• Earn real money by being active: Hello Guest, earn real money by simply being active on the forum — post quality content, get reactions, and help the community. Once you reach the minimum credit amount, you’ll be able to withdraw your balance directly. Learn how it works.

memory

  1. 1

    Exploits Microsoft Internet Explorer Windows 10 1809 17763.316 Memory Corruption

    Microsoft Internet Explorer Windows 10 1809 17763.316 scripting engine memory corruption exploit. View the full article
  2. 1

    Exploits iOS 12.1.3 cfprefsd Memory Corruption

    iOS version 12.1.3 cfprefsd memory corruption exploit. View the full article
  3. 1

    Exploits VBScript VbsErase Memory Corruption

    There is an issue in VBScript in the VbsErase function. In some cases, VbsErase fails to clear the argument variable properly, which can trivially lead to crafting a variable with the array type, but with a pointer controlled controlled by an attacker. View the full article
  4. 1

    Exploits SVG nanosvg Library Memory Corruption / Denial Of Service

    The SVG nanosvg library suffers from a denial of service vulnerability due to a memory corruption bug. View the full article
  5. 1

    Exploits FaceTime Texture Processing Memory Corruption

    FaceTime suffers from a memory corruption vulnerability in texture processing. View the full article
  6. 1

    Exploits KVM kvm_inject_page_fault Uninitialized Memory Leak

    KVM suffers from an uninitialized memory leak vulnerability in kvm_inject_page_fault. View the full article
  7. dEEpEst

    C/C++ Write \ Read Memory \\ С ++

    Hidden content
  8. 1

    Exploits Linux Kernel 4.4 rtnetlink Stack Memory Disclosure

    Linux kernel version 4.4 rtnetlink stack memory disclosure exploit. View the full article
  9. dEEpEst

    C# RunPE In Memory

    RunPE-In-Memory Run a 32bit copy of Exe File in memory,like what Software Packer Do. Hidden content
  10. 1

    Exploits XNU POSIX Shared Memory Mapping Issue

    XNU POSIX has an issue where shared memory mapping have an incorrect maximum protection. View the full article
  11. dEEpEst

    Reverse Engineering & Memory patching

    Hidden content
  12. 1

    Exploits ImageMagick Memory Leak

    ImageMagick versions prior to 7.0.8-9 suffers from a memory leak vulnerability. View the full article
  13. 1

    Exploits FaceTime VCPDecompressionDecodeFrame Memory Corruption

    There is a heap corruption vulnerability in VCPDecompressionDecodeFrame which is called by FaceTime. This bug can be reached if a user accepts a call from a malicious peer. View the full article
  14. 1

    Exploits WhatsApp 2.18.61 Memory Corruption

    WhatsApp version 2.18.61 suffers from a memory corruption vulnerability. View the full article
  15. 1

    Exploits Wayland wl_connection_demarshal() Out-Of-Bounds Memory Access

    Wayland suffers from an out-of-bounds memory access vulnerability in wl_connection_demarshal() on 32-bit systems. View the full article
  16. 1

    Exploits Ghostscript Command Execution / File Disclosure / Memory Corruption

    Ghostscript suffers from file disclosure, shell command execution, memory corruption, and type confusion bugs. View the full article
  17. dEEpEst

    C/C++ MemoryPEInjector

    README.md Memory PE Injector A tool that reads a PE file from a byte array buffer and injects it into memory. Symmary Memory PE Injector is a C++ class which reads an executable file (PE) from a byte array and maps it into the memory space of another process. This is commonly...
Back
Top