exploit the possibilities
Showing 1 - 22 of 22 RSS Feed

Files

Sielco Sistemi Winlog 2.07.16 Buffer Overflow
Posted Sep 14, 2017
Authored by James Fitts | Site metasploit.com

This Metasploit module exploits a stack based buffer overflow found in Sielco Sistemi Winlog versions 2.07.16 and below. The overflow is triggered during the parsing of a maliciously crafted packet

tags | exploit, overflow
MD5 | ec4306b8ccf2288f4354cba8f9ae6667

Related Files

Razer Synapse rzpnk.sys ZwOpenProcess
Posted Jul 22, 2017
Authored by Spencer McIntyre | Site metasploit.com

A vulnerability exists in the latest version of Razer Synapse (v2.20.15.1104 as of the day of disclosure) which can be leveraged locally by a malicious application to elevate its privileges to those of NT_AUTHORITY\SYSTEM.

tags | exploit, web, arbitrary, shellcode
advisories | CVE-2017-9769
MD5 | 05dbcbf512b9be0da1b9ceddb93d860c
Microsoft Windows IFEO Winlogin SYSTEM Backdooring Exploit
Posted Apr 20, 2017
Authored by Todor Donev

Microsoft Windows IFEO Winlogin SYSTEM backdooring exploit.

tags | exploit
systems | windows
MD5 | 4df690666f51efeb0d89fa0b54a2241c
Sistemi Winlog SCADA Software DLL Hijacking
Posted Apr 6, 2017
Authored by Karn Ganeshen

Sielco Sistemi Winlog SCADA Software versions prior to 3.02.01 suffer from a dll hijacking vulnerability.

tags | exploit
systems | windows
advisories | CVE-2017-5161
MD5 | aeab43959e2123f0d35c8a06fcd50a72
Windows NTUserMessageCall Win32k Kernel Pool Overflow (Schlamperei)
Posted May 5, 2014
Authored by Nils, Jon | Site metasploit.com

A kernel pool overflow in Win32k which allows local privilege escalation. The kernel shellcode nulls the ACL for the winlogon.exe process (a SYSTEM process). This allows any unprivileged process to freely migrate to winlogon.exe, achieving privilege escalation. Used in pwn2own 2013 by MWR to break out of chrome's sandbox. NOTE: when you exit the meterpreter session, winlogon.exe is likely to crash.

tags | exploit, overflow, kernel, local, shellcode
advisories | CVE-2013-1300
MD5 | 8465b04a506a8ce41624fcd378f6dab1
Winlog Lite SCADA HMI System 2.06.17 SEH Overwrite
Posted Aug 29, 2012
Authored by Ciph3r

Winlog Lite SCADA HMI system version 2.06.17 suffers from a SEH overwrite vulnerability.

tags | exploit
MD5 | 0835ef58aed4416b07d9dcc746c517af
Sielco Sistemi Winlog 2.07.16 Code Execution / Directory Traversal
Posted Jun 27, 2012
Authored by Luigi Auriemma | Site aluigi.org

Sielco Sistemi Winlog versions 2.07.16 and below suffer from various code execution, stack overflow, and directory traversal vulnerabilities. Proof of concept utility included.

tags | exploit, overflow, vulnerability, code execution, proof of concept
systems | linux
MD5 | bbbc355567ebc9612708ad1e1f30c924
Sielco Sistemi Winlog Buffer Overflow 2.07.14
Posted Jun 8, 2012
Authored by m1k3 | Site metasploit.com

This Metasploit module exploits a buffer overflow in Sielco Sistem Winlog <= 2.07.14. When sending a specially formatted packet to the Runtime.exe service on port 46824, an attacker may be able to execute arbitrary code.

tags | exploit, overflow, arbitrary
MD5 | 0d745b31c9a71e8a842993e472aad9bc
Secunia Security Advisory 49395
Posted Jun 6, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - m1k3 has discovered a vulnerability in Winlog, which can be exploited by malicious people to compromise a vulnerable system.

tags | advisory
MD5 | 38c0ffce024721efffb8a3aac09dec13
Sielco Sistemi Winlog 2.07.14 Buffer Overflow
Posted Jun 5, 2012
Authored by m1k3

Sielco Sistemi Winlog version 2.07.14 suffers from a buffer overflow vulnerability.

tags | exploit, overflow
MD5 | a0cce9722a0dd28ae724251b8e31a07f
Secunia Security Advisory 47078
Posted Dec 7, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in Winlog Pro, which can be exploited by malicious people to compromise a user's system.

tags | advisory
MD5 | f7f4f54f16af9870be1d3bc490839b35
Sielco Sistemi Winlog Buffer Overflow
Posted Jun 23, 2011
Authored by Luigi Auriemma, MC | Site metasploit.com

This Metasploit module exploits a buffer overflow in Sielco Sistem Winlog <= 2.07.00. When sending a specially formatted packet to the Runtime.exe service, an attacker may be able to execute arbitrary code.

tags | exploit, overflow, arbitrary
advisories | CVE-2011-0517, OSVDB-70418
MD5 | f083b8537a12368517bc2d81de171d52
Sielco Sistemi Winlog 2.07.00 Stack Overflow
Posted Jan 14, 2011
Authored by Luigi Auriemma

Sielco Sistemi Winlog versions 2.07.00 and below suffer from a stack overflow vulnerability.

tags | advisory, overflow
MD5 | fd15be8690f40b824ec26215e48d42a3
Secunia Security Advisory 42894
Posted Jan 14, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Luigi Auriemma has reported a vulnerability in Winlog Pro, which can be exploited by malicious people to compromise a vulnerable system.

tags | advisory
MD5 | d532f4a88c601699ab1827b2a6f123da
lda-1-novell.txt
Posted Dec 6, 2006
Authored by Deral Heiland | Site layereddefense.com

Layered Defense Advisory - A format string vulnerability was discovered within Novell client 4.91 . The vulnerability is due to improper processing of format strings within NMAS (Novell Modular Authentication Services) Information message window. An attacker who enters special crafted format strings in the Username field at the Novell logon and selects Sequences under the NMAS tab can read data from the winlogon process stack or read from arbitrary memory, and at a minimum cause a denial of service.

tags | advisory, denial of service, arbitrary
MD5 | c40208dd24ae2ceaa0a6b1b4062cbfeb
GetAd.c
Posted Oct 17, 2002
Authored by Serus | Site getad.chat.ru

GetAd.c is a new Windows 2000 local exploit which gains Local System rights on Win2k SP1-3 be taking advantage of the NetDDE window of winlogon with a shatter attack. Binaries available here.

tags | exploit, local
systems | windows, 2k
MD5 | 5aaf16bbab2ab14dcbff5aa6879af839
fakegina.zip
Posted Aug 15, 2000
Authored by Arne Vidstrom | Site ntsecurity.nu

FakeGINA intercepts the communication between Winlogon and the normal GINA, and while doing this it captures all successful logins (domain, username, password) and writes them to a text file. FakeGINA shows at least one very important thing - one should never use the same password on more than one system. If one system is compromised, the attacker might use something like FakeGINA to capture all the passwords, and then use them against other systems.

MD5 | 9a55ee09bba39df20b06092fe138e7bd
winl_troj.zip
Posted Jul 4, 2000
Authored by Txgreg

Ginastub.dll v1.0 - A WinLogon password grabber which records every users password as they log in.

MD5 | bb90d66b38de831aa0b61e65b43b46d8
crash_winlogin.c
Posted Jun 15, 2000
Authored by Renaud Deraison

Proof of concept exploit for the "Remote Registry Access Authentication" vulnerability in Windows NT 4.0 which was described in ms00-040 which allows a user of the local network to crash winlogon.exe remotely.

tags | exploit, remote, local, registry, proof of concept
systems | windows, nt
MD5 | 00ccd718dea0fad1d684a9c316599f37
ms00-040
Posted Jun 9, 2000

Microsoft Security Bulletin (MS00-040) - Microsoft has released a patch for the "Remote Registry Access Authentication" vulnerability in Microsoft Windows NT 4.0. An authenticated user can send malformed data to a Remote Registry server, causing it to fail. Because the Remote Registry server is contained within the winlogon.exe system process on Windows NT 4.0, a failure in that process would cause the entire system to fail. Microsoft FAQ on this issue available here.

tags | remote, registry
systems | windows, nt
MD5 | 990d9af8e1fb1d6170dc9b0af68f96e9
GetadmforSops.txt
Posted Aug 17, 1999
Authored by David Litchfield

Default permissions on Registry key creates a getadmin hole - security hole in the winlogon registry key on NT 4 (with all SPs) allows elevation of privileges to both local and global Administrator level. Local root compromise. VC++ exploit code included.

tags | exploit, local, root, registry
MD5 | 6317abb4b6cf9f9c565aa8f79ca678b3
nt.screensaver.token.txt
Posted Aug 17, 1999

Windows NT 3.51+SP*, 4.0+SP*, and 5.0b1-b2 screen saver vulnerability in Winlogon.Exe does not properly check for errors, allowing non-privleged user to gain access to admin group.

tags | exploit
systems | windows, nt
MD5 | a28911ab110cb74dfd90d13e89d51355
iss.97-10-21.scheduler_winlogin_keys
Posted Oct 23, 1997

iss.97-10-21.scheduler_winlogin_keys

MD5 | 24b7fd453e9fa2d26d4bacf80e898758
Page 1 of 1
Back1Next

File Archive:

February 2020

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Feb 1st
    1 Files
  • 2
    Feb 2nd
    2 Files
  • 3
    Feb 3rd
    17 Files
  • 4
    Feb 4th
    15 Files
  • 5
    Feb 5th
    24 Files
  • 6
    Feb 6th
    16 Files
  • 7
    Feb 7th
    19 Files
  • 8
    Feb 8th
    1 Files
  • 9
    Feb 9th
    2 Files
  • 10
    Feb 10th
    15 Files
  • 11
    Feb 11th
    20 Files
  • 12
    Feb 12th
    12 Files
  • 13
    Feb 13th
    18 Files
  • 14
    Feb 14th
    17 Files
  • 15
    Feb 15th
    4 Files
  • 16
    Feb 16th
    4 Files
  • 17
    Feb 17th
    34 Files
  • 18
    Feb 18th
    15 Files
  • 19
    Feb 19th
    19 Files
  • 20
    Feb 20th
    20 Files
  • 21
    Feb 21st
    11 Files
  • 22
    Feb 22nd
    0 Files
  • 23
    Feb 23rd
    0 Files
  • 24
    Feb 24th
    0 Files
  • 25
    Feb 25th
    0 Files
  • 26
    Feb 26th
    0 Files
  • 27
    Feb 27th
    0 Files
  • 28
    Feb 28th
    0 Files
  • 29
    Feb 29th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2016 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close