Jump to content
YOUR-AD-HERE
HOSTING
TOOLS
SERVICE

Search the Community

Showing results for tags 'hotfix'.

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


Forums

  • Staff Control
    • Staff Announcements
  • General doubts | News
    • General doubts
    • News
  • Hacking | Remote Administration | Bugs & Exploits
    • Hacking
    • Remote Administration
    • Bugs & Exploits
  • Programming | Web | SEO | Prefabricated applications
    • General Programming
    • Web Programming
    • Prefabricated Applications
    • SEO
  • Pentesting Zone
    • Pentesting Accounts
    • Reverse Engineering
  • Security & Anonymity
    • Security
    • Wireless Security
    • Web Security
    • Anonymity
  • Operating Systems | Hardware | Programs
    • Operating systems
    • Hardware
    • PC programs
    • iOS
    • Android
  • Graphic Design
    • Graphic Design
  • vBCms Comments
  • live stream tv
    • live stream tv
  • Marketplace
    • Sell
    • Services
    • Request
  • Pentesting Premium
    • Pentesting Accounts
  • Modders Section
    • Source Codes
    • Manuals | Videos
    • Tools
    • Others
  • PRIV8-Section
    • Exploits
    • Accounts|Dumps
    • Crypter|Binder|Bots
    • Tutorials|Videos
    • Cracked Tools
    • Make Money
    • More Tools
    • Databeses
    • Ebooks
  • Pentesting Zone PRIV8
    • Pentesting Accounts
    • Reverse Engineering
    • Cracker Preview Area
  • Carding Zone PRIV8
    • Carding
    • Phishing
    • Defacing
    • Doxing
    • Special User Premium Preview Area
  • Recycle Bin
    • Recycle
  • Null3D's Nulled Group

Product Groups

  • PRIV8
  • Advertising
  • Access Basic
  • Seller
  • Services

Find results in...

Find results that contain...


Date Created

  • Start

    End


Last Updated

  • Start

    End


Filter by number of...

Joined

  • Start

    End


Group


About Me

Found 2 results

  1. Release v0.5.4 / 5.46.2 - Hotfix 2 Urgent security fixes (thanks @diversenok) fix Build 5.46.0 resolves many box isolation issues some of them critical that could allow rogue applications to escape the sandbox. It is highly advised to upgrade quickly to the new builds. For further details please review the change log below. If you have issues with an update installation, just uninstall the previous version keeping the sandboxie.ini and reinstall the new build. You can support the project through donations, any help will be greatly appreciated. Hotfix2 (5.46.2) Changelog Added added "CallTrace=*" to log all system calls to the access log Changed improved ipc logging code improved MSG_2101 logging Fixed fixed more issues with ipc tracing fixed SBIE2101 issue with crome and derivatives [hide][Hidden Content]]
  2. Sandboxie Sandboxie is a sandbox-based isolation software for 32- and 64-bit Windows NT-based operating systems. It creates a sandbox-like isolated operating environment in which applications can be run or installed without permanently modifying local & mapped drives or the windows registry. An isolated virtual environment allows controlled testing of untrusted programs and web surfing. Hotfix Changelog Added added "RunServiceAsSystem=..." allows specific named services to be ran as system Changed refactored some code around SCM access Fixed fixed a crash issue in SbieSvc.exe introduced with the last build fixed issue with sandman ui update check Removed removed "ProtectRpcSs=y" due to incompatybility with new isolation defaults Release Changelog Added Sandboxie now strips particularly problematic privileges from sandboxed system tokens -- with those a process could atempt to bypass the sandbox isolation (thanks Diversenok) -- old legacy behavior can be enabled with "StripSystemPrivileges=n" (absolutely NOT Recommended) added new isolation options "ClosePrintSpooler=y" and "OpenSmartCard=n" -- those resources are open by default but for a hardened box its desired to close them added print spooler filter to prevent printers from being set up outside the sandbox -- the filter can be disabled with "OpenPrintSpooler=y" added overwrite prompt when recovering an already existing file added "StartProgram=", "StartService=" and "AutoExec=" options to the SandMan UI added more compatybility templates (thanks isaak654) Changed Changed Emulated SCM behavior, boxed services are no longer by default started as boxed system -- use "RunServicesAsSystem=y" to enable the old legacy behavior -- Note: sandboxed services with a system token are still sandboxed and restricted -- However not granting them a system token in the first place removes possible exploit vectors -- Note: this option is not compatible with "ProtectRpcSs=y" and takes precedence! Reworked dynamic IPC port handling Improved Resource Monitor status strings Fixed fixed a critical issue that allowed to create processes outside the sandbox (thanks Diversenok) fixed issues with dynamic IPC port handling that allowed to bypass IPC isolation fixed issue with ipc tracing fixed CVE-2019-13502 "\RPC Control\LSARPC_ENDPOINT" is now filtered by the driver (thanks Diversenok) -- this allowed some system options to be changed, to disable filtering use "OpenLsaEndpoint=y" fixed hooking issues SBIE2303 with chrome, edge and possibly others fixed failed check for running processes when performing snapshot operations fixed some box option checkboxes were not properly initialized fixed unavailable options are not properly disabled when sandman is not connected to the driver fixed MSI instalelr issue, not being able to create "C:\Config.Msi" folder on windows 20H2 added missing localization to generic list commands fixed issue with "iconcache_*" when runngin sandboxed explorer fixed more issues with groups [hide][Hidden Content]]
×
×
  • Create New...

Important Information

We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.