Вы используете устаревший браузер. Этот и другие сайты могут отображаться в нём некорректно. Вам необходимо обновить браузер или попробовать использовать другой.
Android - Inter-Process munmap due to Race Condition in ashmem
The MemoryIntArray class allows processes to share an in-memory array of integers backed by an "ashmem" file descriptor. As the class implements the Parcelable interface, it can be inserted into a Parcel, and optionally placed in a...
Microsoft Windows win32k - Using SetClassLong to Switch Between CS_CLASSDC and CS_OWNDC Corrupts DC Cache
Source: https://bugs.chromium.org/p/project-zero/issues/detail?id=1389&desc=6
Windows maintains a DC cache in win32kbase!gpDispInfo->pdceFirst. If you create multiple windows from a...
Linux Kernel < 4.4.0-83 / < 4.8.0-58 (Ubuntu 14.04/16.04) - Local Privilege Escalation (KASLR / SMEP)
// A proof-of-concept local root exploit for CVE-2017-1000112.
// Includes KASLR and SMEP bypasses. No SMAP bypass.
// Tested on Ubuntu trusty 4.4.0-* and Ubuntu xenial 4-8-0-* kernels.
//
//...
Apple macOS - IOHIDSystem Kernel Read/Write
Sources:
https://siguza.github.io/IOHIDeous/
https://github.com/Siguza/IOHIDeous/
IOHIDeous
A macOS kernel exploit based on an IOHIDFamily 0day.
Write-up here: https://siguza.github.io/IOHIDeous/
Notice
The prefetch timing attack I'm using for hid...
SysGauge Server 3.6.18 - Denial of Service
# Exploit Title: SysGauge Server 3.6.18 - DOS
# Date: 2017-10-20
# Exploit Author: Ahmad Mahfouz
# Software Link: hhttp://www.sysgauge.com/setups/sysgaugesrv_setup_v3.6.18.exe
# Version: v3.6.18
# Category; Windows Remote DOS
# CVE: CVE-2017-15667
#...
Microsoft Windows Kernel - 'NtQueryVirtualMemory(MemoryMappedFilenameInformation)' Double-Write Ring-0 Address Leak
/*
Source: https://bugs.chromium.org/p/project-zero/issues/detail?id=1456
We have discovered that it is possible to disclose addresses of kernel-mode Paged Pool allocations via...
Microsoft Windows - 'jscript!JsArraySlice' Uninitialized Variable
<!--
Source: https://bugs.chromium.org/p/project-zero/issues/detail?id=1378
There is an uninitialized variable vulnerability in jscript.dll. This issue could potentially be exploited through multiple vectors:
- By opening a...
Microsoft Windows - 'jscript!RegExpFncObj::LastParen' Out-of-Bounds Read
<!--
Source: https://bugs.chromium.org/p/project-zero/issues/detail?id=1382
There is an out-of-bounds read in jscript.dll library (used in IE, WPAD and other places):
PoC for IE (note: page heap might be required to...
Intel Content Protection HECI Service - Type Confusion Privilege Escalation
Source: https://bugs.chromium.org/p/project-zero/issues/detail?id=1358
Intel Content Protection HECI Service Type Confusion EoP
Platform: Tested on Windows 10, service version 9.0.2.117
Class: Elevation of Privilege...
Microsoft Internet Explorer 11 - 'jscript!JSONStringifyObject' Use-After-Free
<!--
Source: https://bugs.chromium.org/p/project-zero/issues/detail?id=1381
There is a use-after-free in jscript.dll library that can be exploited in IE11.
PoC:
=========================================
-->
<!--...