Смотрите также связанные темы 01.07.2018 Разработка эксплоитов для Linux. Часть III - переполнение буфера с помощью ret2libc В данном руководстве будет продемонстрирована эксплуатация переполнения буфера с помощью ret2libc.
04.04.2018 Переполнение буфера: анатомия эксплоита Взгляд на то, как эксплуатируются уязвимости систем и почему существуют эксплоиты.
09.10.2018 Three-Quarters of Internet Users Can’t Recognize an Online Threat, Kaspersky Lab’s Quiz Shows Kaspersky Lab has found that three-quarters (74%) of Internet users would download a potentially malicious file, because they lack the ‘cyber-savviness’ they need to spot dangers online
27.02.2018 CVE-2016-2521 Untrusted search path vulnerability in the WiresharkApplication class in ui/qt/wireshark_application.cpp in Wireshark 1.12.x before 1.12.10 and 2.0.x before 2.0.2 on Windows allows local users to gain privileges via a Trojan horse riched20.dll.dll file in the current working directory, related to use of QLibrary.
13.03.2018 CVE-2016-1963 The FileReader class in Mozilla Firefox before 45.0 allows local users to gain privileges or cause a denial of service (memory corruption) by changing a file during a FileReader API read operation.
14.08.2018 CVE-2008-3699 The MagnatuneBrowser::listDownloadComplete function in magnatunebrowser/magnatunebrowser.cpp in Amarok before 1.4.10 allows local users to overwrite arbitrary files via a symlink attack on the album_info.xml temporary file.
14.08.2018 CVE-2008-3683 Unspecified vulnerability in the FTP subsystem in Sun Java System Web Proxy Server 4.0 through 4.0.5 before SP6 allows remote attackers to cause a denial of service (failure to accept connections) via unknown vectors, probably related to exhaustion of file descriptors.
19.08.2018 CVE-2008-3707 Multiple PHP remote file inclusion vulnerabilities in CyBoards PHP Lite 1.21 allow remote attackers to execute arbitrary PHP code via a URL in the script_path parameter to (1) flat_read.php, (2) post.php, (3) process_post.php, (4) process_search.php, (5) forum.php, (6) process_subscribe.php, (7) read.php, (8) search.php, (9) subscribe.php in path/; and (10) add_ban.php, (11) add_ban_form.php, (12) add_board.php, (13) add_vip.php, (14) add_vip_form.php, (15) copy_ban.php, (...
12.08.2018 (MS08-051) Vulnerabilities in Microsoft PowerPoint Could Allow Remote Code Execution (949785) This security update resolves three privately reported vulnerabilities in Microsoft Office PowerPoint and Microsoft Office PowerPoint Viewer that could allow remote code execution if a user opens a specially crafted PowerPoint file.
12.08.2018 (MS08-044) Vulnerabilities in Microsoft Office Filters Could Allow Remote Code Execution (924090) These vulnerabilities could allow remote code execution if a user viewed a specially crafted image file using Microsoft Office.
|