# Exploit Title: Skype for Business 2013 user enumeration timing attack# Date: 2016-06-08# Exploit Author: nyxgeek# Vendor Homepage: https://www.microsoft.com# Version: Skype for Business 2013### Skype for Business 2013 is vulnerable to a timing att
?php /* Exploit Title : phpATM = 1.32 Remote Command Execution (Shell Upload) on Windows Servers Date : 17/06/2016 Author : Paolo Massenio - pmassenio[AT]gmail Vendor : phpATM - http://phpatm.org/ Version : = 1.32 Tested on : Windows 10 with XAMPP __
#### This module requires Metasploit: http://metasploit.com/download## Current source: https://github.com/rapid7/metasploit-framework###require 'msf/core'class MetasploitModule Msf::Exploit::Remote include Msf::Exploit::Remote::HttpClient include Ms
### This module requires Metasploit: http://metasploit.com/download# Current source: https://github.com/rapid7/metasploit-framework##class MetasploitModule Msf::Exploit::Remote Rank = ManualRanking include Msf::Exploit::Powershell include Msf::Explo
#Vulnerability: IE 11 XSS Filter Bypass#Impact: Moderate#Authors: Rafay Baloch#Company: RHAInfoSec#Website: http://rafayhackingarticles.net#version: LatestDescriptionInternet explorer 11 Suffers from a XSS Filter bypass using cp1025charset. This is
## # This module requires Metasploit: http://metasploit.com/download # Current source: https://github.com/rapid7/metasploit-framework ## require msf/core class MetasploitModule Msf::Post include Msf::Post:: File include Msf::Post::Linux::Priv def in
/* Source: https://bugs.chromium.org/p/project-zero/issues/detail?id=724 nvAPIClient::Escape is the sole external method of nvAcclerator userclient type 0x2a0. It implements its own method and parameter demuxing using the struct-in struct-out buffers
/* Source: https://bugs.chromium.org/p/project-zero/issues/detail?id=732 This is perhaps a more interesting UaF than just racing testNetBootMethod calls as there looks to be a path to getting free'd memory disclosed back to userspace. Although the co
/* Source: https://bugs.chromium.org/p/project-zero/issues/detail?id=772 In IOAccelContext2::clientMemoryForType the lock_busy/unlock_busy should be extended to cover all the code setting up shared memory type 2. At the moment the lock doesn't protec
/* Source: https://bugs.chromium.org/p/project-zero/issues/detail?id=774 The IOHIDFamily function IOHIDDevice::handleReportWithTime takes at attacker controlled unchecked IOHIDReportType enum, which was cast from an int in either IOHIDLibUserClient::