header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Windows IPv6 CVE-2024-38063 Denial-Of-Service Vulnerability

The exploit targets Windows 10, 11 <10.0.26100.1457 and Server 2016-2019-2022 <10.0.17763.6189, allowing an attacker to cause denial-of-service. By corrupting the tcpip.sys memory per batch, the attacker can disrupt the normal functioning of the system. This vulnerability is identified as CVE-2024-38063.

Microsoft Windows Defender TrojanWin32Powessere.G Mitigation Bypass Part 3

Windows Defender fails to detect and prevent execution of TrojanWin32Powessere.G when leveraging rundll32.exe, leading to an 'Access is denied' error. The bypass was first disclosed in 2022 by passing an extra path traversal with mshtml, which was later mitigated. Subsequently, on Feb 7, 2024, using multiple commas as part of the path allowed bypassing the mitigation until it was fixed. Another trivial bypass was discovered soon after.

Microsoft Windows PowerShell Single Quote Code Execution and Event Log Bypass Vulnerability

The vulnerability in Microsoft Windows PowerShell allows for code execution by bypassing single quote restrictions. By using a combination of semicolon and ampersand characters, a specially crafted filename can trigger arbitrary code execution and evade PS event logging. This can lead to unauthorized file execution and potential security breaches.

Windows Defender VBScript Detection Mitigation Bypass for TrojanWin32Powessere.G

Windows Defender usually blocks the execution of TrojanWin32Powessere.G, but a bypass using VBScript and ActiveX engine can allow the execution of malicious commands. By adding arbitrary text as the 2nd mshtml parameter, one can bypass the detection. For example, running rundll32 vbscript:"\\..\\mshtml\\..\\PWN\\..\\mshtml,RunHTMLApplication "+String(CreateObject("Wscript.Shell").Run("calc.exe"),0) can execute commands despite Windows Defender protection.

Windows Defender Backdoor Detection Mitigation Bypass

In 2022, a proof of concept was released to bypass the Backdoor:JS/Relvelshe.A detection in Windows Defender. Although the initial method was mitigated, a new approach involves adding a simple JavaScript try-catch error statement and evaluating the hex string to execute the bypass successfully.

Windows Defender Trojan.Win32Powessere.G Mitigation Bypass

Windows Defender usually prevents the execution of TrojanWin32Powessere.G by leveraging rundll32.exe. However, by using multiple commas in the execution command, the mitigation can be bypassed, allowing successful execution of the trojan.

Microsoft Windows PowerShell Single Quote Code Execution and Event Log Bypass

The vulnerability in Microsoft Windows PowerShell allows for code execution bypassing single quotes using the semicolon ';' and ampersand '&' characters in filenames. By exploiting this flaw, arbitrary code execution can be triggered, and the PowerShell event log can be truncated.

Windows Defender VBScript Detection Mitigation Bypass for TrojanWin32Powessere.G

Windows Defender normally detects and prevents the execution of TrojanWin32Powessere.G which leverages rundll32.exe. By using a VBScript and ActiveX engine, attackers can bypass the detection. Running a specific command can allow the execution of arbitrary commands from an attacker. This bypass involves adding arbitrary text to a parameter, such as 'shtml' or 'Lol', to evade Windows Defender detection.

Windows Defender Detection Mitigation Bypass for Backdoor:JS/Relvelshe.A

In 2022, a Proof of Concept (PoC) was released to bypass the detection of Backdoor:JS/Relvelshe.A in Windows Defender, which was later mitigated. However, by adding a simple JavaScript try-catch error statement and evaluating the hex string, the bypass can still be achieved.

Recent Exploits: