• Earn real money by being active: Hello Guest, earn real money by simply being active on the forum — post quality content, get reactions, and help the community. Once you reach the minimum credit amount, you’ll be able to withdraw your balance directly. Learn how it works.

object

  1. itsMe

    Reverse Engineering WinObjEx64 v2.0 - Windows Object Explorer 64-bit

    WinObjEx64 is an advanced utility that lets you explore the Windows Object Manager namespace. For certain object types, you can double-click on it or use the “Properties…” toolbar button to get more information, such as description, attributes, resource usage etc. It let you view and edit...
  2. itsMe

    Reverse Engineering WinObjEx64 v1.9.3 - Windows Object Explorer 64-bit

    WinObjEx64 is an advanced utility that lets you explore the Windows Object Manager namespace. For certain object types, you can double-click on it or use the “Properties…” toolbar button to get more information, such as description, attributes, resource usage etc. It let you view and edit...
  3. itsMe

    Reverse Engineering WinObjEx64 v1.9.2 - Windows Object Explorer 64-bit

    WinObjEx64 is an advanced utility that lets you explore the Windows Object Manager namespace. For certain object types, you can double-click on it or use the “Properties…” toolbar button to get more information, such as description, attributes, resource usage etc. It let you view and edit...
  4. itsMe

    Reverse Engineering WinObjEx64 v1.9.1 - Windows Object Explorer 64-bit

    WinObjEx64 is an advanced utility that lets you explore the Windows Object Manager namespace. For certain object types, you can double-click on it or use the “Properties…” toolbar button to get more information, such as description, attributes, resource usage etc. It let you view and edit...
  5. itsMe

    Reverse Engineering WinObjEx64 v1.9 - Windows Object Explorer 64-bit

    WinObjEx64 is an advanced utility that lets you explore the Windows Object Manager namespace. For certain object types, you can double-click on it or use the “Properties…” toolbar button to get more information, such as description, attributes, resource usage etc. It let you view and edit...
  6. itsMe

    Reverse Engineering WinObjEx64 v1.8.8 - Windows Object Explorer 64-bit

    WinObjEx64 is an advanced utility that lets you explore the Windows Object Manager namespace. For certain object types, you can double-click on it or use the “Properties…” toolbar button to get more information, such as description, attributes, resource usage etc. It let you view and edit...
  7. itsMe

    Reverse Engineering WinObjEx64 v1.8.7 - Windows Object Explorer 64-bit

    WinObjEx64 is an advanced utility that lets you explore the Windows Object Manager namespace. For certain object types, you can double-click on it or use the “Properties…” toolbar button to get more information, such as description, attributes, resource usage etc. It let you view and edit...
  8. 1

    Exploits Microsoft Windows Insecure CSharedStream Object Privilege Escalation

    Microsoft Windows suffers from an insecure CSharedStream object privilege escalation vulnerability. View the full article
  9. 1

    Exploits SugarCRM 9.0.1 PHP Object Injection

    SugarCRM versions 9.0.1 and below suffer from multiple php object injection vulnerabilities. View the full article
  10. 1

    Exploits NSKeyedUnarchiver ObjC Object Use-After-Free

    NSKeyedUnarchiver suffers from a use-after-free vulnerability with ObjC objects when unarchiving OITSUIntDictionary instances even if secureCoding is required. View the full article
  11. 1

    Exploits Linux PTRACE_TRACEME Broken Permission / Object Lifetime Handling

    Linux suffers from broken permission and object lifetime handling for PTRACE_TRACEME. View the full article
  12. 1

    Exploits Safari Webkit Proxy Object Type Confusion

    This Metasploit module exploits a type confusion bug in the Javascript Proxy object in WebKit. The DFG JIT does not take into account that, through the use of a Proxy, it is possible to run arbitrary JS code during the execution of a CreateThis operation. This makes it possible to change the...
  13. 1

    Exploits Shopware createInstanceFromNamedArguments PHP Object Instantiation

    This Metasploit module exploits a php object instantiation vulnerability that can lead to remote code execution in Shopware. An authenticated backend user could exploit the vulnerability. The vulnerability exists in the createInstanceFromNamedArguments function, where the code insufficiently...
  14. 1

    Exploits Chrome ReadableStream Internal Object Leak

    Chrome suffers from an internal object leak vulnerability in ReadableStream. View the full article
  15. 1

    Exploits OpenMRS Platform Insecure Object Deserialization

    OpenMRS Platform versions prior to 2.24.0 suffers from an insecure object deserialization vulnerability. View the full article
  16. 1

    Exploits LongBox Limited Access Manager Insecure Direct Object Reference

    LongBox Limited Access Manager suffers from an insecure direct object reference vulnerability. This issue affects Access Manager versions 1.2 through 1.4-RG3. It has been addressed in versions greater than or equal to 1.4-RG4. View the full article
  17. 1

    Exploits PEAR Archive_Tar PHP Object Injection

    PEAR Archive_Tar versions prior to 1.4.4 suffers from a php object injection vulnerability. View the full article
  18. 1

    Exploits Safari Proxy Object Type Confusion

    This Metasploit module exploits a type confusion bug in the Javascript Proxy object in WebKit. The DFG JIT does not take into account that, through the use of a Proxy, it is possible to run arbitrary JS code during the execution of a CreateThis operation. This makes it possible to change the...
  19. 1

    Exploits Fortify SSC 17.10 / 17.20 / 18.10 User Detail Insecure Direct Object Reference

    Fortify Software Security Center versions 17.10, 17.20, and 18.10 suffer from an insecure direct object reference vulnerability related to extracting local and ldap users. View the full article
  20. 1

    Exploits Fortify SSC 17.10 / 17.20 / 18.10 Insecure Direct Object Reference

    Fortify Software Security Center versions 17.10, 17.20, and 18.10 suffer from an insecure direct object reference vulnerability. View the full article
Back
Top