首页 | 安全文章 | 安全工具 | Exploits | 本站原创 | 关于我们 | 网站地图 | 安全论坛
热门关键字: shell  88888  art  vitter  linux
  当前位置:主页>安全文章>文章资料>Exploits>列表
Apple WebKit - 'RenderLayer' Use-After-Free
  日期:2017-04-05 15:23:26 点击:13 评论:0
!-- Source: https://bugs.chromium.org/p/project-zero/issues/detail?id=1082 There is a use-after-free security vulnerability in WebKit. The vulnerability was confirmed on the latest nightly build of WebKit. The PoC also crashes Safari 10.0.2 on Mac. P
Apple WebKit 10.0.2 - HTMLInputElement Use-After-Free
  日期:2017-04-05 15:21:40 点击:17 评论:0
!-- Source: https://bugs.chromium.org/p/project-zero/issues/detail?id=1080 There is a use-after-free security vulnerability related to how the HTMLInputElement is handled in WebKit. The vulnerability was confirmed on a nightly build of WebKit. The Po
Apple WebKit 10.0.2(12602.3.12.0.1, r210800) - 'constructJSReadableStreamDefault
  日期:2017-04-05 15:20:44 点击:23 评论:0
!-- Source: https://bugs.chromium.org/p/project-zero/issues/detail?id=1085 EncodedJSValue JSC_HOST_CALL constructJSReadableStreamDefaultReader(ExecState exec) { VM vm = exec.vm(); auto scope = DECLARE_THROW_SCOPE(vm); JSReadableStream* stream = jsDyn
Apple WebKit 10.0.2(12602.3.12.0.1) - 'disconnectSubframes' Universal Cross-Site
  日期:2017-04-05 15:19:49 点击:17 评论:0
!-- Source: https://bugs.chromium.org/p/project-zero/issues/detail?id=1074 When an element is removed from a document, the function |disconnectSubframes| is called to detach its subframes(iframe tag, object tag, etc.). Here is a snippet of |disconnec
Apple Webkit - Universal Cross-Site Scripting by Accessing a Named Property from
  日期:2017-04-05 15:19:04 点击:15 评论:0
!-- Source: https://bugs.chromium.org/p/project-zero/issues/detail?id=1063 The frame is not detached from an unloaded window. We can access to the new document's named properties via the following function. static bool jsDOMWindowPropertiesGetOwnProp
Apple Webkit - 'JSCallbackData' Universal Cross-Site Scripting
  日期:2017-04-05 15:18:18 点击:20 评论:0
!-- Source: https://bugs.chromium.org/p/project-zero/issues/detail?id=1068 Here is the definition of |JSCallbackData| class. This class is used to call a javascript function from a DOM object. class JSCallbackDataStrong : public JSCallbackData { publ
Apple WebKit 10.0.2(12602.3.12.0.1) - 'Frame::setDocument (1)' Universal Cross-S
  日期:2017-04-05 15:16:58 点击:17 评论:0
!-- Source: https://bugs.chromium.org/p/project-zero/issues/detail?id=1056 void Frame::setDocument(RefPtrDocument newDocument) { ASSERT(!newDocument || newDocument-frame() == this); if (m_doc m_doc-pageCacheState() != Document::InPageCache) m_doc-pre
macOS/iOS Kernel 10.12.3 (16D32) - Double-Free Due to Bad Locking in fsevents De
  日期:2017-04-05 15:09:50 点击:29 评论:0
/* Source: https://bugs.chromium.org/p/project-zero/issues/detail?id=1129 fseventsf_ioctl handles ioctls on fsevent fds acquired via FSEVENTS_CLONE_64 on /dev/fsevents Heres the code for the FSEVENTS_DEVICE_FILTER_64 ioctl: case FSEVENTS_DEVICE_FILTE
macOS Kernel 10.12.2 (16C67) - Memory Disclosure Due to Lack of Bounds Checking
  日期:2017-04-05 15:08:40 点击:20 评论:0
/* Source: https://bugs.chromium.org/p/project-zero/issues/detail?id=1069 MacOS kernel memory disclosure due to lack of bounds checking in AppleIntelCapriController::getDisplayPipeCapability Selector 0x710 of IntelFBClientControl ends up in AppleInte
macOS Kernel 10.12.3 (16D32) - 'audit_pipe_open' Off-by-One Memory Corruption
  日期:2017-04-05 15:07:56 点击:30 评论:0
/* Source: https://bugs.chromium.org/p/project-zero/issues/detail?id=1126 MacOS kernel memory corruption due to off-by-one in audit_pipe_open audit_pipe_open is the special file open handler for the auditpipe device (major number 10.) Here's the code
macOS/iOS Kernel 10.12.3 (16D32) - 'bpf' Heap Overflow
  日期:2017-04-05 15:06:41 点击:34 评论:0
/* Source: https://bugs.chromium.org/p/project-zero/issues/detail?id=1125 The bpf ioctl BIOCSBLEN allows userspace to set the bpf buffer length: case BIOCSBLEN: /* u_int */ if (d-bd_bif != 0) error = EINVAL; else { u_int size; bcopy(addr, size, sizeo
macOS/iOS Kernel 10.12.3 (16D32) - Bad Locking in necp_open Use-After-Free
  日期:2017-04-05 15:05:58 点击:48 评论:0
/* Source: https://bugs.chromium.org/p/project-zero/issues/detail?id=1116 necp_open is a syscall used to obtain a new necp file descriptor The necp file's fp's fg_data points to a struct necp_fd_data allocated on the heap. Here's the relevant code fr
macOS/iOS Kernel 10.12.3 (16D32) - SIOCGIFORDER Socket ioctl Off-by-One Memory C
  日期:2017-04-05 15:05:07 点击:19 评论:0
/* Source: https://bugs.chromium.org/p/project-zero/issues/detail?id=1111 SIOCSIFORDER and SIOCGIFORDER allow userspace programs to build and maintain the ifnet_ordered_head linked list of interfaces. SIOCSIFORDER clears the existing list and allows
macOS/iOS Kernel 10.12.3 (16D32) - SIOCSIFORDER Socket ioctl Memory Corruption D
  日期:2017-04-05 15:04:17 点击:25 评论:0
/* Source: https://bugs.chromium.org/p/project-zero/issues/detail?id=1108 SIOCSIFORDER is a new ioctl added in iOS 10. It can be called on a regular tcp socket, so from pretty much any sandbox. it falls through to calling: ifnet_reset_order(ordered_i
macOS Kernel 10.12.3 (16D32) - Use-After-Free Due to Double-Release in posix_spa
  日期:2017-04-05 15:03:23 点击:87 评论:0
/* Source: https://bugs.chromium.org/p/project-zero/issues/detail?id=1104 exec_handle_port_actions is responsible for handling the xnu port actions extension to posix_spawn. It supports 4 different types of port (PSPA_SPECIAL, PSPA_EXCEPTION, PSPA_AU
macOS Kernel 10.12.2 (16C67) - 'AppleIntelCapriController::GetLinkConfig' Code E
  日期:2017-04-05 15:02:28 点击:41 评论:0
/* Source: https://bugs.chromium.org/p/project-zero/issues/detail?id=1071 Selector 0x921 of IntelFBClientControl ends up in AppleIntelCapriController::GetLinkConfig This method takes a structure input and output buffer. It reads an attacker controlle
SolarWinds LEM 6.3.1 - Remote Code Execution (Metasploit)
  日期:2017-04-05 15:01:22 点击:24 评论:0
## # This module requires Metasploit: http://metasploit.com/download # Current source: https://github.com/rapid7/metasploit-framework ## class MetasploitModule Msf::Exploit::Remote Rank = ExcellentRanking include Msf::Exploit::Remote::SSH def initial
Bluecoat ASG 6.6/CAS 1.3 - Privilege Escalation (Metasploit)
  日期:2017-04-05 15:00:27 点击:60 评论:0
# Exploit Title: OS Command Injection Vulnerability in BlueCoat ASG and CAS # Date: April 3, 2017 # Exploit Authors: Chris Hebert, Peter Paccione and Corey Boyd # Contact: chrisdhebert[at]gmail.com # Vendor Security Advisory: https://bto.bluecoat.com
Bluecoat ASG 6.6/CAS 1.3 - OS Command Injection (Metasploit)
  日期:2017-04-05 14:59:19 点击:25 评论:0
# Exploit Title: OS Command Injection Vulnerability in BlueCoat ASG and CAS # Date: April 3, 2017 # Exploit Authors: Chris Hebert, Peter Paccione and Corey Boyd # Contact: chrisdhebert[at]gmail.com # Vendor Security Advisory: https://bto.bluecoat.com
Apache Tomcat 6/7/8/9 - Information Disclosure
  日期:2017-04-05 14:58:18 点击:95 评论:0
# Exploit Title:Apache Tomcat CVE-2016-6816 Security Bypass Vulnerability # Date: 4th March 2017 # Exploit Author: justpentest # Vendor Homepage: tomcat.apache.org # Version: Apache Tomcat 9.0.0.M1 through 9.0.0.M11, 8.5.0 through 8.5.6, 8.0.0.RC1 th
共637页/12733条记录 首页 上一页 [80] [81] [82] 83 [84] [85] [86] 下一页 末页
  本月热点文章
 
  本月推荐文章
 
  相关分类
  漏洞检测
  漏洞资料
  入侵实例
  系统安全
  网络安全
  网络基础
  病毒分析
Exploits
CopyRight © 2002-2022 VFocuS.Net All Rights Reserved