[ authorization ] [ registration ] [ Восстановление ]
Свяжитесь с нами
Вы можете связаться с нами по:
0day.today   магазин эксплоитов и 0day база данных эксплоитов

Windows 10 RCE (Sendbox Escape/Bypass ASLR/Bypass DEP) 0day Exploit

[ 0Day-ID-28363 ]
Полное название
Windows 10 RCE (Sendbox Escape/Bypass ASLR/Bypass DEP) 0day Exploit [ Highlight ]
Highlight - is paid service, that can help to get more visitors to your material.

Price:
Дата добавления
Категория
Платформа
Проверен
Цена
 
0.095 BTC

 
6 000 USD
Риск
[
Security Risk Critical
]
Rel. releases
Описание
1. Affected OS: Windows 10 x86 x64

2 Vulnerable Target application versions and reliability. If 32 bit only,
is 64 bit vulnerable?
The vulnerability is present in the 32-bit and 64-bit versions
of Windows 10 (1507, 1511, 1607, 1703). With this vulnerability, you can
remote code execute in the target system via аny browser.


3. Tested, functional against target application versions, list complete
point release range:
Windows 10 x86 & x64 (1507, 1511, 1607, 1703), Google Chrome 58.0.3029.110,
Mozilla Firefox 53.0.3, Opera 45.

4. Does this exploit affect the current target version?
[X] Yes
[ ] No

5. Exploit Type (select all that apply)
[X] Remote code execution
[ ] Privilege escalation
[ ] Font based
[X] Sandbox escape
[ ] Information disclosure (peek)
[ ] Code signing bypass
[ ] Persistency

6. Delivery Method
[X] Via web page
[ ] Via file
[ ] Via network protocol
[ ] Local privilege escalation

7. Bug Class
[X] memory corruption
[ ] design/logic flaw (auth-bypass / update issues)
[ ] input validation flaw (XSS/XSRF/SQLi/command injection, etc.)
[ ] misconfiguration
[ ] information disclosure
[ ] cryptographic bug
[ ] denial of service

8. Exploitation Parameters
[X] Bypasses ASLR
[X] Bypasses DEP / W ^ X
[ ] Bypasses SMEP/PXN
[X] Bypasses EMET Version 5.52±
[ ] Bypasses CFG (Win 8.1)

9. Does it require additional work to be compatible with arbitrary payloads?
[X] Yes
[ ] No

Тестирован на
Windows 10 x86 & x64 (1507, 1511, 1607, 1703), Google Chrome 58.0.3029.110, Mozilla Firefox 53.0.3, Opera 45.
Теги
Windows   10       RCE     Exploit     0day     Sandbox   Escape  
Other Information
Abuses
0
Комметариев
0
Просмотров
18 994
We DO NOT use Telegram or any messengers / social networks! We DO NOT use Telegram or any messengers / social networks! Please, beware of scammers!
Please login or register to buy exploit.
OR
Buy incognito
0
0
Verified by
Verified by
This material is checked by Administration and absolutely workable.
Learn more about    Gold:
0day.today Gold is the currency of 0day.today project and is denoted on this site as such image: . It used for paying for the services, buying exploits, earning money, etc
Мы принимаем:
BitCoin (BTC)
You can pay us via BTC
LiteCoin (LTC)
You can pay us via LTC
Ethereum (ETH)
You can pay us via ETH

Автор
BL
29
Эксплоиты
293
Читателей
103
[ Комметариев: 0 ]
Правила использования комментариев:
  • Пользователям запрещено обмениваться контактными данными
  • Торговля на других сайтах\проектах запрещена
  • Перепродажа запрещена.
Наказание: перманентная блокировка пользователя и его счета.

Вы не можете оставлять комментарии по тому что комментирование заблокировано.