0day.today - Dunyanin En Buyuk Exploit Veritabani
Bu konuda bilmeniz gerekenler:
Biz sadece bir adet ana domain kullaniyoruz DOMAIN_LINK
Eger exploit satin alacaksaniz ve ya hizmet icin odeme yapacaksaniz, altin almaniz gerekmekte. Biz sitemizi hack amacli kullanmak istemiyoruz, yani her turlu dogru olmayan, kanunsuz ve illegal yapilan eylemler diger hesaplari olumsuz yonde etkileyebilir ve sonrasinda buna yol acan/lar, web sitelerimize ve verilere erisimi tamamen kesilir, banlanir ve hesabini tarafimizca yok edilir.
Sadece bu sitenin yonetimine itibar edin. Sahtelere Dikkat!
Biz sadece bir adet ana domain kullaniyoruz DOMAIN_LINK
Eger exploit satin alacaksaniz ve ya hizmet icin odeme yapacaksaniz, altin almaniz gerekmekte. Biz sitemizi hack amacli kullanmak istemiyoruz, yani her turlu dogru olmayan, kanunsuz ve illegal yapilan eylemler diger hesaplari olumsuz yonde etkileyebilir ve sonrasinda buna yol acan/lar, web sitelerimize ve verilere erisimi tamamen kesilir, banlanir ve hesabini tarafimizca yok edilir.
Sadece bu sitenin yonetimine itibar edin. Sahtelere Dikkat!
We DO NOT use Telegram or any messengers / social networks!
Please, beware of scammers!
Please, beware of scammers!
- Oku [ anlasma ]
- Oku [ Gonder ] kurallar
- Ziyaret et [ SSS ] page
- [ Uye Ol ] profil
- [ FIYAT ]
- Eger istiyorsaniz [ satmak ]
- Eger istiyorsaniz [ almak ]
- Eger kaybederseniz [ Hesap ]
- Herhangi bir sorunuz [ [email protected] ]
- Yetkili sayfa
- Uyelik sayfasi
- Hesap sayfasini geri yukle
- SSS sayfasi
- Iletisim sayfasi
- Paylasim kurallari
- Anlasma sayfasi
Mail:
Facebook:
Twitter:
Telegram:
We DO NOT use Telegram or any messengers / social networks!
Bize ulasabilirsiniz:
Mail:
Facebook:
Twitter:
Telegram:
We DO NOT use Telegram or any messengers / social networks!
Google Chrome RCE + Sandbox Escape 0day Exploit
[ 0Day-ID-28071 ]
Full Baslik
Google Chrome RCE + Sandbox Escape 0day Exploit
[ Highlight ]
Highlight - is paid service, that can help to get more visitors to your material.
Price:
Price:
Eklenme Tarihi
Kategori
Platform
Dogrulanma
Fiyat
0.081 BTC
5 200 USD
Risk
[
Security Risk Critical
]Rel. releases
Tanim
1. Item name: Google Chrome RCE + Sandbox Escape 0day Exploit
2. Affected OS : Windows 10
3. Vulnerable Target application versions and reliability. If 32 bit only,
is 64 bit vulnerable?
The vulnerability is present in the 32-bit and 64-bit versions of Google Chrome.
With this vulnerability, you can Remote Code Execute and Sandbox Escape in the target system.
4. Tested, functional against target application versions, list complete
point release range.
Tested on Google Chrome 50.0.2661 (x86 & x64) and up to last versions, Windows 10 x86 & x64 (1507 up to 1703).
5. Does this exploit affect the current target version?
[X] Yes
[ ] No
6. Privilege Level Gained
[ ] As logged in user (Select Integrity level below for Windows)
[ ] Web Browser's default (IE - Low, Others - Med)
[ ] Low
[X] Medium
[ ] High
[ ] Root, Admin or System
[ ] Ring 0/Kernel
7. Minimum Privilege Level Required For Successful PE
[X] As logged in user (Select Integrity level below for Windows)
[ ] Low
[ ] Medium
[ ] High
8. Exploit Type (select all that apply)
[X] Remote code execution
[ ] Privilege escalation
[ ] Font based
[X] Sandbox escape
[ ] Information disclosure (peek)
[ ] Code signing bypass
[ ] Persistency
9. Delivery Method
[X] Via web page
[ ] Via file
[ ] Via network protocol
[ ] Local privilege escalation
10. Bug Class
[X] memory corruption
[ ] design/logic flaw (auth-bypass / update issues)
[ ] input validation flaw (XSS/XSRF/SQLi/command injection, etc.)
[ ] misconfiguration
[ ] information disclosure
[ ] cryptographic bug
[ ] denial of service
11. Exploitation Parameters
[X] Bypasses ASLR
[X] Bypasses DEP / W ^ X
[ ] Bypasses SMEP/PXN
[X] Bypasses EMET Version 5.52±
[ ] Bypasses CFG (Win 8.1)
12. Does it require additional work to be compatible with arbitrary payloads?
[X] Yes
[ ] No
2. Affected OS : Windows 10
3. Vulnerable Target application versions and reliability. If 32 bit only,
is 64 bit vulnerable?
The vulnerability is present in the 32-bit and 64-bit versions of Google Chrome.
With this vulnerability, you can Remote Code Execute and Sandbox Escape in the target system.
4. Tested, functional against target application versions, list complete
point release range.
Tested on Google Chrome 50.0.2661 (x86 & x64) and up to last versions, Windows 10 x86 & x64 (1507 up to 1703).
5. Does this exploit affect the current target version?
[X] Yes
[ ] No
6. Privilege Level Gained
[ ] As logged in user (Select Integrity level below for Windows)
[ ] Web Browser's default (IE - Low, Others - Med)
[ ] Low
[X] Medium
[ ] High
[ ] Root, Admin or System
[ ] Ring 0/Kernel
7. Minimum Privilege Level Required For Successful PE
[X] As logged in user (Select Integrity level below for Windows)
[ ] Low
[ ] Medium
[ ] High
8. Exploit Type (select all that apply)
[X] Remote code execution
[ ] Privilege escalation
[ ] Font based
[X] Sandbox escape
[ ] Information disclosure (peek)
[ ] Code signing bypass
[ ] Persistency
9. Delivery Method
[X] Via web page
[ ] Via file
[ ] Via network protocol
[ ] Local privilege escalation
10. Bug Class
[X] memory corruption
[ ] design/logic flaw (auth-bypass / update issues)
[ ] input validation flaw (XSS/XSRF/SQLi/command injection, etc.)
[ ] misconfiguration
[ ] information disclosure
[ ] cryptographic bug
[ ] denial of service
11. Exploitation Parameters
[X] Bypasses ASLR
[X] Bypasses DEP / W ^ X
[ ] Bypasses SMEP/PXN
[X] Bypasses EMET Version 5.52±
[ ] Bypasses CFG (Win 8.1)
12. Does it require additional work to be compatible with arbitrary payloads?
[X] Yes
[ ] No
Other Information
Abuses
0
Yorumlar
7
Goruntulemeler
21 391
We DO NOT use Telegram or any messengers / social networks! Please, beware of scammers!
OR
0
0
Verified by
Verified by
This material is checked by Administration and absolutely workable.
This material is checked by Administration and absolutely workable.
Learn more about FIYAT:
0day.today Gold is the currency of 0day.today project and is denoted on this site as such image: . It used for paying for the services, buying exploits, earning money, etc
Kabul ediyorum:
BitCoin (BTC)
You can pay us via BTC
You can pay us via BTC
LiteCoin (LTC)
You can pay us via LTC
You can pay us via LTC
Ethereum (ETH)
You can pay us via ETH
You can pay us via ETH
[ Yorumlar: 7 ]
Terms of use of comments:
- Users are forbidden to exchange personal contact details
- Haggle on other sites\projects is forbidden
- Reselling is forbidden
Yorumunuz eklenmedi, cunki hesabiniz engellenmistir.
Yorumunuz eklenmedi, cunki hesabiniz engellenmistir.