WebClientPrint Processor 2.0.15.109 Unauthorized Proxy Modification

WebClientPrint Processor 2.0.15.109 Unauthorized Proxy Modification

RedTeam Pentesting discovered that attackers can configure a proxy host and port to be used when fetching print jobs with WebClientPrint Processor (WCPP). This proxy setting may be distributed via specially crafted websites and is set without any user interaction as soon as the website is accessed. Version 2.0.15.109 is affected. Source: WebClientPrint Processor 2.0.15.109 […]

The post WebClientPrint Processor 2.0.15.109 Unauthorized Proxy Modification appeared first on MondoUnix.

Rilasciato Android 8.0 Oreo

Rilasciato Android 8.0 Oreo

Il 21 agosto è stato annunciata la disponibilità pubblica della nuova versione di Android per i cellulari Pixel e Nexus di Google. Le novità, soprattutto a livello di sistema, sono davvero molte, ma le più evidenti per l’utente saranno … [Visita il sito per leggere tutto l’articolo]

Windows Escalate UAC Protection Bypass (Via COM Handler Hijack)

Windows Escalate UAC Protection Bypass (Via COM Handler Hijack)

This Metasploit module will bypass Windows UAC by creating COM handler registry entries in the HKCU hive. When certain high integrity processes are loaded, these registry entries are referenced resulting in the process loading user-controlled DLLs. These DLLs contain the payloads that result in elevated sessions. Registry key modifications are cleaned up after payload invocation. […]

The post Windows Escalate UAC Protection Bypass (Via COM Handler Hijack) appeared first on MondoUnix.