This module exploits a vulnerability in Microsoft Windows MRXDAV.SYS driver. This vulnerability allows a local attacker to execute arbitrary code with SYSTEM privileges in a vulnerable target.
This module exploits a vulnerability in the Linux kernel related to the netfilter target_offset field. This vulnerability can be exploited by a local unprivileged attacker to gain root privileges.
Internet Explorer is prone to a use-after-free vulnerability when trying to access the ArrayBuffer that was backing a Typed Array after it has been detached by transferring it to a Web Worker by calling the postMessage() function.
This vulnerability can be abused by an attacker to execute arbitrary code on systems running vulnerable versions of Internet Explorer.
This vulnerability can be abused by an attacker to execute arbitrary code on systems running vulnerable versions of Internet Explorer.
The vulnerability is caused due to the application loading a library
(riched20.dll.dll) in an insecure manner. This can be exploited to
load arbitrary libraries by tricking a user into e.g. opening a e.g.
".pcap" file located on a remote WebDAV or SMB share.
(riched20.dll.dll) in an insecure manner. This can be exploited to
load arbitrary libraries by tricking a user into e.g. opening a e.g.
".pcap" file located on a remote WebDAV or SMB share.
Action Pack in Ruby on Rails allows remote attackers to execute arbitrary Ruby code by leveraging an application's unrestricted use of the render method.
The vulnerability is caused due to a boundary error when handling the
"akey" POST parameter related to /goform/activate_doit, which can be
exploited to cause a stack-based buffer overflow via a specially
crafted HTTP request.
"akey" POST parameter related to /goform/activate_doit, which can be
exploited to cause a stack-based buffer overflow via a specially
crafted HTTP request.
JBoss Application Server is prone to a remote vulnerability due to deserialization of untrusted inputs, allowing attackers to instantiate arbitrary java objects leading to remote code execution.
This vulnerability affects the EJBInvokerServlet component of the server.
This vulnerability affects the EJBInvokerServlet component of the server.
The vulnerability resides in parsing crafted Microsoft PowerPoint documents and produces a buffer overflow in the stack, leading to a privilege escalation to System.
This module exploits a vulnerability in Windows Netbios cache by flooding crafted NBNS responses.
RESTWS alters the default page callbacks for entities to provide additional functionality. A vulnerability in this approach allows an unauthenticated attacker to send specially crafted requests resulting in arbitrary PHP execution.
Pagination
- Previous page
- Page 63
- Next page