exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 25 of 100 RSS Feed

Files

Microsoft Windows Malicious Software Removal Tool Privilege Escalation
Posted Aug 9, 2021
Authored by James Forshaw, Google Security Research

Microsoft Windows suffers from unsafe temporary directory use with the Malicious Software Removal Tool that can lead to elevation of privilege.

tags | exploit
systems | windows
advisories | CVE-2007-0843, CVE-2015-2418
SHA-256 | 6819297d57101dd6ad7947bc892901e186a3a5f3d7b10cdbea6075ecf121b687

Related Files

Microsoft Windows Remote Desktop Code Execution
Posted Aug 17, 2012
Authored by Edward Torkington | Site ngssoftware.com

The NCC Group has discovered a remote code execution vulnerability in Microsoft Windows Remote Desktop. Unfortunately, as usual, they are withholding any details for three months.

tags | advisory, remote, code execution
systems | windows
SHA-256 | 0fa10f8bd72eefcf41477492323bf1a29066a62a63f7c0287de0cac6b2c9a5ef
Secunia Security Advisory 50244
Posted Aug 15, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in Microsoft Windows, which can be exploited by malicious people to compromise a vulnerable system.

tags | advisory
systems | windows
SHA-256 | 63491bc1a361b46394d0e770340bc1d62e358ab46fcf9ac1195de71f4c9f6e0e
Secunia Security Advisory 50243
Posted Aug 14, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in Microsoft Windows, which can be exploited by malicious people to compromise a user's system.

tags | advisory
systems | windows
SHA-256 | 3921be400542ad8b66f2ad3a5e76763bec88068d4951e85a0d664844d9ce23ed
Secunia Security Advisory 50236
Posted Aug 14, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in Microsoft Windows, which can be exploited by malicious, local users to gain escalated privileges.

tags | advisory, local
systems | windows
SHA-256 | 312c2d9673be9c4269e466183c43c773e722f5516f299990ed56c53da2cd58a2
Secunia Security Advisory 50245
Posted Aug 14, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Multiple vulnerabilities have been reported in Microsoft Windows, which can be exploited by malicious people to cause a DoS (Denial of Service) and compromise a vulnerable system.

tags | advisory, denial of service, vulnerability
systems | windows
SHA-256 | ea724ecfa139cce21a82d519e62f8208e1fc9f237c8b65f59575eb3205065962
Zero Day Initiative Advisory 12-129
Posted Aug 3, 2012
Authored by Tipping Point | Site zerodayinitiative.com

Zero Day Initiative Advisory 12-129 - This vulnerability allows remote attackers to execute arbitrary code from the contact of kernelspace on vulnerable installations of Microsoft Windows. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the kernel's support for TrueType font parsing of compound glyphs. A sign extension error exists in win32k.sys when processing compound glyphs having a total number of contours above 0x7FFF. This can be exploited to corrupt kernel heap memory placed below the space allocated for the "flags" buffer and potentially execute arbitrary code in kernel space.

tags | advisory, remote, arbitrary, kernel
systems | windows
advisories | CVE-2012-0159
SHA-256 | e75b08b74f32bfc501dc8a86f8d3c57d49f38b38038de8495feb68116308083e
Secunia Security Advisory 49874
Posted Jul 10, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A weakness has been reported in Microsoft Windows, which can be exploited by malicious people disclose potentially sensitive information.

tags | advisory
systems | windows
SHA-256 | 4796d0ce21c4c487965b62bd65b4d33f731c699f84d8bd4b4a1f82d2d9138369
Secunia Security Advisory 49873
Posted Jul 10, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in Microsoft Windows, which can be exploited by malicious people to compromise a user's system.

tags | advisory
systems | windows
SHA-256 | eb31dac098394e86cf2f89608ef1e4301f73852d6b43b8c79ff14612ee96867e
Secunia Security Advisory 49743
Posted Jul 10, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in Microsoft Windows, which can be exploited by malicious people to compromise a user's system.

tags | advisory
systems | windows
SHA-256 | f8b4b359d05c886264c323f8028fcdb1516e04c4be578cae06befe12ede6c98d
Secunia Security Advisory 49514
Posted Jun 15, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Dmitry Oleksiuk has discovered a vulnerability in Microsoft Windows, which can be exploited by malicious, local users to cause a DoS (Denial of Service).

tags | advisory, denial of service, local
systems | windows
SHA-256 | 9dfe533be665e7433a40ec3ac986baa81f5745ca026b7a928e26ef60f4ce56a1
Secunia Security Advisory 49454
Posted Jun 13, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Two vulnerabilities have been reported in Microsoft Windows, which can be exploited by malicious, local users to gain escalated privileges.

tags | advisory, local, vulnerability
systems | windows
SHA-256 | 773df53d4fa5b3cc45f10257b049f63fb49661244b6aeea6f5894684b20272ac
Secunia Security Advisory 49384
Posted Jun 12, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in Microsoft Windows, which can be exploited by malicious people to compromise a vulnerable system.

tags | advisory
systems | windows
SHA-256 | 3e6c0698f4ff554f462714ba9fb5da9f7c21d6f35cea63c9e5af6b4fd0a30f59
OpenOffice OLE Importer DocumentSummaryInformation Stream Handling Overflow
Posted May 24, 2012
Site metasploit.com

This Metasploit module exploits a vulnerability in OpenOffice 2.3.1 and 2.3.0 on Microsoft Windows XP SP3. By supplying a OLE file with a malformed DocumentSummaryInformation stream, an attacker can gain control of the execution flow, which results arbitrary code execution under the context of the user.

tags | exploit, arbitrary, code execution
systems | windows
advisories | CVE-2008-0320, OSVDB-44472
SHA-256 | 7f7fa7d76079ea7a99a629f8223bcb4b881b275d2d9b9c051e830361276e7852
Secunia Security Advisory 49200
Posted May 23, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Dmitry Oleksiuk has discovered a vulnerability in Microsoft Windows, which can be exploited by malicious, local users to potentially gain escalated privileges.

tags | advisory, local
systems | windows
SHA-256 | 9fc08a4284a78e5312ea9b4ad160921e4a97faaf0041bde553152b87df38b15c
Windows XP Keyboard Layouts Pool Corruption Proof Of Concept
Posted May 23, 2012
Authored by Oleksiuk Dmytro

This proof of concept code demonstrates a Microsoft Windows XP keyboard layouts pool corruption vulnerability, post MS12-034. The vulnerability exists in the function win32k!ReadLayoutFile() that parses keyboard layout file data.

tags | exploit, proof of concept
systems | windows
SHA-256 | 54effee805a222747d3e4ec5807005657d3668ba3d5cbbdb7f184fa0ed2f64c3
Secunia Security Advisory 49120
Posted May 8, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Multiple vulnerabilities have been reported in Microsoft Windows, which can be exploited by malicious, local users to gain escalated privileges and by malicious people to compromise a user's system.

tags | advisory, local, vulnerability
systems | windows
SHA-256 | 215c25917298206231d8fa3ae5e55aa9d692f49a1b9813874c08e8bcfbe449f7
Secunia Security Advisory 49115
Posted May 8, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in Microsoft Windows, which can be exploited by malicious, local users to gain escalated privileges.

tags | advisory, local
systems | windows
SHA-256 | 9fe3f56b1b384bfbfa4dce83e61da818762396e24dee114131888abf1e14f0f4
Secunia Security Advisory 49114
Posted May 8, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Two vulnerabilities have been reported in Microsoft Windows, which can be exploited by malicious, local users to bypass certain security restrictions and gain escalated privileges.

tags | advisory, local, vulnerability
systems | windows
SHA-256 | 021af0b291c512ba86ab27f470b5eef58250a194c59d8a020deaa4fc14d87ce5
Secunia Security Advisory 49021
Posted May 3, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been discovered in Microsoft Windows, which can be exploited by malicious, local users to cause a DoS (Denial of Service).

tags | advisory, denial of service, local
systems | windows
SHA-256 | 095a431916d4940def018eb172ca9d9eb56ce423b8b31672a945c26e7f23975c
Microsoft Windows XP Win32k.sys Denial Of Service
Posted May 2, 2012
Authored by Lufeng Li

Microsoft Windows XP Win32k.sys local kernel denial of service exploit.

tags | exploit, denial of service, kernel, local
systems | windows
SHA-256 | 5939e46389ff26a365dfe48334d589afc7e6280a2ffb67f3d76e85c7aebbee84
Comodo Internet Security Blue Screen Of Death
Posted Apr 19, 2012
Authored by Ange Albertini

Comodo Internet Security versions until 5.9 suffered from a blue screen of death denial of service condition on Microsoft Windows 7 x64 if a 32b PE with a kernel ImageBase is executed.

tags | advisory, denial of service, kernel
systems | windows
SHA-256 | 1e86af280c77354ea561913520978f4b427cfd15a034c0157c849df03bb3da47
MS11-046 Proof Of Concept
Posted Apr 18, 2012
Authored by FB1H2S

This is a proof of concept exploit for the vulnerability documented in MS11-046 for the Microsoft Windows Ancillary Function Driver (AFD).

tags | exploit, proof of concept
systems | windows
SHA-256 | db03166f4056e42fe514f3a64ffbe8b1395886a9e9f58f55dbe8e7302af75e70
Technical Cyber Security Alert 2012-101A
Posted Apr 11, 2012
Authored by US-CERT | Site us-cert.gov

Technical Cyber Security Alert 2012-101A - There are multiple vulnerabilities in Microsoft Windows, Internet Explorer, Microsoft .NET Framework, Microsoft Office, Microsoft Server Software, Microsoft SQL Server, Microsoft Developer Tools, and Microsoft Forefront United Access Gateway. Microsoft has released updates to address these vulnerabilities.

tags | advisory, vulnerability
systems | windows
SHA-256 | 2151cce31ecc67c5f890478458d9f102d21fc5c5acf8bed6a032535dcfa65a58
Secunia Security Advisory 48581
Posted Apr 11, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in Microsoft Windows, which can be exploited by malicious people to bypass certain security restrictions.

tags | advisory
systems | windows
SHA-256 | 3758bbd92dc7604c222f0640c01f7c2ce25ef1b4318698e5df4cae92bf3f4b59
Red Hat Security Advisory 2012-0421-01
Posted Mar 26, 2012
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2012-0421-01 - Red Hat Enterprise Virtualization Manager is a visual tool for centrally managing collections of virtual machines running Red Hat Enterprise Linux and Microsoft Windows. These packages also include the Red Hat Enterprise Virtualization Manager REST API, a set of scriptable commands that give administrators the ability to perform queries and operations on Red Hat Enterprise Virtualization Manager. It was found that RESTEasy was vulnerable to XML External Entity attacks. If a remote attacker who is able to access the Red Hat Enterprise Virtualization Manager REST API submitted a request containing an external XML entity to a RESTEasy endpoint, the entity would be resolved, allowing the attacker to read files accessible to the user running the application server. This flaw affected DOM Document and JAXB input.

tags | advisory, remote, xxe
systems | linux, redhat, windows
advisories | CVE-2012-0818
SHA-256 | d2a9d377caafb6815fcd666dfd9df10b3dff9a2401747a63f81e7690560814dd
Page 1 of 4
Back1234Next

File Archive:

July 2022

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jul 1st
    52 Files
  • 2
    Jul 2nd
    0 Files
  • 3
    Jul 3rd
    0 Files
  • 4
    Jul 4th
    11 Files
  • 5
    Jul 5th
    8 Files
  • 6
    Jul 6th
    8 Files
  • 7
    Jul 7th
    0 Files
  • 8
    Jul 8th
    0 Files
  • 9
    Jul 9th
    0 Files
  • 10
    Jul 10th
    0 Files
  • 11
    Jul 11th
    0 Files
  • 12
    Jul 12th
    0 Files
  • 13
    Jul 13th
    0 Files
  • 14
    Jul 14th
    0 Files
  • 15
    Jul 15th
    0 Files
  • 16
    Jul 16th
    0 Files
  • 17
    Jul 17th
    0 Files
  • 18
    Jul 18th
    0 Files
  • 19
    Jul 19th
    0 Files
  • 20
    Jul 20th
    0 Files
  • 21
    Jul 21st
    0 Files
  • 22
    Jul 22nd
    0 Files
  • 23
    Jul 23rd
    0 Files
  • 24
    Jul 24th
    0 Files
  • 25
    Jul 25th
    0 Files
  • 26
    Jul 26th
    0 Files
  • 27
    Jul 27th
    0 Files
  • 28
    Jul 28th
    0 Files
  • 29
    Jul 29th
    0 Files
  • 30
    Jul 30th
    0 Files
  • 31
    Jul 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Hosting By
Rokasec
close