Security
Headlines
HeadlinesLatestCVEs

Tag

#windows

Windows Credential Guard Kerberos Change Password Privilege Escalation

Windows Credential guard does not prevent using encrypted Kerberos keys to change a user's password leading to elevation of privilege.

Packet Storm
#windows
Windows Credential Guard Insufficient Checks On Kerberos Encryption Type Use

Windows CG APIs, which take encrypted keys, do not limit what encryption or checksum types can be used with those keys. This can result in using weak encryption algorithms which could be abused to either generate keystreams or brute force encryption keys.

Windows Credential Guard BCrypt Context Use-After-Free Privilege Escalation

On Windows, the method for allocating a context when using the CG BCrypt APIs is insecure leading to use-after-free of secure memory resulting in elevation of privilege.

Windows Credential Guard ASN1 Decoder Type Confusion Privilege Escalation

On Windows, a number of Kerberos CG APIs do not verify the ASN1 PDU type when decoding and encoding Kerberos ASN1 structures leading to type confusion and elevation of privilege.

Windows Kernel Registry Hive Memory Problems

The Windows kernel suffers from multiple memory problems when handling incorrectly formatted security descriptors in registry hives.

Windows Kernel Unchecked Blink Cell Index Invalid Read/Write

The Windows kernel suffers from an invalid read/write condition due to an unchecked Blink cell index in the root security descriptor.

Windows Kernel Refcount Overflow Use-After-Free

The Windows kernel suffers from a use-after-free vulnerability due to a refcount overflow in the registry hive security descriptors.

CVE-2022-38068: Export Post Info

Authenticated (admin+) Stored Cross-Site Scripting (XSS) vulnerability in Apasionados Export Post Info plugin <= 1.1.0 at WordPress.

CVE-2022-2528: Security Advisory 2022-13

In affected versions of Octopus Deploy it is possible to upload a package to built-in feed with insufficient permissions after re-indexing packages.

Stealthy Linux Malware Shikitega Deploying Monero Cryptominer

By Deeba Ahmed The stealthy malware leverages security flaws to gain privilege escalation and establish persistence. This is a post from HackRead.com Read the original post: Stealthy Linux Malware Shikitega Deploying Monero Cryptominer