# Exploit Title: Microsoft SQL Server Management Studio 17.9 - XML External Entity Injection # Date: 2018-10-10 # Author: John Page (aka hyp3rlinx) # Website: hyp3rlinx.altervista.org # Venodor: www.microsoft.com # Software: SQL Server Management Stu
#!/usr/bin/env python## Exploit name : isilon-onefs-brute.py# Created date : 9/21/18# Submit Date : 10/10/18# Author : wetw0rk# Python version : 2.7# Brute Force Script: https://github.com/wetw0rk/Exploit-Development/blob/master/DELL%20EMC%20OneFS%2
/* The switch statement only handles Js::TypeIds_Array but not Js::TypeIds_NativeIntArray and Js::TypeIds_NativeFloatArray. So for example, a native float array can be considered as of type ObjectType::Object under certain circumstances where objValu
/* The BailOutOnInvalidatedArrayHeadSegment check uses the JavascriptArray::GetArrayForArrayOrObjectWithArray method to check whether the given object is an array. If it's not an array, it will decide to skip the check which means that no bailout wil
### This module requires Metasploit: https://metasploit.com/download# Current source: https://github.com/rapid7/metasploit-framework##class MetasploitModule Msf::Exploit::Local Rank = ExcellentRanking include Msf::Post::Linux::Priv include Msf::Post
/* Commit 82abbf8d2fc46d79611ab58daa7c608df14bb3ee (bpf: do not allow root to mangle valid pointers, first in v4.15) included the following snippet: ========= @@ -2319,43 +2307,29 @@ static int adjust_reg_min_max_vals(struct bpf_verifier_env *env, if
/* * CVE-2017-11176: mq_notify: double sock_put() by LEXFO (2018). * * DISCLAIMER: The following code is for EDUCATIONAL purpose only. Do not * use it on a system without authorizations. * * WARNING: The exploit WILL NOT work on your target, it requi