MS Edge CMarkup::EnsureDeleteCFState Use-After-Free
A specially crafted web-page can trigger a memory corruption vulnerability in Microsoft Edge.
A specially crafted web-page can trigger a memory corruption vulnerability in Microsoft Edge.
Bitmap objects can be passed between processes by flattening them to a Parcel in one process and un-flattening them in another. In order to conserve memory, there exists a code path which allows Bitmaps to be shared between processes by providing an ashmem-mapped file descriptor containing the Bitmap’s raw pixel data. The android.graphics.Bitmap class illegally […]
Microsoft Edge has an information leak in JSON.parse. If this function is called with a reviver, and the reviver modifies the output object to contain a native array, the Walk function assumes that this array is a Var array, and writes pointers to it. These pointers can then be read out of the array by […]
Opera suffers from a foreignObject textNode::removeChild use-after-free vulnerability.
This Metasploit module will bypass Windows UAC by hijacking a special key in the Registry under the current user hive, and inserting a custom command that will get invoked when the Windows Event Viewer is launched. It will spawn a second shell that has the UAC flag turned off. This Metasploit module modifies a registry […]
Remote ntpd version 4.2.8 stack overflow proof of concept exploit.
X5 Webserver version 5.0 suffers from a null pointer dereference denial of service vulnerability.
e107 version 2.1.2 suffers from cross site request forgery, static cookie, and cross site scripting vulnerabilities.
PDF Shaper is prone to a security vulnerability when processing PDF files. The vulnerability appear when we use Convert PDF to Image and use a specially crafted PDF file. This Metasploit module has been tested successfully on Win Xp, Win 7, Win 8, Win 10.
Microsoft Windows suffers from a limited bypass vulnerability related to traverse permissions in the kernel object manager.