TSEC NEWS: 06.05.21 Cron-Job Fehlerhaft nach PHP Update + PWA mobile + Desktop / 04.05.21 - Android App von TSECURITY 28.04.21 - NEUER SERVER // 26.04.21 ++ Download the Electron-App für tsecurity.de // Über 550 Feed-Quellen


❈ Internet Explorer jscript9.dll Memory Corruption

IT Security Tools packetstormsecurity.com

There is a vulnerability in jscript9 that could be potentially used by an attacker to execute arbitrary code when viewing an attacker-controlled website in Internet Explorer. The vulnerability has been confirmed on Windows 10 64-bit with the latest security patches applied....


Kompletten Artikel lesen (externe Quelle: https://packetstormsecurity.com/files/162570/GS20210513150630.txt)

Zur Startseite

➤ Weitere Beiträge von Team Security | IT Sicherheit (tsecurity.de)

Anno 1404 per wine wouldn't start

vom 511.71 Punkte
Hello, I'm not a very new Linux user nor am I very deep into the Unix system. I recently got a game that I'd like to play again and installed it via wine. Starting Anno 1404 I can see the ingame mouse for a second before it crashes. I run Manjaro Linux w

UACME - Defeating Windows User Account Control

vom 467.22 Punkte
Defeating Windows User Account Control by abusing built-in Windows AutoElevate backdoor. System Requirements x86-32/x64 Windows 7/8/8.1/10 (client, some methods however works on server version too). Admin account with UAC set on default settings required. UsageRun executable from command line: akagi32 [Key] [Param] or akagi64 [Key] [Param]. See "Run examples" below for more info.

Local Privilege Escalation in Win32k.sys Through Indexed Color Palettes

vom 422.98 Punkte
This is the second in our series of Top 5 interesting cases from 2019. Each of these bugs has some element that sets them apart from the more than 1,000 advisories released by the program this year. Today’s blog looks a local privilege escalation in t

Another country-sponsored #malware: Vietnam APT Campaign

vom 294.42 Punkte
The background This is a team work analysis, we have at least 5 (five) members involved with this investigation. The case that is about to be explained here is an APT case. Until now, we were (actually) avoiding APT cases for publicity in Malware Must Die

Another country-sponsored #malware: Vietnam APT Campaign

vom 294.42 Punkte
The background This is a team work analysis, we have at least 5 (five) members involved with this investigation. The case that is about to be explained here is an APT case. Until now, we were (actually) avoiding APT cases for publicity in Malware Must Die

Tablacus Explorer bis 17.3.30 erweiterte Rechte [CVE-2017-2140]

vom 184.35 Punkte
Eine kritische Schwachstelle wurde in Tablacus Explorer bis 17.3.30 entdeckt. Hierbei geht es um eine unbekannte Funktion. Dank der Manipulation mit einer unbekannten Eingabe kann eine erweiterte Rechte-Schwachstelle ausgenutzt werden. Klassifiziert wu

MemProcFS - The Memory Process File System

vom 176.04 Punkte
The Memory Process File System is an easy and convenient way of accessing physical memory as files a virtual file system.Easy trivial point and click memory analysis without the need for complicated commandline arguments! Access memory content and artifacts via

Steam Service Security [10 Jul 2014]

vom 172.81 Punkte
Original PDF https://revuln.com/files/ReVuln_Steam_Service_Security.pdf   STEAM SERVICE SECURITY BY LUIGI AURIEMMA How a malware or an exploit can use the Steam local service to escalate its privileges.   ReVuln Ltd. http://revuln.com @revuln [email protected]

DLLHSC - DLL Hijack SCanner A Tool To Assist With The Discovery Of Suitable Candidates For DLL Hijacking

vom 170.62 Punkte
DLL Hijack SCanner - A tool to generate leads and automate the discovery of candidates for DLL Search Order HijackingContents of this repository This repository hosts the Visual Studio project file for the tool (DLLHSC), the project file for the API

Salsa Tools - ShellReverse TCP/UDP/ICMP/DNS/SSL/BINDTCP and AV bypass, AMSI patched

vom 168.23 Punkte
Salsa Tools is a collection of three different tools that combined, allows you to get a reverse shell on steroids in any Windows environment without even needing PowerShell for it's execution. In order to avoid the latest detection techniques (AMSI),

Performing SQL Backflips to Achieve Code Execution on Schneider Electric’s EcoStruxure Operator Terminal Expert at Pwn2Own Miami 2020

vom 168.23 Punkte
The inaugural Pwn2Own Miami contest was held in January at the S4 Conference and targeted Industrial Control System (ICS) products. At the contest, the Claroty Research team chained two vulnerabilities to achieve code execution on Schneider Electric’s Ec

TA17-117A: Intrusions Affecting Multiple Victims Across Multiple Sectors

vom 166.03 Punkte
Original release date: April 27, 2017 | Last revised: May 14, 2017Systems Affected Networked Systems Overview The National Cybersecurity and Communications Integration Center (NCCIC) has become aware of an emerging sophisticated campaign, occurri

Team Security Diskussion über Internet Explorer jscript9.dll Memory Corruption