1. Reverse Engineering >
  2. Sicherheitslücken >
  3. Proof of Concept >
  4. [local] RM Downloader 2.50.60 2006.06.23 - 'Load' Local Buffer Overflow (EggHunter) (SEH) (PoC)

ArabicEnglishFrenchGermanGreekItalianJapaneseKoreanPersianPolishPortugueseRussianSpanishTurkishVietnamese

[local] RM Downloader 2.50.60 2006.06.23 - 'Load' Local Buffer Overflow (EggHunter) (SEH) (PoC)


PoC vom | Direktlink: exploit-db.com Nachrichten Bewertung

RM Downloader 2.50.60 2006.06.23 - 'Load' Local Buffer Overflow (EggHunter) (SEH) (PoC)...
https://www.exploit-db.com/exploits/48628

Externe Quelle mit kompletten Inhalt anzeigen


Zur Startseite von Team IT Security

➤ Weitere Beiträge von Team Security | IT Sicherheit

Diving Deep Into a Pwn2Own Winning WebKit Bug

vom 444.07 Punkte ic_school_black_18dp
Pwn2Own Tokyo just completed, and it got me thinking about a WebKit bug used by the team of Fluoroacetate (Amat Cama and Richard Zhu) at this year’s Pwn2Own in Vancouver. It was a part of the chain that earned them $55,000 and was a nifty piece of

Another country-sponsored #malware: Vietnam APT Campaign

vom 229.09 Punkte ic_school_black_18dp
The background This is a team work analysis, we have at least 5 (five) members involved with this investigation. The case that is about to be explained here is an APT case. Until now, we were (actually) avoiding APT cases for publicity in Malware Must Die

Another country-sponsored #malware: Vietnam APT Campaign

vom 229.09 Punkte ic_school_black_18dp
The background This is a team work analysis, we have at least 5 (five) members involved with this investigation. The case that is about to be explained here is an APT case. Until now, we were (actually) avoiding APT cases for publicity in Malware Must Die

CVE-2020-0729: Remote Code Execution Through .LNK Files

vom 213.5 Punkte ic_school_black_18dp
In this excerpt of a Trend Micro Vulnerability Research Service vulnerability report, John Simpson and Pengsu Cheng of the Trend Micro Research Team detail a recent remote code execution bug in Microsoft Windows .LNK files. The following is a portion of

Resource-Counter - This Command Line Tool Counts The Number Of Resources In Different Categories Across Amazon Regions

vom 201.97 Punkte ic_school_black_18dp
This command line tool counts the number of resources in different categories across Amazon regions. This is a simple Python app that will count resources across different regions and display them on the command line. It first shows the dictionary of the results for the monitored services on a per-region basis, then it shows totals across all regions in a friendlier format. It tries to use the most-efficie

ZDI-20-709: Heap Overflow in the NETGEAR Nighthawk R6700 Router

vom 201.15 Punkte ic_school_black_18dp
Pwn2Own competitions often inspire people to research products and technologies, even if the researcher does not actively participate in the contest. Such is the case here, where the security researcher known as d4rkn3ss took a closer look at one of

DirectX to the Kernel

vom 201.1 Punkte ic_school_black_18dp
The operating system kernel is the final goal for every great exploit chain. You can look at the entries in the Zero Day Initiative (ZDI) Pwn2Own contests over the years to see that process at work. The Windows kernel has been subject to many points of

Wipe Out! Hanging (More Than) Ten On Your Old Belkin SURF Router

vom 191.11 Punkte ic_school_black_18dp
In June 2019, we released a blog post on setting up hardware debugging on the Belkin SURF N300 router. In this blog, we are going to examine more than 10 vulnerabilities reported by Josep Pi Rodriguez and Pedro Guillén Núñez on this platform. Belk

CVE-2020-0932: Remote Code Execution on Microsoft SharePoint Using TypeConverters

vom 175.43 Punkte ic_school_black_18dp
In April 2020, Microsoft released four Critical and two Important-rated patches to fix remote code execution bugs in Microsoft SharePoint. All these are deserialization bugs. Two came through the ZDI program from an anonymous researcher: CVE-2020-0931

Analyzing a Trio of Remote Code Execution Bugs in Intel Wireless Adapters

vom 174.23 Punkte ic_school_black_18dp
Earlier this month, we published three memory corruption bugs (ZDI-20-494, ZDI-20-495, and ZDI-20-496 - collectively referred to as CVE-2020-0558) affecting two Windows Wi-Fi drivers for various Intel dual-band wireless adapters. According to the vendor, these drivers are

CVE-2020-7460: FreeBSD Kernel Privilege Escalation

vom 165.09 Punkte ic_school_black_18dp
In August, an update to FreeBSD was released to address a time-of-check to time-of-use (TOCTOU) bug that could be exploited by an unprivileged malicious userspace program for privilege escalation. This vulnerability was reported to the ZDI program by

Trivy - A Simple And Comprehensive Vulnerability Scanner For Containers, Suitable For CI

vom 164.12 Punkte ic_school_black_18dp
A Simple and Comprehensive Vulnerability Scanner for Containers, Suitable for CI.AbstractTrivy (tri pronounced like trigger, vy pronounced like envy) is a simple and comprehensive vulnerability scanner for containers. A software vulnerability is a glitch, flaw, or weakness present in the software or in an Operating System. Trivy detects vulnerabilities of OS packages (A

Team Security Diskussion über [local] RM Downloader 2.50.60 2006.06.23 - 'Load' Local Buffer Overflow (EggHunter) (SEH) (PoC)