exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 25 of 6,784 RSS Feed

Operating System: Windows

Wireshark Analyzer 4.4.1
Posted Oct 10, 2024
Authored by Gerald Combs | Site wireshark.org

Wireshark is a GTK+-based network protocol analyzer that lets you capture and interactively browse the contents of network frames. The goal of the project is to create a commercial-quality analyzer for Unix and Win32 and to give Wireshark features that are missing from closed-source sniffers. This is the source code release.

Changes: Reload framing fixes. AppleTalk fix. Allows saving files with Qt 6.8. Donation page added. Update VELOS and rSeries platform identifiers for f5fileinfo. Various other updates and fixes.
tags | tool, sniffer, protocol
systems | windows, unix
SHA-256 | 2b9e96572a7002c3e53b79683cf92f8172217e64c17ecaaf612eb68c2a7556ec
iTunes For Windows 12.13.2.3 Local Privilege Escalation
Posted Oct 7, 2024
Authored by mbog14 | Site github.com

This is a thorough write up of how to exploit a local privilege escalation vulnerability in iTunes for Windows version 12.13.2.3. Apple fixed this in version 12.13.3.

tags | exploit, local
systems | windows, apple
advisories | CVE-2024-44193
SHA-256 | d695b4f1b1028346552105f4ee8239edee8add156e7b797895b5d5337070f75f
Nitro PDF Pro Local Privilege Escalation
Posted Oct 1, 2024
Authored by Sandro Einfeldt, Michael Baer | Site sec-consult.com

The Nitro PDF Pro application uses a .msi installer file (embedded into an executable .exe installer file) for installation. The MSI installer uses custom actions in repair mode in an unsafe way. Attackers with low-privileged system access to a Windows system where Nitro PDF Pro is installed, can exploit the cached MSI installer's custom actions to effectively escalate privileges and get a command prompt running in context of NT AUTHORITY\SYSTEM. Versions prior to 14.26.1.0 and 13.70.8.82 and affected.

tags | exploit
systems | windows
advisories | CVE-2024-35288
SHA-256 | a84e46e6f47edcfa84a24b20d405dc9009aef6635aeed2d4103f5c1e3b453e54
Red Hat Security Advisory 2024-7436-03
Posted Oct 1, 2024
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2024-7436-03 - The components for Red Hat OpenShift for Windows Containers 10.17.0 are now available. This product release includes bug fixes and security updates for the following packages: windows-machine-config-operator and windows-machine-config-operator-bundle.

tags | advisory
systems | linux, redhat, windows
SHA-256 | f9f6a21021825712bf4746f21d3128dde3ff2cc370b717d9e3f6b54dc5961898
VegaBird Vooki 5.2.9 DLL Hijacking
Posted Sep 30, 2024
Authored by Iulian Florea

VegaBird Vooki version 5.2.9 suffers from a dll hijacking vulnerability.

tags | exploit
systems | windows
advisories | CVE-2024-45874
SHA-256 | c5f33bc21c9e871866fcbc9aa668c73fe0ec052f868a7c993eb644b8d7aa159e
VegaBird Yaazhini 2.0.2 DLL Hijacking
Posted Sep 30, 2024
Authored by Iulian Florea

VegaBird Yaazhini version 2.0.2 suffers from a dll hijacking vulnerability.

tags | exploit
systems | windows
advisories | CVE-2024-45873
SHA-256 | 378aa772f21ffc902834ecaa037a742ac5bf2f8dbac879f976178e59558b4845
Microsoft CWE-73 Weakness
Posted Sep 30, 2024
Authored by Stefan Kanthak

A single command line can show you about 20,000 instances of CWE-73 issues with Microsoft Windows.

tags | advisory
systems | windows
SHA-256 | 98cca0958bfbc8ebf3577e8e302960e439c3a7358827822332a2847dd420517e
Backdoor.Win32.Benju.a MVID-2024-0700 Remote Command Execution
Posted Sep 27, 2024
Authored by malvuln | Site malvuln.com

Backdoor.Win32.Benju.a malware suffers from a remote command execution vulnerability. This is the 700th release of a malvuln finding.

tags | exploit, remote
systems | windows
SHA-256 | f79228aaf64af956558118e52f0cae8c6690433d9087c20cfbb14080997449f1
Backdoor.Win32.Prorat.jz MVID-2024-0699 Buffer Overflow
Posted Sep 27, 2024
Authored by malvuln | Site malvuln.com

Backdoor.Win32.Prorat.jz malware suffers from a buffer overflow vulnerability.

tags | exploit, overflow
systems | windows
SHA-256 | a1f2f2d06b92875d0d19569387aac4e9a1c23766a1289286cdc961ea4b1b0fd1
Backdoor.Win32.Amatu.a MVID-2024-0698 Arbitrary File Write
Posted Sep 27, 2024
Authored by malvuln | Site malvuln.com

Backdoor.Win32.Amatu.a malware suffers from a remote arbitrary file write vulnerability.

tags | exploit, remote, arbitrary
systems | windows
SHA-256 | 0ac4d1e102fa50d12c1ed2087d7d607e89de02d81742b58cfdd99a95944c55f4
Backdoor.Win32.Agent.pw MVID-2024-0697 Buffer Overflow
Posted Sep 27, 2024
Authored by malvuln | Site malvuln.com

Backdoor.Win32.Agent.pw malware suffers from a buffer overflow vulnerability.

tags | exploit, overflow
systems | windows
SHA-256 | 7fa82baa98ac10e7877b5d15186d291cc19793db34d1c44febf37e06a22af7aa
Backdoor.Win32.Boiling MVID-2024-0696 Code Execution
Posted Sep 27, 2024
Authored by malvuln | Site malvuln.com

Backdoor.Win32.Boiling malware suffers from a code execution vulnerability.

tags | exploit, code execution
systems | windows
SHA-256 | b666a8b57ce06bc159252f69fc3abb01c3f39d13ebb66f288c0201d4507a0a1e
Red Hat Security Advisory 2024-6734-03
Posted Sep 19, 2024
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2024-6734-03 - The components for Red Hat OpenShift for Windows Containers 7.2.2 are now available.This product release includes bug fixes and security updates for the following packages: windows-machine-config-operator and windows-machine-config-operator-bundle.

tags | advisory
systems | linux, redhat, windows
advisories | CVE-2024-5321
SHA-256 | be505ca2f3802cff25f63ab64134208833ab546ae1e49eddd55ed15bf211b2ad
Backdoor.Win32.CCInvader.10 MVID-2024-0694 Authentication Bypass
Posted Sep 18, 2024
Authored by malvuln | Site malvuln.com

Backdoor.Win32.CCInvader.10 malware suffers from a bypass vulnerability.

tags | exploit, bypass
systems | windows
SHA-256 | 7f8fbab739d2fc6fb8f975250a5f1be05abc1adfae0b192591971bf6f66b9101
Backdoor.Win32.BlackAngel.13 MVID-2024-0695 Code Execution
Posted Sep 18, 2024
Authored by malvuln | Site malvuln.com

Backdoor.Win32.BlackAngel.13 malware suffers from a code execution vulnerability.

tags | exploit, code execution
systems | windows
SHA-256 | 717e62131924ca1af11ac62c8dd44bd60d6cffaaf4066df556a537c3442d678e
Backdoor.Win32.Delf.yj MVID-2024-0693 Information Disclosure
Posted Sep 18, 2024
Authored by malvuln | Site malvuln.com

Backdoor.Win32.Delf.yj malware suffers from an information leakage vulnerability.

tags | exploit
systems | windows
SHA-256 | 145f23a8746541655af47b6cc26039a64ce706d01053710c1a2fcdd7dc5aa7a8
Microsoft Windows TOCTOU Local Privilege Escalation
Posted Sep 17, 2024
Authored by jheysel-r7, tykawaii98 | Site metasploit.com

CVE-2024-30088 is a Windows kernel elevation of privilege vulnerability which affects many recent versions of Windows 10, Windows 11 and Windows Server 2022. The vulnerability exists inside the function called AuthzBasepCopyoutInternalSecurityAttributes specifically when the kernel copies the _AUTHZBASEP_SECURITY_ATTRIBUTES_INFORMATION of the current token object to user mode. When the kernel performs the copy of the SecurityAttributesList, it sets up the list of the SecurityAttributes structure directly to the user supplied pointed. It then calls RtlCopyUnicodeString and AuthzBasepCopyoutInternalSecurityAttributeValues to copy out the names and values of the SecurityAttribute leading to multiple Time Of Check Time Of Use (TOCTOU) vulnerabilities in the function.

tags | exploit, kernel, vulnerability
systems | windows
advisories | CVE-2024-30038
SHA-256 | a4e521839032a10c16e91b79eb43b6f9620dcc27482be434b0d2b62d5ac92e66
MSI Analyzer
Posted Sep 17, 2024
Authored by Michael Baer | Site github.com

This Python script for Linux can analyze Microsoft Windows .msi Installer files and point out potential vulnerabilities.

tags | vulnerability, python
systems | linux, windows
SHA-256 | 5acb6c6d8634611b63c2c7dbe9d099afc2807b183f5f065ed3557bc52c57aa7d
UnRAR Path Traversal
Posted Sep 12, 2024
Authored by Ron Bowes, Simon Scannell | Site metasploit.com

This Metasploit module creates a RAR file that exploits CVE-2022-30333, which is a path-traversal vulnerability in unRAR that can extract an arbitrary file to an arbitrary location on a Linux system. UnRAR fixed this vulnerability in version 6.12 (open source version 6.1.7). The core issue is that when a symbolic link is unRARed, Windows symbolic links are not properly validated on Linux systems and can therefore write a symbolic link that points anywhere on the filesystem. If a second file in the archive has the same name, it will be written to the symbolic link path.

tags | exploit, arbitrary
systems | linux, windows
advisories | CVE-2022-30333
SHA-256 | 2df85540ffe31bd6abf8706295866ebd1d381d12c36e4680836b772ead8e9445
Red Hat Security Advisory 2024-6461-03
Posted Sep 10, 2024
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2024-6461-03 - The components for Red Hat OpenShift for Windows Containers 8.1.3 are now available. This product release includes bug fixes and security updates for the following packages: windows-machine-config-operator and windows-machine-config-operator-bundle.

tags | advisory
systems | linux, redhat, windows
advisories | CVE-2024-5321
SHA-256 | a94249ed049993a7bc563b3b10bb0d96714766e31214ef508fe10f390b70cbb5
Red Hat Security Advisory 2024-6460-03
Posted Sep 10, 2024
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2024-6460-03 - The components for Red Hat OpenShift for Windows Containers 9.0.3 are now available. This product release includes bug fixes and security updates for the following packages: windows-machine-config-operator and windows-machine-config-operator-bundle.

tags | advisory
systems | linux, redhat, windows
advisories | CVE-2024-5321
SHA-256 | a23d4b1cfe7359499fbd669db4aaa7f2ebfce5622158e6ecdf9cb51d4d649552
Microsoft Windows DWM Core Library Privilege Escalation
Posted Sep 9, 2024
Authored by ricnar456 | Site github.com

Proof of concept code for the Microsoft Windows DWM Core library elevation of privilege vulnerability. The researcher shows how they reversed the patch, how the heap overflow is produced, and overall gives a complete walk through of their process.

tags | exploit, overflow, proof of concept
systems | windows
advisories | CVE-2024-30051
SHA-256 | ae21b7b798fa9141cefb1411db92e94dfef6796823599323e49ec4cfcc3f7c0d
Backdoor.Win32.Symmi.qua MVID-2024-0692 Buffer Overflow
Posted Sep 4, 2024
Authored by malvuln | Site malvuln.com

Backdoor.Win32.Symmi.qua malware suffers from a buffer overflow vulnerability.

tags | exploit, overflow
systems | windows
SHA-256 | 0bc924461f903a4b4b69a0e094001ae59f6aed7881aa5a2aff5dfa55c34905b6
HackTool.Win32.Freezer.br (WinSpy) MVID-2024-0691 Insecure Credential Storage
Posted Sep 4, 2024
Authored by malvuln | Site malvuln.com

HackTool.Win32.Freezer.br (WinSpy) malware suffers from an insecure credential storage vulnerability.

tags | exploit
systems | windows
SHA-256 | 574e327046bc7ed7b91b795a2eebcc7e87a001021d334845c357d1bc082517f0
Backdoor.Win32.Optix.02.b MVID-2024-0690 Hardcoded Credential
Posted Sep 4, 2024
Authored by malvuln | Site malvuln.com

Backdoor.Win32.Optix.02.b malware suffers from a hardcoded credential vulnerability.

tags | exploit
systems | windows
SHA-256 | 8c8ad33e111ebd91632229baa25c24e2eb3101bf3951d070074c5b4618e78fcf
Page 1 of 272
Back12345Next

File Archive:

November 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    30 Files
  • 2
    Nov 2nd
    0 Files
  • 3
    Nov 3rd
    0 Files
  • 4
    Nov 4th
    12 Files
  • 5
    Nov 5th
    44 Files
  • 6
    Nov 6th
    18 Files
  • 7
    Nov 7th
    9 Files
  • 8
    Nov 8th
    8 Files
  • 9
    Nov 9th
    0 Files
  • 10
    Nov 10th
    0 Files
  • 11
    Nov 11th
    0 Files
  • 12
    Nov 12th
    0 Files
  • 13
    Nov 13th
    0 Files
  • 14
    Nov 14th
    0 Files
  • 15
    Nov 15th
    0 Files
  • 16
    Nov 16th
    0 Files
  • 17
    Nov 17th
    0 Files
  • 18
    Nov 18th
    0 Files
  • 19
    Nov 19th
    0 Files
  • 20
    Nov 20th
    0 Files
  • 21
    Nov 21st
    0 Files
  • 22
    Nov 22nd
    0 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    0 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    0 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close