoft Edge 44.17763.1.0 Null Pointer Dereference
Posted Jan 6, 2019
Authored by Bogdan Kurinnoy

Microsoft Edge version 44.17763.1.0 suffers from a null pointer dereference vulnerability.

tags | exploit
MD5 | 0a65b587f31d643082ffba442fb6edfd
Microsoft SQL Server Management Studio 17.9 / 18.0 Preview 4 XML Injection
Posted Oct 11, 2018
Authored by hyp3rlinx | Site hyp3rlinx.altervista.org

Microsoft SQL Server Management Studio versions 17.9 and 18.0 Preview 4 suffer from an xmla filetype XML external entity injection vulnerability.

tags | exploit, sql injection
advisories | CVE-2018-8532
MD5 | f8fb22312550cc368dc913351a5406a8
Microsoft SQL Server Management Studio 17.9 / 18.0 Preview 4 XML Injection
Posted Oct 11, 2018
Authored by hyp3rlinx | Site hyp3rlinx.altervista.org

Microsoft SQL Server Management Studio versions 17.9 and 18.0 Preview 4 suffer from a xel filetype XML external entity injection vulnerability.

tags | exploit, sql injection
advisories | CVE-2018-8527
MD5 | 0fb594060e86354cefaa3a12ba2181d5
Microsoft SQL Server Management Studio 17.9 / 18.0 Preview 4 XML Injection
Posted Oct 11, 2018
Authored by hyp3rlinx | Site hyp3rlinx.altervista.org

Microsoft SQL Server Management Studio versions 17.9 and 18.0 Preview 4 suffer from a REGSRVR filehandling XML external entity injection vulnerability.

tags | exploit, sql injection
advisories | CVE-2018-8533
MD5 | bc7e26312d98457aeac3779548aee6d7
Microsoft Baseline Security Analyzer 2.3 XML Injection
Posted Sep 10, 2018
Authored by hyp3rlinx | Site hyp3rlinx.altervista.org

Microsoft Baseline Security Analyzer version 2.3 suffers from an XML external entity injection vulnerability.

tags | exploit
MD5 | 7224f7e70a591fdfca03428610d0453c
Microsoft .NET Framework CVE-2015-6099 Analysis
Posted Sep 3, 2018
Authored by hyp3rlinx | Site hyp3rlinx.altervista.org

This whitepaper analyzes a privilege escalation vulnerability in the Microsoft .NET framework as noted in MS15-118.

tags | exploit, paper
advisories | CVE-2015-6099
MD5 | 4a014224fc35bfb528ae5d4ebe710d2d
Microsoft DirectX SDK (June 2010) Xact3.exe DLL Hijacking
Posted Aug 11, 2018
Authored by hyp3rlinx | Site hyp3rlinx.altervista.org

The Microsoft DirectX SDK "Xact3.exe" cross-platform tool allows for arbitrary code execution via a trojan horse file "xbdm.dll" in the current working directory, upon opening a ".xap" project file from the same location.

tags | exploit, arbitrary, trojan, code execution
MD5 | d7f1056ce3aa140ad0e115c7bf50b3c0
Microsoft dnslint.exe DNS Tool Forced Drive-By Download
Posted Jul 20, 2018
Authored by hyp3rlinx | Site hyp3rlinx.altervista.org

Microsoft's dnslint.exe tool does not verify domain names when parsing DNS text-files using the "/ql" switch making it prone to forced drive-by downloads, providing an end user is tricked into using a server text-file containing a script/binary reference instead of a normally expected domain name.

tags | exploit
MD5 | eb14060a0091ba68f6b96c6e9ef2fb25
Microsoft Windows Enterprise Mode Site List 1/2 XML Injection
Posted Jul 16, 2018
Authored by hyp3rlinx | Site hyp3rlinx.altervista.org

Microsoft Windows Enterprise Mode Site List Manager versions 1 and 2 suffer from an XML external entity injection vulnerability.

tags | exploit
systems | windows
MD5 | adb95485a2175dc841aa24d2a530ed72
Microsoft Windows .library-ms Information Disclosure
Posted Jul 16, 2018
Authored by hyp3rlinx | Site hyp3rlinx.altervista.org

Library description files are XML files that define libraries. Libraries aggregate items from local and remote storage locations into a single view in Windows Explorer. Library description files follow the Library Description schema and are saved as *.library-ms files. The .library-ms filetype triggers forced authentication when a user/client accesses a remote share that houses an attacker supplied ".library-ms" file, disclosing credential hashes and other identifiable computer informations.

tags | exploit, remote, local
systems | windows
MD5 | 3efbbbe3394fffedf1bbcf55f304effb
Enhanced Mitigation Experience Toolkit (EMET) XML Injection
Posted Jun 30, 2018
Authored by hyp3rlinx | Site hyp3rlinx.altervista.org

Enhanced Mitigation Experience Toolkit (EMET) suffers from an XML external entity injection vulnerability.

tags | exploit
MD5 | da2c5fe7a5b5d3b441f02c18e2d7ca7a
Microsoft Open Redirect
Posted Jun 5, 2018
Authored by Ismail Tasdelen

dpa-fwl.microsoft.com suffers from an open redirection vulnerability.

tags | exploit
MD5 | 9a992791db71dab2fd3cb6f1e0559793
Microsoft Internet Explorer 11.371.16299.0 Denial Of Service
Posted Apr 20, 2018
Authored by hyp3rlinx | Site hyp3rlinx.altervista.org

Microsoft Internet Explorer version 11.371.16299.0 suffers from a denial of service vulnerability.

tags | exploit, denial of service
MD5 | b95fe4c66578b78c338a2d385f6635b6
Microsoft Exchange Open Redirect
Posted Mar 28, 2018
Authored by hyp3rlinx | Site hyp3rlinx.altervista.org

Microsoft Exchange suffers from an open redirect vulnerability.

tags | exploit
advisories | CVE-2016-3378
MD5 | 50d79a092d794c779a0fa7f12fdb4853
Windows DVD Maker 6.1.7 XXE Injection
Posted Mar 16, 2017
Authored by hyp3rlinx | Site hyp3rlinx.altervista.org

Windows DVD Maker version 6.1.7 suffers from an XML external entity injection vulnerability.

tags | exploit, xxe
systems | windows
advisories | CVE-2017-0045
MD5 | 2633411dcb609dcaaf80a71090998e85
Microsoft PowerShell XXE Injection
Posted Dec 6, 2016
Authored by hyp3rlinx | Site hyp3rlinx.altervista.org

Microsoft PowerShell suffers from an XML external entity (XXE) injection vulnerability that allows for file exfiltration.

tags | exploit, xxe
MD5 | 06fe56f18d81ef806aed4773f1517228
Microsoft Authorization Manager 6.1.7601 XXE Injection
Posted Dec 5, 2016
Authored by hyp3rlinx | Site hyp3rlinx.altervista.org

Microsoft Authorization Manager version 6.1.7601 suffers from an XML external entity (XXE) injection vulnerability that allows for file exfiltration.

tags | exploit, xxe
MD5 | 982c09b54dae36f9b5ae432e6c1d0409
Microsoft Event Viewer 1.0 XXE Injection
Posted Dec 5, 2016
Authored by hyp3rlinx | Site hyp3rlinx.altervista.org

Microsoft Event Viewer version 1.0 suffers from an XML external entity (XXE) injection vulnerability that allows for file exfiltration.

tags | exploit, xxe
MD5 | c7a519a9ce4acb64b45e6199d6ff5ae3
Page 1 of 3
Back123Next

File Archive:

May 2019

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    May 1st
    16 Files
  • 2
    May 2nd
    8 Files
  • 3
    May 3rd
    8 Files
  • 4
    May 4th
    2 Files
  • 5
    May 5th
    1 Files
  • 6
    May 6th
    15 Files
  • 7
    May 7th
    22 Files
  • 8
    May 8th
    16 Files
  • 9
    May 9th
    17 Files
  • 10
    May 10th
    16 Files
  • 11
    May 11th
    3 Files
  • 12
    May 12th
    4 Files
  • 13
    May 13th
    25 Files
  • 14
    May 14th
    24 Files
  • 15
    May 15th
    78 Files
  • 16
    May 16th
    16 Files
  • 17
    May 17th
    12 Files
  • 18
    May 18th
    2 Files
  • 19
    May 19th
    1 Files
  • 20
    May 20th
    2 Files
  • 21
    May 21st
    0 Files
  • 22
    May 22nd
    0 Files
  • 23
    May 23rd
    0 Files
  • 24
    May 24th
    0 Files
  • 25
    May 25th
    0 Files
  • 26
    May 26th
    0 Files
  • 27
    May 27th
    0 Files
  • 28
    May 28th
    0 Files
  • 29
    May 29th
    0 Files
  • 30
    May 30th
    0 Files
  • 31
    May 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2019 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close