POC for MS16-042 Excel Heap Exploit

by admin

Thursday, April 14th, 2016 at 1:13 am

A new heap memory corruption (Out-of-Bounds Read) that affects Microsoft Office Excel 2007,2010,2013 and 2016. This vulnerability could allow remote code execution if a user opens a specially crafted Microsoft Office Excel file (.xlsm).
Advisory & POC

Windows 10 RS1 14316

by admin

Sunday, April 10th, 2016 at 3:44 pm

The build brings new changes targeting previously exploited dll-hijacking and uac bypass method vulnerabilities.

cliconfg.exe – can no longer be used as target for autoelevation as MS changed it manifest to autoelevate=false.

mmc.exe – event viewer console fixed, dll hijacking no longer works.

fake IIS inetmgr.exe launch from inetsrv appinfo hardcoded directory fixed too – Windows will not allow you to run & autoelevate anything except legit InetMgr.exe from system32\inetsrv directory.

Bypasses alot of the methods used by UACme that is posted in my ::Wiki::

IP: Loading... - Host: Loading...
IP Geolocation: unknown.

We love our country, but fear our government.

https://iait-institute.org/
https://www.nintendo-nation.net/
https://wartabogor.com/
https://www.crstudent.com/
https://www.nusoundonline.com/
https://quernsmansionacafejy.com/
https://caminaresmedicina.com/
https://www.americasgreatestbrands.com/
https://www.bng-tech.com/en/
https://hoteldesetrangers.com.tr/canakkale/
https://www.5tips.co/freebies/
https://chicago43rd.org/
https://o.dijitalnesilakademisi.com/
https://cos.coop.py/creditos/
https://cakirgaraj.com/fiyat-listesi/
https://cakirogluikinciel.com/iletisim/
https://timetotimecourierservice.com/services.html
https://www.broadcastbuyer.tv/
https://vinadegracia.org/nosotros/