exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 25 of 296 RSS Feed

Registry Files

Microsoft Windows Registry Predefined Keys Privilege Escalation
Posted Jan 11, 2024
Authored by Google Security Research, mjurczyk

Predefined keys in the Microsoft Windows Registry may lead to confused deputy problems and local privilege escalation.

tags | exploit, local, registry
systems | windows
advisories | CVE-2023-35356, CVE-2023-35633
SHA-256 | a4c3435d9c5e52f576c70ff4db3da2de108e219bbd349f1ce79de1a81c042945
Microsoft Windows Kernel Information Disclosure
Posted Jan 3, 2024
Authored by Google Security Research, mjurczyk

Any unprivileged, local user in Microsoft Windows can disclose whether a specific file, directory or registry key exists in the system or not, even if they do not have the open right to it or enumerate right to its parent.

tags | exploit, local, registry
systems | windows
SHA-256 | eba081f5682137a596749db83d8591dfa5e5d9dffadba5ca011381bdd72018c4
Red Hat Security Advisory 2023-7820-03
Posted Dec 14, 2023
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2023-7820-03 - Updated images that fix several bugs are now available for Red Hat OpenShift Data Foundation 4.12.10 on Red Hat Enterprise Linux 8 from Red Hat Container Registry.

tags | advisory, registry
systems | linux, redhat
advisories | CVE-2021-3765
SHA-256 | 99893907174d10183620ce9ea66c7d20b572c84c04b7d1143b5deb9438e60cfa
Windows Kernel Race Conditions
Posted Dec 14, 2023
Authored by Google Security Research, mjurczyk

The Microsoft Windows Kernel has an issue with bad locking in registry virtualization that can result in race conditions.

tags | exploit, kernel, registry
systems | windows
advisories | CVE-2023-36403
SHA-256 | 8cf51c7afd8e880ffabc644d09f791fed4bac36689d7102f629eb746b2c13124
Windows Kernel Information Disclosure
Posted Dec 8, 2023
Authored by Google Security Research, mjurczyk

The Microsoft Windows Kernel has a time-of-check / time-of-use issue in verifying layered key security which may lead to information disclosure from privileged registry keys.

tags | exploit, kernel, registry, info disclosure
systems | windows
advisories | CVE-2023-36404
SHA-256 | d827eb89d09814af2562b27f8d81aceb5f4a617c3fbb070846fd5b39ebfaa03e
Red Hat Security Advisory 2023-7653-03
Posted Dec 6, 2023
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2023-7653-03 - An update to the images for Red Hat Integration - Service Registry is now available from the Red Hat Container Catalog. The purpose of this text-only errata is to inform you about the security issues fixed in this release. Issues addressed include bypass and denial of service vulnerabilities.

tags | advisory, denial of service, registry, vulnerability
systems | linux, redhat
advisories | CVE-2023-1584
SHA-256 | 3cc27351ac66db0b03a30f0656703c5b62fe29af2a1b6f8feadcb64d898dda18
Windows Kernel Containerized Registry Escape
Posted Nov 13, 2023
Authored by Google Security Research, mjurczyk

The Microsoft Windows kernel suffers from a containerized registry escape through integer overflows in VrpBuildKeyPath and other weaknesses.

tags | exploit, overflow, kernel, registry
systems | windows
advisories | CVE-2023-36576
SHA-256 | c1feae840787713bb89848cc8ba310ff0f5a1d43e23d59e1de207223ba6d1278
Red Hat Security Advisory 2023-6077-01
Posted Oct 24, 2023
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2023-6077-01 - An updated rhel9/toolbox container image is now available in the Red Hat container registry.

tags | advisory, registry
systems | linux, redhat
advisories | CVE-2023-39325
SHA-256 | b39ff68d6d417c602836d68e8c64e888eee007061c204c6506f4867c407bc84c
Microsoft Windows Kernel Race Condition / Memory Corruption
Posted Oct 16, 2023
Authored by Google Security Research, mjurczyk

The Microsoft Windows Kernel passes user-mode pointers to registry callbacks, leading to race conditions and memory corruption.

tags | exploit, kernel, registry
systems | windows
advisories | CVE-2023-38141
SHA-256 | 57a9fd976b42cf097a3782222d89382836eb91d0a5a6fd4b8b16b49f2a40d715
Microsoft Windows Kernel Recovery Memory Corruption
Posted Sep 8, 2023
Authored by Google Security Research, mjurczyk

The Microsoft Windows Kernel has an issue where a partial success of registry hive log recovery may lead to inconsistent state and memory corruption.

tags | exploit, kernel, registry
systems | windows
advisories | CVE-2023-38154
SHA-256 | 8d90d52ff176f1f9884d9ffea04d9338aa0c0d819ae01d9535ea91d209a17c4f
Microsoft Windows Kernel Integer Overflow / Out-Of-Bounds Read
Posted Sep 8, 2023
Authored by Google Security Research, mjurczyk

The Microsoft Windows Kernel suffers from out-of-bounds reads due to an integer overflow in registry .LOG file parsing.

tags | exploit, overflow, kernel, registry
systems | windows
advisories | CVE-2023-35386
SHA-256 | 2cb8dc117b540fd74b32ad5e82a39042ad150a5cea6b1be9d4e6170722bb1281
Ubuntu Security Notice USN-6336-1
Posted Sep 5, 2023
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 6336-1 - It was discovered that Docker Registry incorrectly handled certain crafted input, A remote attacker could possibly use this issue to cause a denial of service. This issue only affected Ubuntu 16.04 LTS. It was discovered that Docker Registry incorrectly handled certain crafted input. An attacker could possibly use this issue to cause a denial of service.

tags | advisory, remote, denial of service, registry
systems | linux, ubuntu
advisories | CVE-2017-11468, CVE-2023-2253
SHA-256 | 7370115ad68a4422a94248411117192b4e9ecb70c631333a42f6a041a92b9650
Microsoft Windows Kernel Unsafe Reference
Posted Aug 10, 2023
Authored by Google Security Research, mjurczyk

The Microsoft Windows Kernel may reference unbacked layered keys through registry virtualization.

tags | exploit, kernel, registry
systems | windows
advisories | CVE-2023-35357
SHA-256 | 7b5280c111b616102ccc14ddef413c7f8bbeeb1ba04df2aa047b88bdfe97d452
Windows Kernel KTM Registry Transactions Non-Atomic Outcomes
Posted Jul 5, 2023
Authored by Google Security Research, mjurczyk

Due to some design problems in how transactions are implemented in the registry, it is possible for a low-privileged local attacker to force a non-atomic outcome of a transaction used by another high-privileged process in the system.

tags | exploit, local, registry
advisories | CVE-2023-32019
SHA-256 | b0795c7263336afd69a53bbf47a57747eb1f8d4323fcb570f007bee06c510954
Red Hat Security Advisory 2023-3815-01
Posted Jun 28, 2023
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2023-3815-01 - An update to the images for Red Hat Integration - Service Registry is now available from the Red Hat Container Catalog. Issues addressed include denial of service, information leakage, and traversal vulnerabilities.

tags | advisory, denial of service, registry, vulnerability
systems | linux, redhat
advisories | CVE-2021-46877, CVE-2022-25881, CVE-2022-3509, CVE-2022-3510, CVE-2022-3782, CVE-2022-40152, CVE-2022-45787, CVE-2022-4742, CVE-2023-28867
SHA-256 | 149e9ea0031a8555c13e69062a9556f7251e1f99081bbda6fa3a673c26c23f8f
Debian Security Advisory 5414-1
Posted May 29, 2023
Authored by Debian | Site debian.org

Debian Linux Security Advisory 5414-1 - Jose Gomez discovered that the Catalog API endpoint in the Docker registry implementation did not sufficiently enforce limits, which could result in denial of service.

tags | advisory, denial of service, registry
systems | linux, debian
advisories | CVE-2023-2253
SHA-256 | 9c8e08284137c6665e70202298f98f7ebf0978306e6991e1a98ae9ff2ff01552
Windows Kernel CmpDoReDoCreateKey / CmpDoReOpenTransKey Out-Of-Bounds Read
Posted May 11, 2023
Authored by Google Security Research, mjurczyk

The Windows kernel suffers from out-of-bounds read vulnerabilities when operating on invalid registry paths in CmpDoReDoCreateKey / CmpDoReOpenTransKey.

tags | exploit, kernel, registry, vulnerability
systems | windows
advisories | CVE-2023-21776, CVE-2023-28293
SHA-256 | 76ec9aa7a319065af82cafdd465533228021c8f1589b7dfe874c3ed0033910d0
Windows Kernel Uninitialized Memory / Pointer Disclosure
Posted May 11, 2023
Authored by Google Security Research, mjurczyk

The Windows Kernel suffers from a disclosure of kernel pointers and uninitialized memory through registry KTM transaction log files.

tags | exploit, kernel, registry
systems | windows
advisories | CVE-2023-28271
SHA-256 | d28ae7b6f77689b87212fa778ce097dbeda0292d731f4abdb493b75f067884e7
Windows Kernel CmpCleanupLightWeightPrepare Use-After-Free
Posted May 11, 2023
Authored by Google Security Research, mjurczyk

In Windows Registry, security descriptors are shared by multiple keys, and thus reference counted via the _CM_KEY_SECURITY.ReferenceCount field. It is critical for system security that the kernel correctly keeps track of the references, so that the sum of the ReferenceCount fields is equal to the number of keys in the hive at all times (with small exceptions for things like transacted and not yet committed operations etc.). If the ReferenceCount of any descriptor drops below the true number of its active references, it may result in a use-after-free condition and memory corruption. Similarly, if the field becomes inadequately large, it may be possible to overflow it and also trigger a use-after-free. A bug of the latter type is described in this report.

tags | exploit, overflow, kernel, registry
systems | windows
advisories | CVE-2023-28248
SHA-256 | 4666052c91d73ebc181951a754ead95069fc09d5df87c094776106c9e9edc90e
Microsoft Windows Kernel New Registry Key name Insufficient Validation
Posted Apr 13, 2023
Authored by Google Security Research, mjurczyk

The Microsoft Windows Kernel has insufficient validation of new registry key names in transacted NtRenameKey.

tags | exploit, kernel, registry
systems | windows
advisories | CVE-2023-23420
SHA-256 | ba4961014d277f2fb882589dbc8a7ae2231b9cbad4ecebf074ca3f4b40c660cc
Microsoft Windows Kernel Transactional Registry Key Rename Issues
Posted Apr 13, 2023
Authored by Google Security Research, mjurczyk

The Microsoft Windows Kernel suffers from multiple issues in the prepare/commit phase of a transactional registry key rename.

tags | exploit, kernel, registry
systems | windows
advisories | CVE-2023-23421, CVE-2023-23422, CVE-2023-23423
SHA-256 | 7c97ca8d9eaa67f309b42a02ec5443fcab57797d0ac534a80dbe853a97cb2939
Windows Kernel Registry Key Issue
Posted Apr 10, 2023
Authored by Google Security Research, mjurczyk

The Microsoft Windows kernel suffers from multiple issues with subkeys of transactionally renamed registry keys.

tags | exploit, kernel, registry
systems | windows
advisories | CVE-2023-23420
SHA-256 | a73d43acd9edc53a2cab893ea9e5bb5beca43de488582970092616f1af85341c
Microsoft User Account Control Nuances
Posted Mar 17, 2023
Authored by Stefan Kanthak

This write up is an overview of how Microsoft's attempts to manage elevated access to executables via registry entries has added over complexity that still allows for escalation.

tags | advisory, registry
SHA-256 | b1516a79355be52fa5902480223a989e031dabbe42f666f261b68eb25bbb8331
Windows Kernel Registry Virtualization Incompatibility
Posted Feb 10, 2023
Authored by Google Security Research, mjurczyk

The Microsoft Windows kernel registry virtualization can be incompatible with transactions, leading to inconsistent hive state and memory corruption issues.

tags | exploit, kernel, registry
systems | windows
advisories | CVE-2023-21748
SHA-256 | ad3989abfbd2b1064cf77a22452e621958457c972d00e1fb36536a6dcdb01abb
Windows Kernsl SID Table Poisoning
Posted Feb 10, 2023
Authored by Google Security Research, mjurczyk

The Microsoft Windows kernel registry has a SID table poisoning problem that leads to bad locking and other issues.

tags | exploit, kernel, registry
systems | windows
advisories | CVE-2023-21749, CVE-2023-21776
SHA-256 | c61efe9fac6bb66fd179b7a7a24132f82e660151050984d2cf1aae1c81d256ae
Page 1 of 12
Back12345Next

File Archive:

March 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Mar 1st
    16 Files
  • 2
    Mar 2nd
    0 Files
  • 3
    Mar 3rd
    0 Files
  • 4
    Mar 4th
    32 Files
  • 5
    Mar 5th
    28 Files
  • 6
    Mar 6th
    42 Files
  • 7
    Mar 7th
    17 Files
  • 8
    Mar 8th
    13 Files
  • 9
    Mar 9th
    0 Files
  • 10
    Mar 10th
    0 Files
  • 11
    Mar 11th
    15 Files
  • 12
    Mar 12th
    19 Files
  • 13
    Mar 13th
    21 Files
  • 14
    Mar 14th
    38 Files
  • 15
    Mar 15th
    15 Files
  • 16
    Mar 16th
    0 Files
  • 17
    Mar 17th
    0 Files
  • 18
    Mar 18th
    10 Files
  • 19
    Mar 19th
    0 Files
  • 20
    Mar 20th
    0 Files
  • 21
    Mar 21st
    0 Files
  • 22
    Mar 22nd
    0 Files
  • 23
    Mar 23rd
    0 Files
  • 24
    Mar 24th
    0 Files
  • 25
    Mar 25th
    0 Files
  • 26
    Mar 26th
    0 Files
  • 27
    Mar 27th
    0 Files
  • 28
    Mar 28th
    0 Files
  • 29
    Mar 29th
    0 Files
  • 30
    Mar 30th
    0 Files
  • 31
    Mar 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close