Смотрите также связанные темы 18.03.2018 Honeywell HSC Remote Deployer ActiveX Remote Code Execution ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit # Framework web site for more information on licensing and terms of use. # http://metasploit.com/framework/ ## require 'msf/core' class Metasploit3 < Msf::Exploit::Remote Rank = ExcellentRanking include Msf::Exploit::Remote::HttpServer::HTML include Msf::Exploit::EXE def initialize(info={}) super(update_info(info, ...
01.07.2018 Разработка эксплоитов для Linux. Часть III - переполнение буфера с помощью ret2libc В данном руководстве будет продемонстрирована эксплуатация переполнения буфера с помощью ret2libc.
04.04.2018 Переполнение буфера: анатомия эксплоита Взгляд на то, как эксплуатируются уязвимости систем и почему существуют эксплоиты.
21.06.2018 Protecting Against Application-Specific Attacks We’ve seen an evolution from mass-mailing viruses to more targeted attacks and threats targeting OS vulnerabilities moving to attacks against applications. We’ve seen growth in attacks targeting systems that contain valuable data, including mission-critical enterprise applications sitting in virtual environments, SAP solution-based environments and storage systems. Companies must take these threats seriously and look for [...]
04.06.2018 Kerio Executive to Lead Mobile Email Session at Microsoft Tech-Ed North America 2008 IT Professionals Conference SAN JOSE, CA--(Marketwire - June 4, 2008) - Kerio Technologies, Inc., a provider of award-winning internet security and messaging software, today announced it will lead a Birds-of-a-Feather session at Tech-Ed North America 2008 IT Professionals Conference. Attendees will learn how to have a collaboration-centric enterprise infrastructure that has the freedom to choose virtually any email and calendar application and be able to synchronize data throughout the organization.
WHAT: Birds-of-a-Feather (BOF) Session titled, "Extending the Desktop to Mobile Devices Anytime, Anywhere"
WHO: Chris Pel...
31.01.2018 CVE-2016-1930 Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 44.0 and Firefox ESR 38.x before 38.6 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
07.02.2018 CVE-2015-6398 Cisco Nexus 9000 Application Centric Infrastructure (ACI) Mode switches with software before 11.0(1c) allow remote attackers to cause a denial of service (device reload) via an IPv4 ICMP packet with the IP Record Route option, aka Bug ID CSCuq57512.
18.08.2018 CVE-2008-3704 Stack-based buffer overflow in the MaskedEdit ActiveX control in Msmask32.ocx 6.0.81.69, and possibly other versions before 6.0.84.18, in Microsoft Visual Studio 6.0 allows remote attackers to execute arbitrary code via a long Mask parameter, as exploited in the wild in August 2008. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information.
14.08.2018 Microsoft Visual Studio (Msmask32.ocx) ActiveX Remote BOF PoC Цель: Microsoft Visual Studio 6.0 Воздействие: Отказ в обслуживании
11.08.2018 WebEx Meeting Manager 'atucfobj.dll' ActiveX Control Remote Buffer Overflow PoC Цель: WebEx Meeting Manager Воздействие: Выполнение произвольного кода
|