The PhishingAlert of Safari stops functioning in Windows systems if an abnormal URL is being used.
79d05414fca80bf21d6c2eb1c842e21bb4fd3ab573ff1e90f90b60fa32541ebb
Amazon Web Services Elastic Beanstalk suffers from a code execution vulnerability.
9627d5239332fca927a6137f308067102214ba471ccb72e6c5da1b446bc2f5dc
phpMyAdmin suffers from a remote arbitrary file reading vulnerability when using a simplexml_load_string function meant to read xml from user input.
e9107c1ea9ecd076a0b594c54978d18ecaa5e210966639afd6ab79b6715853a9
This Metasploit module exploits a memory trust issue in the Microsoft WMI Administration tools ActiveX control. When processing a specially crafted HTML page, the WEBSingleView.ocx ActiveX Control (1.50.1131.0) will treat the 'lCtxHandle' parameter to the 'AddContextRef' and 'ReleaseContext' methods as a trusted pointer. It makes an indirect call via this pointer which leads to arbitrary code execution. This exploit utilizes a combination of heap spraying and the .NET 2.0 'mscorie.dll' module to bypass DEP and ASLR. This Metasploit module does not opt-in to ASLR. As such, this module should be reliable on all Windows versions.
2fbd749099ccbb1eb6187af91f72d8f6bdafd96cce71ee281207ddc8baca9110
WMITools active-x remote command execution exploit.
6b0a484e631d95cf807c1c83d42fe96b172b70ef9a1ca18fd64b8e1550aeee80
This Metasploit module exploits a memory corruption vulnerability within Microsoft's HTML engine (mshtml). When parsing an HTML page containing a recursive CSS import, a C++ object is deleted and later reused. This leads to arbitrary code execution.
12a12d587013ccc439d5dea27c029bf2ab86f019a399cc8e641060289dc1aa2f