### This module requires Metasploit: https://metasploit.com/download# Current source: https://github.com/rapid7/metasploit-framework### Windows XP systems that are not part of a domain default to treating all# network logons as if they were Guest. T
### This module requires Metasploit: https://metasploit.com/download# Current source: https://github.com/rapid7/metasploit-framework##class MetasploitModule Msf::Exploit::Local Rank = GoodRanking include Msf::Exploit::EXE include Msf::Exploit::FileD
/* There was recently some cleanup in the persona code to fix some race conditions there, I don't think it was sufficient: In kpersona_alloc_syscall if we provide an invalid userspace pointer for the ipd outptr we can cause this copyout to fail: erro
/* IOHIDResourceQueue inherits from IOSharedDataQueue and adds its own ::enqueueReport method, which seems to be mostly copy-pasted from IOSharedDataQueue and IODataQueue's ::enqueue methods. I reported a bunch of integer overflows in IODataQueue ove
/* This PoC file might look familiar; this bug is a trivial variant of CVE-2016-1744 (Apple bug id 635599405.) That report showed the bug in the unmap_user_memory external methods; a variant also exists in the map_user_memory external methods. The in
# Exploit Title: Modbus Poll 7.2.2 - Denial of Service (PoC) # Discovery by: Cemal Cihad FT # Discovery Date: 2018-10-19 # Tested Version: 7.2.2 # Vulnerability Type: DOS # Tested on OS: Windows XP Professional Service Pack 3 # Vendor Homepage: https
### This module requires Metasploit: https://metasploit.com/download# Current source: https://github.com/rapid7/metasploit-framework##class MetasploitModule Msf::Exploit::Local Rank = GoodRanking include Msf::Post::File include Msf::Exploit::EXE inc
# CVE-2018-17456 I've gotten a couple of questions about exploitation for the[recent RCE](https://marc.info/?l=gitm=153875888916397w=2) in Git. So here wego with some technical details. ## TL;DR [Here](https://github.com/joernchen/poc-submodule) is
### This module requires Metasploit: https://metasploit.com/download# Current source: https://github.com/rapid7/metasploit-framework##class MetasploitModule Msf::Exploit::Local Rank = GoodRanking include Msf::Post::File include Msf::Post::Solaris::P