RoboImport 22.214.171.124 – Denial of Service (PoC)
This module exploits an arbitrary file write vulnerability in the Netscape Portable Runtime library (libnspr) on unpatched Solaris systems prior to Solaris 10u3 which allows users to gain root privileges. libnspr versions prior to 4.6.3 allow users to specify a log file with the NSPR_LOG_FILE environment variable. The log file is created with the privileges of the running process, resulting in privilege escalation when used in combination with a SUID executable. This module writes a shared object to the trusted library directory /usr/lib/secure and runs the specified SUID binary with the shared object loaded using the LD_LIBRARY_PATH environment variable. This module has been tested successfully with libnspr version 4.5.1 on Solaris 10u1 (01/06) (x86) and Solaris 10u2 (06/06) (x86).
Android – ‘zygote->init;' Chain from USB Privilege Escalation
InTouch Machine Edition 8.1 SP1 – ‘Nombre del Tag' Buffer Overflow (SEH)
XML External Entity Injection – Explanation and Exploitation
Sony PlayStation Vita 3.65 / 3.67 / 3.68 – ‘h-encore' kernel and user modifications
Bayanno Hospital Management System 4.0 – Cross-Site Scripting
HTML5 Video Player 1.2.5 – Denial of Service (PoC)
Microsoft .NET Framework EoP-MS15-118
SocuSoft iPod Photo Slideshow 8.05 – Buffer Overflow (SEH)
Our Standard Office Hours
Monday – Friday: 8:00AM – 5:00PM EDT
Saturday – Sunday: Closed
Where to Find Us
Data Privacy Notice
- – All product names, logos, and brands are property of their respective owners.
- – The use of these names, logos, and brands is for identification purposes only and does not imply endorsement.
- – Content syndication and aggregation of public information is solely for the purpose of identifying information security trends, all syndicated content contains source links to the content creator website. All content is owned by it’s respective content creators.
- – If you are an owner of some content and want it to be removed, please email firstname.lastname@example.org