Subscribe via feed.
Archive for December, 2016

MS Edge CMarkup::EnsureDeleteCFState Use-After-Free

Posted by deepcore under exploit (No Respond)

A specially crafted web-page can trigger a memory corruption vulnerability in Microsoft Edge.

Android android.graphics.Bitmap Inter-Process munmap

Posted by deepcore under exploit (No Respond)

Bitmap objects can be passed between processes by flattening them to a Parcel in one process and un-flattening them in another. In order to conserve memory, there exists a code path which allows Bitmaps to be shared between processes by providing an ashmem-mapped file descriptor containing the Bitmap’s raw pixel data. The android.graphics.Bitmap class illegally […]

Microsoft Edge JSON.parse Information Leak

Posted by deepcore under exploit (No Respond)

Microsoft Edge has an information leak in JSON.parse. If this function is called with a reviver, and the reviver modifies the output object to contain a native array, the Walk function assumes that this array is a Var array, and writes pointers to it. These pointers can then be read out of the array by […]

Opera foreignObject textNode::removeChild Use-After-Free

Posted by deepcore under exploit (No Respond)

Opera suffers from a foreignObject textNode::removeChild use-after-free vulnerability.

Windows Escalate UAC Protection Bypass

Posted by deepcore under exploit (No Respond)

This Metasploit module will bypass Windows UAC by hijacking a special key in the Registry under the current user hive, and inserting a custom command that will get invoked when the Windows Event Viewer is launched. It will spawn a second shell that has the UAC flag turned off. This Metasploit module modifies a registry […]

ntpd 4.2.8 Stack Overflow Proof Of Concept

Posted by deepcore under exploit (No Respond)

Remote ntpd version 4.2.8 stack overflow proof of concept exploit.

X5 Webserver 5.0 Remote Denial Of Service

Posted by deepcore under exploit (No Respond)

X5 Webserver version 5.0 suffers from a null pointer dereference denial of service vulnerability.

e107 2.1.2 Cross Site Request Forgery / Cross Site Scripting

Posted by deepcore under exploit (No Respond)

e107 version 2.1.2 suffers from cross site request forgery, static cookie, and cross site scripting vulnerabilities.

PDF Shaper Buffer Overflow

Posted by deepcore under exploit (No Respond)

PDF Shaper is prone to a security vulnerability when processing PDF files. The vulnerability appear when we use Convert PDF to Image and use a specially crafted PDF file. This Metasploit module has been tested successfully on Win Xp, Win 7, Win 8, Win 10.

Microsoft Windows Limited Bypass Of Traverse Permissions In Kernel Object Manager

Posted by deepcore under exploit (No Respond)

Microsoft Windows suffers from a limited bypass vulnerability related to traverse permissions in the kernel object manager.