win

Microsoft Windows 10 scrrun.dll Active-X Creation / Deletion Issues

scrrun.dll on Microsoft Windows 10 suffers from file creation, folder creation, and folder deletion vulnerabilities.








win

Dassault Systèmes Completes Acquisition of Medidata Opening Up a New World of Virtual Twin Experiences for Healthcare

• The 3DEXPERIENCE Platform combines modeling, simulation, data science, artificial intelligence and collaboration in the virtual world to achieve sustainable innovation in life sciences • Dassault Systèmes, together with Medidata Solutions, will lead the digital transformation of life sciences in the age of personalized medicine and patient-centric experience • Connecting the 3DEXPERIENCE Platform with Medidata’s Clinical Trial platform connects the dots between research, development,...




win

Dassault Systèmes Holding Life Sciences Day in New York: Opening Up a New World of Virtual Twin Experiences for Healthcare

VELIZY-VILLACOUBLAY, France — November 13th, 2019 — Dassault Systèmes (Euronext Paris: #13065, DSY.PA) is holding a Life Sciences Day for analysts and investors, today, Wednesday, November 13th, 2019 starting at 09.00 am ET in New York. The event includes presentations by the senior executive management team. The sessions are being webcast live and will be available for replay by accessing https://investor.3ds.com/events/event-details/life-sciences-day. Bernard Charlès, Dassault Systèmes’ Vice...




win

Microsoft Windows 98/ME/2000/XP/2003 HTML Help File Hijack

Multiple Microsoft Windows 98/ME/2000/XP/2003 HTML Help file loading hijack vulnerabilities exist. Proof of concept included.




win

Windows OLE Automation Array Remote Code Execution

This Metasploit module exploits the Windows OLE automation array remote code execution vulnerability. The vulnerability exists in Internet Explorer 3.0 until version 11 within Windows 95 up to Windows 10.





win

Microsoft Windows WizardOpium Local Privilege Escalation

Microsoft Windows WizardOpium local privilege escalation exploit.




win

Deep Instinct Windows Agent 1.2.29.0 Unquoted Service Path

Deep Instinct Windows Agent version 1.2.29.0 suffers from an unquoted service path vulnerability.




win

CoronaBlue / SMBGhost Microsoft Windows 10 SMB 3.1.1 Proof Of Concept

CoronaBlue aka SMBGhost proof of concept exploit for Microsoft Windows 10 (1903/1909) SMB version 3.1.1. This script connects to the target host, and compresses the authentication request with a bad offset field set in the transformation header, causing the decompresser to buffer overflow and crash the target.




win

Microsoft Windows SMB 3.1.1 Remote Code Execution

Microsoft Windows SMB version 3.1.1 suffers from a code execution vulnerability.




win

Microsoft Windows 10 SMB 3.1.1 Local Privilege Escalation

Microsoft Windows 10 SMB version 3.1.1 SMBGhost local privilege escalation exploit.




win

Microsoft Windows Net Use Insufficent Authentication

The Windows "net use" network logon type-3 command does not prompt for authentication when the built-in Administrator account is enabled and both remote and originating systems suffer from password reuse. This also works as "standard" user but unfortunately we do not gain high integrity privileges. However, it opens the door and increases the attack surface if the box we laterally move to has other vulnerabilities present.




win

Microsoft Windows NtFilterToken ParentTokenId Incorrect Setting Privilege Escalation

Microsoft Windows suffers from an NtFilterToken ParentTokenId incorrect setting that allows for elevation of privileges.




win

Microsoft Windows SE_SERVER_SECURITY Security Descriptor Owner Privilege Escalation

In Microsoft Windows, by using the poorly documented SE_SERVER_SECURITY Control flag it is possible to set an owner different to the caller, bypassing security checks.




win

Microsoft Windows Unquoted Service Path Privilege Escalation

This Metasploit module exploits a logic flaw due to how the lpApplicationName parameter is handled. When the lpApplicationName contains a space, the file name is ambiguous. Take this file path as example: C:program fileshello.exe; The Windows API will try to interpret this as two possible paths: C:program.exe, and C:program fileshello.exe, and then execute all of them. To some software developers, this is an unexpected behavior, which becomes a security problem if an attacker is able to place a malicious executable in one of these unexpected paths, sometimes escalate privileges if run as SYSTEM. Some software such as OpenVPN 2.1.1, OpenSSH Server 5, and others have the same problem.






win

Windows Has A New Wormable Vulnerability, And There's No Patch In Sight





win

IBM Warns Zero-Day Hacker Exploits Growing




win

Windows/x86 Dynamic Bind Shell / Null-Free Shellcode

571 bytes small Microsoft Windows x86 dynamic bind shell and null-free shellcode.




win

Windows/x86 Null Free WinExec Calc.exe Shellcode

195 bytes small Windows/x86 null-free WinExec Calc.exe shellcode.




win

WinExec Add-Admin Dynamic Null-Free Shellcode

210 bytes small WinExec add-admin dynamic null-free shellcode.




win

Microsoft Windows NtUserSetWindowFNID Win32k User Callback

An elevation of privilege vulnerability exists in Microsoft Windows when the Win32k component fails to properly handle objects in memory. This affects Windows 7, Windows Server 2012 R2, Windows RT 8.1, Windows Server 2008, Windows Server 2019, Windows Server 2012, Windows 8.1, Windows Server 2016, Windows Server 2008 R2, Windows 10, Windows 10 Servers. This Metasploit module is tested against Windows 10 v1703 x86.




win

Microsoft Windows 7 Build 7601 (x86) Local Privilege Escalation

Microsoft Windows 7 Build 7601 (x86) local privilege escalation exploit.




win

Microsoft Windows Internet Settings Security Feature Bypass

Microsoft Windows suffers from an Internet Settings misconfiguration security feature bypass vulnerability. Versions affected include Windows 7 SP1, 8.0, 8.1 x86 and x64 with full patches up to July 2019.




win

Microsoft Windows 7 (x86) BlueKeep RDP Use-After-Free

Microsoft Windows 7 (x86) BlueKeep remote desktop protocol windows kernel use-after-free exploit.




win

Microsoft Windows 7 Screen Lock Shellcode

9 bytes small Microsoft Windows 7 screen locking shellcode.




win

Windscribe WindscribeService Named Pipe Privilege Escalation

The Windscribe VPN client application for Windows makes use of a Windows service WindscribeService.exe which exposes a named pipe \.pipeWindscribeService allowing execution of programs with elevated privileges. Windscribe versions prior to 1.82 do not validate user-supplied program names, allowing execution of arbitrary commands as SYSTEM. This Metasploit module has been tested successfully on Windscribe versions 1.80 and 1.81 on Windows 7 SP1 (x64).




win

Wing FTP Server 6.2.3 Cross Site Request Forgery

Wing FTP Server version 2.3 suffers from a cross site request forgery vulnerability.






win

Microsoft Windows NtUserMNDragOver Local Privilege Escalation

This Metasploit module exploits a NULL pointer dereference vulnerability in MNGetpItemFromIndex(), which is reachable via a NtUserMNDragOver() system call. The NULL pointer dereference occurs because the xxxMNFindWindowFromPoint() function does not effectively check the validity of the tagPOPUPMENU objects it processes before passing them on to MNGetpItemFromIndex(), where the NULL pointer dereference will occur. This module has been tested against Windows 7 x86 SP0 and SP1. Offsets within the solution may need to be adjusted to work with other versions of Windows, such as Windows Server 2008.




win

snort_bo_overflow_win32.pm.txt

Remote Snort Back Orifice preprocessor overflow Metasploit exploit for Win32 targets. Exploits Snort versions 2.4.0 through 2.4.2. Tested against Snort 2.4.2 Binary with Windows XP Professional SP1/SP2, Windows Server 2003 SP1, Windows Server 2000 SP0, and Windows 2000 Professional SP0.




win

02062007-raptor_winudf.tgz

This is a MySQL backdoor kit for Windows based on the UDFs (User Defined Functions) mechanism. It can be used to spawn a reverse shell (netcat UDF on port 80/tcp) or to execute single OS commands (exec UDF). Tested on MySQL 4.0.18-win32 (running on Windows XP SP2), MySQL 4.1.22-win32 (running on Windows XP SP2), MySQL 5.0.27-win32 (running on Windows XP SP2).




win

VideoLAN Client (VLC) Win32 smb:// URI Buffer Overflow

This Metasploit module exploits a stack-based buffer overflow in the Win32AddConnection function of the VideoLAN VLC media player. Versions 0.9.9 throught 1.0.1 are reportedly affected. This vulnerability is only present in Win32 builds of VLC. This payload was found to work with the windows/exec and windows/meterpreter/reverse_tcp payloads. However, the windows/meterpreter/reverse_ord_tcp was found not to work.




win

Win32 Eggsearch Shellcode

33 bytes small Win32 egg searching shellcode that should work on all service packs of Microsoft Windows XP, 2k, and 2k3.




win

Win32/XP SP3 Windows Magnifier Shellcode

52 bytes small Win32/XP SP3 windows magnifier shellcode.




win

Win32/XP SP3 Shutdown Shellcode

56 bytes small Win32/XP SP3 shutdown windows shellcode with a 30 second timer.




win

Whale Win32 Attack Surface Toolkit

Whale in a win32 attack surface toolkit written in C#. It's capable of monitoring many of different areas of the Windows for new and removed kernel objects, open ports, drivers, services and much more. It also allows a user to test for different bug classes and has found a few interesting issues across the sub-systems.




win

netABuse Insufficient Windows Authentication Logic Scanner

netABuse is a scanner that identifies systems susceptible to a Microsoft Windows insufficient authentication logic flaw.






win

Windows User Accounts Penetration Testing

Whitepaper called Windows User Accounts Penetration Testing. Written in Persian.




win

Microsoft Windows Firewall Disabling Shellcode

644 bytes small Microsoft Windows x86 shellcode that disables the Windows firewall, adds the user MajinBuu with password TurnU2C@ndy!! to the system, adds the user MajinBuu to the local groups Administrators and Remote Desktop Users, and then enables the RDP Service.