ind

Slackware Security Advisory - bind Updates

Slackware Security Advisory - New bind packages are available for Slackware 14.0, 14.1, 14.2, and -current to fix a security issue.









ind

Researchers Find Serious Flaws In WordPress Plugins Used On 400k Sites




ind

Microsoft Windows 98/ME/2000/XP/2003 HTML Help File Hijack

Multiple Microsoft Windows 98/ME/2000/XP/2003 HTML Help file loading hijack vulnerabilities exist. Proof of concept included.




ind

Windows OLE Automation Array Remote Code Execution

This Metasploit module exploits the Windows OLE automation array remote code execution vulnerability. The vulnerability exists in Internet Explorer 3.0 until version 11 within Windows 95 up to Windows 10.




ind

T21-2020 Creating a Domain Index on BIOVIA Databases for Direct 2016, 2017 R2, 2018, or Direct 2020

BIOVIA Direct






ind

SkypeFinds Another Security Snafu





ind

Google And Skype Could Be Hit By India Data Curbs




ind

European Commission Launches New Industry Guidelines On RFID Privacy




ind

Microsoft Windows WizardOpium Local Privilege Escalation

Microsoft Windows WizardOpium local privilege escalation exploit.




ind

Deep Instinct Windows Agent 1.2.29.0 Unquoted Service Path

Deep Instinct Windows Agent version 1.2.29.0 suffers from an unquoted service path vulnerability.




ind

CoronaBlue / SMBGhost Microsoft Windows 10 SMB 3.1.1 Proof Of Concept

CoronaBlue aka SMBGhost proof of concept exploit for Microsoft Windows 10 (1903/1909) SMB version 3.1.1. This script connects to the target host, and compresses the authentication request with a bad offset field set in the transformation header, causing the decompresser to buffer overflow and crash the target.




ind

Microsoft Windows SMB 3.1.1 Remote Code Execution

Microsoft Windows SMB version 3.1.1 suffers from a code execution vulnerability.




ind

Microsoft Windows 10 SMB 3.1.1 Local Privilege Escalation

Microsoft Windows 10 SMB version 3.1.1 SMBGhost local privilege escalation exploit.




ind

Microsoft Windows Net Use Insufficent Authentication

The Windows "net use" network logon type-3 command does not prompt for authentication when the built-in Administrator account is enabled and both remote and originating systems suffer from password reuse. This also works as "standard" user but unfortunately we do not gain high integrity privileges. However, it opens the door and increases the attack surface if the box we laterally move to has other vulnerabilities present.




ind

Microsoft Windows NtFilterToken ParentTokenId Incorrect Setting Privilege Escalation

Microsoft Windows suffers from an NtFilterToken ParentTokenId incorrect setting that allows for elevation of privileges.




ind

Microsoft Windows SE_SERVER_SECURITY Security Descriptor Owner Privilege Escalation

In Microsoft Windows, by using the poorly documented SE_SERVER_SECURITY Control flag it is possible to set an owner different to the caller, bypassing security checks.




ind

Microsoft Windows Unquoted Service Path Privilege Escalation

This Metasploit module exploits a logic flaw due to how the lpApplicationName parameter is handled. When the lpApplicationName contains a space, the file name is ambiguous. Take this file path as example: C:program fileshello.exe; The Windows API will try to interpret this as two possible paths: C:program.exe, and C:program fileshello.exe, and then execute all of them. To some software developers, this is an unexpected behavior, which becomes a security problem if an attacker is able to place a malicious executable in one of these unexpected paths, sometimes escalate privileges if run as SYSTEM. Some software such as OpenVPN 2.1.1, OpenSSH Server 5, and others have the same problem.




ind

Adobe Patches Critical Vulnerabilities In Flash, InDesign





ind

Windows Has A New Wormable Vulnerability, And There's No Patch In Sight






ind

IBM: Mind Reading Is Less Than Five Years Away. For Real.





ind

Windows/x86 Dynamic Bind Shell / Null-Free Shellcode

571 bytes small Microsoft Windows x86 dynamic bind shell and null-free shellcode.




ind

Windows/x86 Null Free WinExec Calc.exe Shellcode

195 bytes small Windows/x86 null-free WinExec Calc.exe shellcode.




ind

Linux Password Protected Bindshell Shellcode

272 bytes small Linux/x86_64 null free password protected bindshell shellcode.







ind

All Phones In India To Be Equipped With Panic Buttons From 2017




ind

CloudFlare Probes Mystery Interception Of Site Traffic Across India