#!/usr/bin/env python # -*- coding: utf-8 -*- ################################################################################## # By Victor Portal (vportal) for educational porpouse only ##############################################################
''' CVE Identifier: CVE-2017-7221 Vendor: OpenText Affected products: OpenText Documentum Content Server (all versions) Researcher: Andrey B. Panfilov Severity Rating: CVSS v3 Base Score: 8.8 (AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H) Fix: not available P
Source: https://blogs.securiteam.com/index.php/archives/3134 Vulnerability Summary The following advisory describes a local privilege escalation via LightDM found in Ubuntu versions 16.10 / 16.04 LTS. Ubuntu is an open source software platform that r
gnome-keyring-daemon is vulnerable to local credentials disclosure.Fortunately the attack can be spun on already compromised machines,but sadly, in those cases, an attacker can leaverage ongnome-keyring-daemon to obtain sensible data. The applicatio
/* Source: https://bugs.chromium.org/p/project-zero/issues/detail?id=1141 This is another way to escalate from an unprivileged userspace process into the VirtualBox process, which has an open file descriptor to the privileged device /dev/vboxdrv and
/* Source: https://bugs.chromium.org/p/project-zero/issues/detail?id=1093 Windows: IEETWCollector Arbitrary Directory/File Deletion EoP Platform: Windows 10 10586 (not tested on anything else) Class: Elevation of Privilege Summary: When cleaning up a
!-- Source: https://bugs.chromium.org/p/project-zero/issues/detail?id=1094 Once a spread operation is optimized, the function |operationSpreadGeneric| will be called from then on. But operationSpreadGeneric's trying to get a JSGlobalObject from the a
!-- Source: https://bugs.chromium.org/p/project-zero/issues/detail?id=1084 When creating an object in Javascript, its |Structure| is created with the constructor's prototype's |VM|. Here's some snippets of that routine. Structure* InternalFunction::c
@ECHO OFFREM Microsoft Windows 'IFEO' Winlogin SYSTEM Backdooring ExploitREM REM Todor Donev todor.donev@gmail.comREM https://www.ethical-hacker.org/REM https://www.facebook.com/ethicalhackerorgREMREM https://blogs.msdn.microsoft.com/mithuns/2010/03