Microsoft Edge: Chakra: Incorrect usage of PushPopFrameHelper in InterpreterStackFrame::ProcessLinkFailedAsmJsModule CVE-2017-8646PushPopFrameHelper is a class that pushes the current stack frame object in its constructor and pops it in the destruct
Microsoft Edge: Chakra: InterpreterStackFrame::ProcessLinkFailedAsmJsModule incorrectly re-parses CVE-2017-8645When Chakra fails to link an asmjs module, it tries to re-parse the failed-to-link asmjs function to treat it as a normal javascript funct
Microsoft Edge: Chakra: PreVisitCatch doesnt call SetIsCatch for all cases CVE-2017-8656function trigger() { try { } catch (x) { var x = 1; } print(x);}trigger();When Chakra executes the above code, it declares two "x"s. One is only for the catch sco
Microsoft Edge: Out-of-bounds read in CInputDateTimeScrollerElement::_SelectValueInternal CVE-2017-8644The vulnerability has been confirmed on Windows 10 Enterprise 64-bit (OS version 1607, OS build 14393.1198) and Microsoft Edge 38.14393.1066.0, Mi
Source: https://www.securify.nl/advisory/SFY20170403/xamarin-studio-for-mac-api-documentation-update-affected-by-local-privilege-escalation.html Abstract Xamarin Studio is an Integrated Development Environment (IDE) used to create iOS, Mac and Andro
Microsoft Edge: textarea.defaultValue memory disclosure CVE-2017-8652There is a use-after free vulnerability in Microsoft Edge that can lead to memory disclosure. The vulnerability has been confirmed on Windows 10 Enterprise 64-bit (OS version 1607,
''' Source: https://blogs.securiteam.com/index.php/archives/3356 Vulnerability details The remote code execution is a combination of 4 different vulnerabilities: Upload arbitrary files to the specified directories Log in with a fake authentication me
CVE-2017-11741 Local root privesc in Hashicorp vagrant-vmware-fusion = 4.0.232 Aug 2017 06:49A couple of weeks ago I disclosed a local root privesc in Hashicorp's vagrant-vmware-fusion plugin:https://m4.rkw.io/blog/cve20177642-local-root-privesc-in-
### This module requires Metasploit: http://metasploit.com/download# Current source: https://github.com/rapid7/metasploit-framework##class MetasploitModule Msf::Exploit::Remote Rank = ExcellentRanking include Msf::Exploit::Remote::HttpServer::HTML i
### This module requires Metasploit: http://metasploit.com/download# Current source: https://github.com/rapid7/metasploit-framework## class MetasploitModule Msf::Exploit::Remote Rank = ExcellentRanking include Msf::Exploit::EXE attr_accessor :exploi