Subscribe via feed.
Archive for July, 2022

https://sanpong.go.th/riz.htm

Posted by deepcore under defacement (No Respond)

https://sanpong.go.th/riz.htm notified by ./Tikus_HaXoR

Tags:

[remote] Nginx 1.20.0 – Denial of Service (DOS)

Posted by deepcore under Security (No Respond)

Nginx 1.20.0 – Denial of Service (DOS)

Tags: ,

Windows Kerberos KerbRetrieveEncodedTicketMessage AppContainer Privilege Escalation

Posted by deepcore under exploit (No Respond)

On Windows 11, the Kerberos SSP’s KerbRetrieveEncodedTicketMessage message can be used to get an arbitrary service ticket and session key from an AppContainer even without the enterprise authentication capability leading to elevation of privilege.

http://www.plailocal.go.th/index.php

Posted by deepcore under defacement (No Respond)

http://www.plailocal.go.th/index.php notified by Jaring

Tags:

Windows Kerberos KerbRetrieveEncodedTicketMessage AppContainer Privilege Escalation

Posted by deepcore under exploit (No Respond)

On Windows 11, the Kerberos SSP’s KerbRetrieveEncodedTicketMessage message can be used to get an arbitrary service ticket and session key from an AppContainer even without the enterprise authentication capability leading to elevation of privilege.

Magnolia CMS 6.2.19 Cross Site Scripting

Posted by deepcore under exploit (No Respond)

Magnolia CMS versions 6.2.19 and below suffer from a persistent cross site scripting vulnerability.

EQS Integrity Line Cross Site Scripting / Information Disclosure

Posted by deepcore under exploit (No Respond)

EQS Integrity Line versions through 2022-07-01 suffer from cross site scripting and sensitive information disclosure vulnerabilities.

Xen PV Guest Non-SELFSNOOP CPU Memory Corruption

Posted by deepcore under exploit (No Respond)

On CPUs without SELFSNOOP support, a Xen PV domain that has access to a PCI device (which grants the domain the ability to set arbitrary cache attributes on all its pages) can trick Xen into validating an L2 pagetable that contains a cacheline that is marked as clean in the cache but actually differs from […]

Windows Kerberos Redirected Logon Buffer Privilege Escalation

Posted by deepcore under exploit (No Respond)

On Windows, the buffer for redirected logon context does not protect against spoofing resulting in arbitrary code execution in the LSA leading to local elevation of privilege.

Windows Kerberos Redirected Logon Buffer Privilege Escalation

Posted by deepcore under exploit (No Respond)

On Windows, the buffer for redirected logon context does not protect against spoofing resulting in arbitrary code execution in the LSA leading to local elevation of privilege.