b Windows UAC Protection Bypass (Via Slui File Handler Hijack) By packetstormsecurity.com Published On :: Thu, 31 May 2018 20:50:19 GMT This Metasploit module will bypass UAC on Windows 8-10 by hijacking a special key in the Registry under the Current User hive, and inserting a custom command that will get invoked when any binary (.exe) application is launched. But slui.exe is an auto-elevated binary that is vulnerable to file handler hijacking. When we run slui.exe with changed Registry key (HKCU:SoftwareClassesexefileshellopencommand), it will run our custom command as Admin instead of slui.exe. The module modifies the registry in order for this exploit to work. The modification is reverted once the exploitation attempt has finished. The module does not require the architecture of the payload to match the OS. If specifying EXE::Custom your DLL should call ExitProcess() after starting the payload in a different process. Full Article
b Microsoft Windows Desktop Bridge Virtual Registry Incomplete Fix By packetstormsecurity.com Published On :: Wed, 20 Jun 2018 00:01:00 GMT The handling of the virtual registry for desktop bridge applications can allow an application to create arbitrary files as system resulting in privilege escalation. This is because the fix for CVE-2018-0880 (MSRC case 42755) did not cover all similar cases which were reported at the same time in the issue. Full Article
b Oracle WebLogic 12.1.2.0 Remote Code Execution By packetstormsecurity.com Published On :: Mon, 09 Jul 2018 13:11:11 GMT Oracle WebLogic version 12.1.2.0 RMI registry UnicastRef object java deserialization remote code execution exploit. Full Article
b Microsoft Windows 10 UAC Bypass By computerDefault By packetstormsecurity.com Published On :: Mon, 22 Oct 2018 01:11:11 GMT This exploit permits an attacker to bypass UAC by hijacking a registry key during computerSecurity.exe (auto elevate windows binary) execution. Full Article
b Windows UAC Protection Bypass By packetstormsecurity.com Published On :: Thu, 13 Dec 2018 19:20:15 GMT This Metasploit module modifies a registry key, but cleans up the key once the payload has been invoked. The module does not require the architecture of the payload to match the OS. Full Article
b Microsoft Windows .Reg File / Dialog Box Message Spoofing By packetstormsecurity.com Published On :: Mon, 11 Mar 2019 23:02:22 GMT The Windows registry editor allows specially crafted .reg filenames to spoof the default registry dialog warning box presented to an end user. This can potentially trick unsavvy users into choosing the wrong selection shown on the dialog box. Furthermore, we can deny the registry editor its ability to show the default secondary status dialog box (Win 10), thereby hiding the fact that our attack was successful. Full Article
b Ubuntu Security Notice USN-3939-1 By packetstormsecurity.com Published On :: Mon, 08 Apr 2019 18:07:12 GMT Ubuntu Security Notice 3939-1 - Michael Hanselmann discovered that Samba incorrectly handled registry files. A remote attacker could possibly use this issue to create new registry files outside of the share, contrary to expectations. Full Article
b Ubuntu Security Notice USN-3939-2 By packetstormsecurity.com Published On :: Mon, 08 Apr 2019 18:07:33 GMT Ubuntu Security Notice 3939-2 - USN-3939-1 fixed a vulnerability in Samba. This update provides the corresponding update for Ubuntu 12.04 ESM. Michael Hanselmann discovered that Samba incorrectly handled registry files. A remote attacker could possibly use this issue to create new registry files outside of the share, contrary to expectations. Various other issues were also addressed. Full Article
b Ubuntu Security Notice USN-3975-1 By packetstormsecurity.com Published On :: Tue, 14 May 2019 00:31:10 GMT Ubuntu Security Notice 3975-1 - It was discovered that the BigDecimal implementation in OpenJDK performed excessive computation when given certain values. An attacker could use this to cause a denial of service. Corwin de Boor and Robert Xiao discovered that the RMI registry implementation in OpenJDK did not properly select the correct skeleton class in some situations. An attacker could use this to possibly escape Java sandbox restrictions. Various other issues were also addressed. Full Article
b Microsoft Windows CmKeyBodyRemapToVirtualForEnum Arbitrary Key Enumeration By packetstormsecurity.com Published On :: Tue, 21 May 2019 23:00:00 GMT The Microsoft Windows kernel's Registry Virtualization does not safely open the real key for a virtualization location leading to enumerating arbitrary keys resulting in privilege escalation. Full Article
b Windows 10 UAC Protection Bypass Via Windows Store (WSReset.exe) And Registry By packetstormsecurity.com Published On :: Thu, 05 Sep 2019 23:59:01 GMT This Metasploit module exploits a flaw in the WSReset.exe file associated with the Windows Store. This binary has autoelevate privs, and it will run a binary file contained in a low-privilege registry location. By placing a link to the binary in the registry location, WSReset.exe will launch the binary as a privileged user. Full Article
b Windows Escalate UAC Protection Bypass By packetstormsecurity.com Published On :: Mon, 18 Nov 2019 15:34:40 GMT This Metasploit module will bypass Windows UAC by hijacking a special key in the Registry under the current user hive, and inserting a custom command that will get invoked when Windows backup and restore is launched. It will spawn a second shell that has the UAC flag turned off. This module modifies a registry key, but cleans up the key once the payload has been invoked. Full Article
b Trend Micro Security 2019 Security Bypass Protected Service Tampering By packetstormsecurity.com Published On :: Fri, 17 Jan 2020 16:42:02 GMT Trend Micro Maximum Security is vulnerable to arbitrary code execution as it allows for creation of registry key to target a process running as SYSTEM. This can allow a malware to gain elevated privileges to take over and shutdown services that require SYSTEM privileges like Trend Micros "Asmp" service "coreServiceShell.exe" which does not allow Administrators to tamper with them. This could allow an attacker or malware to gain elevated privileges and tamper with protected services by disabling or otherwise preventing them to start. Note administrator privileges are required to exploit this vulnerability. Full Article
b Ubuntu Security Notice USN-4251-1 By packetstormsecurity.com Published On :: Mon, 27 Jan 2020 22:54:37 GMT Ubuntu Security Notice 4251-1 - It was discovered that Tomcat incorrectly handled the RMI registry when configured with the JMX Remote Lifecycle Listener. A local attacker could possibly use this issue to obtain credentials and gain complete control over the Tomcat instance. It was discovered that Tomcat incorrectly handled FORM authentication. A remote attacker could possibly use this issue to perform a session fixation attack. Various other issues were also addressed. Full Article
b Xinfire TV Player 6.0.1.2 Buffer Overflow By packetstormsecurity.com Published On :: Mon, 20 Apr 2020 15:16:03 GMT This Metasploit module exploits a buffer overflow in Xinfire TV Player Pro and Standard version 6.0.1.2. When the application is used to import a specially crafted plf file, a buffer overflow occurs allowing arbitrary code execution. Tested successfully on Win7, Win10. This software is similar as Aviosoft Digital TV Player and BlazeVideo HDTV Player. Full Article
b Xinfire DVD Player 5.5.0.0 Buffer Overflow By packetstormsecurity.com Published On :: Mon, 20 Apr 2020 15:17:01 GMT This Metasploit module exploits a buffer overflow in Xinfire DVD Player Pro and Standard version 5.5.0.0. When the application is used to import a specially crafted plf file, a buffer overflow occurs allowing arbitrary code execution. Tested successfully on Win7, Win10. This software is similar as DVD X Player and BlazeDVD. Full Article
b Source Engine CS:GO Build 4937372 Arbitrary Code Execution By packetstormsecurity.com Published On :: Mon, 27 Apr 2020 22:22:22 GMT Source Engine CS:GO BuildID: 4937372 arbitrary code execution exploit. Full Article
b libdvdcss 1.2.11 By packetstormsecurity.com Published On :: Wed, 16 Nov 2011 03:57:26 GMT libdvdcss is a cross-platform library for transparent DVD device access with on-the-fly CSS decryption. It currently runs under Linux, FreeBSD, NetBSD, OpenBSD, BSD/OS, Solaris, BeOS, Win95/Win98, Win2k/WinXP, MacOS X, HP-UX, QNX, and OS/2. It is used by libdvdread and most DVD players such as VLC because of its portability and because, unlike similar libraries, it does not require your DVD drive to be region locked. Full Article
b NetBSD mail.local(8) Local Root By packetstormsecurity.com Published On :: Fri, 22 Jul 2016 22:53:42 GMT NetBSD mail.local(8) local root exploit that leverages a race condition as noted in NetBSD-SA2016-006. Full Article
b NetBSD mail.local Privilege Escalation By packetstormsecurity.com Published On :: Thu, 15 Sep 2016 17:13:45 GMT This Metasploit module attempts to exploit a race condition in mail.local with the SUID bit set on: NetBSD 7.0 - 7.0.1 (verified on 7.0.1), NetBSD 6.1 - 6.1.5, and NetBSD 6.0 - 6.0.6. Successful exploitation relies on a crontab job with root privilege, which may take up to 10min to execute. Full Article
b NetBSD Stack Clash Proof Of Concept By packetstormsecurity.com Published On :: Thu, 29 Jun 2017 13:33:33 GMT NetBSD stack clash proof of concept exploit. Full Article
b Ubisoft Sues Operators Of Four DDoS For Hire Services By packetstormsecurity.com Published On :: Tue, 21 Jan 2020 16:44:56 GMT Full Article headline denial of service
b 16 DDoS Attacks Take Place Every 60 Seconds, Rates Reach 622 Gbps By packetstormsecurity.com Published On :: Tue, 18 Feb 2020 14:59:42 GMT Full Article headline hacker cybercrime denial of service fraud
b California Man Arrested For DDoS'ing Candidate's Website By packetstormsecurity.com Published On :: Mon, 24 Feb 2020 09:50:30 GMT Full Article headline government usa denial of service
b Debian Security Advisory 4606-1 By packetstormsecurity.com Published On :: Mon, 20 Jan 2020 18:05:42 GMT Debian Linux Security Advisory 4606-1 - Several vulnerabilities have been discovered in the chromium web browser. Full Article
b Debian Security Advisory 4608-1 By packetstormsecurity.com Published On :: Wed, 22 Jan 2020 16:08:16 GMT Debian Linux Security Advisory 4608-1 - Multiple integer overflows have been discovered in the libtiff library and the included tools. Full Article
b Debian Security Advisory 4609-1 By packetstormsecurity.com Published On :: Fri, 24 Jan 2020 17:00:20 GMT Debian Linux Security Advisory 4609-1 - Two security issues were found in the Python interface to the apt package manager; package downloads from unsigned repositories were incorrectly rejected and the hash validation relied on MD5. Full Article
b Debian Security Advisory 4611-1 By packetstormsecurity.com Published On :: Thu, 30 Jan 2020 14:46:14 GMT Debian Linux Security Advisory 4611-1 - Qualys discovered that the OpenSMTPD SMTP server performed insufficient validation of email addresses which could result in the execution of arbitrary commands as root. In addition this update fixes a denial of service by triggering an opportunistic TLS downgrade. Full Article
b Debian Security Advisory 4610-1 By packetstormsecurity.com Published On :: Thu, 30 Jan 2020 14:46:51 GMT Debian Linux Security Advisory 4610-1 - Multiple code execution vulnerabilities have been addressed in the webkit2gtk web engine. Full Article
b Debian Security Advisory 4612-1 By packetstormsecurity.com Published On :: Mon, 03 Feb 2020 16:10:48 GMT Debian Linux Security Advisory 4612-1 - It was discovered that the LDAP authentication modules for the Prosody Jabber/XMPP server incorrectly validated the XMPP address when checking whether a user has admin access. Full Article
b Debian Security Advisory 4613-1 By packetstormsecurity.com Published On :: Mon, 03 Feb 2020 16:15:10 GMT Debian Linux Security Advisory 4613-1 - A heap-based buffer overflow vulnerability was discovered in the idn2_to_ascii_4i() function in libidn2, the GNU library for Internationalized Domain Names (IDNs), which could result in denial of service, or the execution of arbitrary code when processing a long domain string. Full Article
b Debian Security Advisory 4614-1 By packetstormsecurity.com Published On :: Mon, 03 Feb 2020 16:17:19 GMT Debian Linux Security Advisory 4614-1 - Joe Vennix discovered a stack-based buffer overflow vulnerability in sudo, a program designed to provide limited super user privileges to specific users, triggerable when configured with the "pwfeedback" option enabled. An unprivileged user can take advantage of this flaw to obtain full root privileges. Full Article
b Debian Security Advisory 4615-1 By packetstormsecurity.com Published On :: Mon, 03 Feb 2020 16:40:19 GMT Debian Linux Security Advisory 4615-1 - Two vulnerabilities were discovered in spamassassin, a Perl-based spam filter using text analysis. Malicious rule or configuration files, possibly downloaded from an updates server, could execute arbitrary commands under multiple scenarios. Full Article
b Debian Security Advisory 4616-1 By packetstormsecurity.com Published On :: Mon, 03 Feb 2020 16:53:40 GMT Debian Linux Security Advisory 4616-1 - Two security issues have been found in the SLiRP networking implementation of QEMU, a fast processor emulator, which could result in the execution of arbitrary code or denial of service. Full Article
b Debian Security Advisory 4617-1 By packetstormsecurity.com Published On :: Tue, 04 Feb 2020 14:46:05 GMT Debian Linux Security Advisory 4617-1 - Two security issues were found in the Qt library, which could result in plugins and libraries being loaded from the current working directory, resulting in potential code execution. Full Article
b Debian Security Advisory 4619-1 By packetstormsecurity.com Published On :: Mon, 10 Feb 2020 21:02:50 GMT Debian Linux Security Advisory 4619-1 - Guillaume Teissier reported that the XMLRPC client in libxmlrpc3-java, an XML-RPC implementation in Java, does perform deserialization of the server-side exception serialized in the faultCause attribute of XMLRPC error response messages. A malicious XMLRPC server can take advantage of this flaw to execute arbitrary code with the privileges of an application using the Apache XMLRPC client library. Full Article
b Debian Security Advisory 4618-1 By packetstormsecurity.com Published On :: Mon, 10 Feb 2020 21:02:58 GMT Debian Linux Security Advisory 4618-1 - An out-of-bounds write vulnerability due to an integer overflow was reported in libexif, a library to parse EXIF files, which could result in denial of service, or potentially the execution of arbitrary code if specially crafted image files are processed. Full Article
b Debian Security Advisory 4622-1 By packetstormsecurity.com Published On :: Fri, 14 Feb 2020 15:01:33 GMT Debian Linux Security Advisory 4622-1 - Tom Lane discovered that "ALTER ... DEPENDS ON EXTENSION" sub commands in the PostgreSQL database did not perform authorisation checks. Full Article
b Debian Security Advisory 4623-1 By packetstormsecurity.com Published On :: Fri, 14 Feb 2020 15:25:23 GMT Debian Linux Security Advisory 4623-1 - Tom Lane discovered that "ALTER ... DEPENDS ON EXTENSION" sub commands in the PostgreSQL database did not perform authorisation checks. Full Article
b Debian Security Advisory 4620-1 By packetstormsecurity.com Published On :: Mon, 17 Feb 2020 16:41:31 GMT Debian Linux Security Advisory 4620-1 - Multiple security issues have been found in the Mozilla Firefox web browser, which could potentially result in the execution of arbitrary code. Full Article
b Debian Security Advisory 4621-1 By packetstormsecurity.com Published On :: Mon, 17 Feb 2020 16:41:43 GMT Debian Linux Security Advisory 4621-1 - Several vulnerabilities have been discovered in the OpenJDK Java runtime, resulting in denial of service, incorrect implementation of Kerberos GSSAPI and TGS requests or incorrect TLS handshakes. Full Article
b Debian Security Advisory 4624-1 By packetstormsecurity.com Published On :: Mon, 17 Feb 2020 17:31:24 GMT Debian Linux Security Advisory 4624-1 - Several vulnerabilities were discovered in evince, a simple multi-page document viewer. Full Article
b Debian Security Advisory 4625-1 By packetstormsecurity.com Published On :: Mon, 17 Feb 2020 18:02:39 GMT Debian Linux Security Advisory 4625-1 - Multiple security issues have been found in Thunderbird, which may lead to the execution of arbitrary code or denial of service. Full Article
b Debian Security Advisory 4627-1 By packetstormsecurity.com Published On :: Tue, 18 Feb 2020 15:04:51 GMT Debian Linux Security Advisory 4627-1 - Cross site scripting, denial of service, and various other vulnerabilities have been discovered in the webkit2gtk web engine. Full Article
b Debian Security Advisory 4629-1 By packetstormsecurity.com Published On :: Wed, 19 Feb 2020 15:38:05 GMT Debian Linux Security Advisory 4629-1 - Simon Charette discovered that Django, a high-level Python web development framework, did not properly handle input in its PostgreSQL module. A remote attacker could leverage this to perform SQL injection attacks. Full Article
b Debian Security Advisory 4633-1 By packetstormsecurity.com Published On :: Tue, 25 Feb 2020 15:20:44 GMT Debian Linux Security Advisory 4633-1 - Multiple vulnerabilities were discovered in cURL, an URL transfer library. Full Article
b Debian Security Advisory 4604-1 By packetstormsecurity.com Published On :: Sun, 19 Jan 2020 19:32:22 GMT Debian Linux Security Advisory 4604-1 - Multiple issues have been found in cacti, a server monitoring system, potentially resulting in SQL code execution or information disclosure by authenticated users. Full Article
b Verodin Director Web Console 3.5.4.0 Password Disclosure By packetstormsecurity.com Published On :: Wed, 05 Feb 2020 18:46:01 GMT Verodin Director Web Console version 3.5.4.0 remote authenticated password disclosure proof of concept exploit. Full Article
b LabVantage 8.3 Information Disclosure By packetstormsecurity.com Published On :: Mon, 17 Feb 2020 17:27:30 GMT LabVantage version 8.3 suffers from an information disclosure vulnerability. Full Article
b Debian Security Advisory 4626-1 By packetstormsecurity.com Published On :: Tue, 18 Feb 2020 15:05:02 GMT Debian Linux Security Advisory 4626-1 - Multiple security issues were found in PHP, a widely-used open source general purpose scripting language which could result in information disclosure, denial of service or incorrect validation of path names. Full Article