Privilege escalation

Results: 82



#Item
1

Extreme Privilege Escalation on Windows 8/UEFI Systems Corey Kallenberg Xeno Kovah John Butterworth Sam Cornwell

Add to Reading List

Source URL: www.blackhat.com

Language: English - Date: 2015-05-28 15:51:02
    2

    Siemens Security Advisory by Siemens ProductCERT SSA: Local Privilege Escalation in Industrial Products Publication DateLast Update

    Add to Reading List

    Source URL: www.siemens.com

    - Date: 2016-12-21 05:48:35
      3Computing / Software / Computer architecture / Smartphones / Android / Mobile security / Qualcomm / Rooting / BlackBerry Priv / Computer security / Linux kernel / Privilege escalation

      QUADROOTER NEW VULNERABILITIES AFFECTING OVER 900 MILLION ANDROID DEVICES by the Check Point Research Team INTRODUCTION The cloak-and-dagger of cybercrime makes for entertaining theater.

      Add to Reading List

      Source URL: www.checkpoint.com

      Language: English - Date: 2016-08-05 12:48:52
      4Web browsers / Pwn2Own / Hacking / Vulnerability / Safari / Heap spraying / Google Chrome / Exploit / Buffer overflow / Arbitrary code execution / Internet Explorer / Privilege escalation

      $hell on Earth: From Browser to System Compromise Matt Molinyawe, Abdul-Aziz Hariri, and Jasiel Spelman A Zero Day Initiative Research Paper

      Add to Reading List

      Source URL: documents.trendmicro.com

      Language: English - Date: 2016-08-03 12:08:47
      5Cyberwarfare / Rootkit / Privilege escalation / Unified Extensible Firmware Interface / Vulnerability / Computer security / Arbitrary code execution / Exploit / Mitre Corporation / BIOS / Windows 8 / Mitre

      Extreme Privilege Escalation on Windows 8/UEFI Systems

      Add to Reading List

      Source URL: www.mitre.org

      Language: English - Date: 2014-08-06 10:41:42
      6

      Privilege Escalation via Antivirus Software A security vulnerability in the software component McAfee Security Agent, which is part of the antivirus software McAfee VirusScan Enterprise, can be leveraged in attacks again

      Add to Reading List

      Source URL: www.syss.de

      Language: English - Date: 2014-09-03 07:21:19
        7Cyberwarfare / Code injection / Machine code / Return-oriented programming / Privilege escalation / Uncontrolled format string / Computer security / Virtualization

        I Control Your Code Attack Vectors through the Eyes of Software-based Fault Isolation Mathias Payer <>

        Add to Reading List

        Source URL: hexhive.github.io

        Language: English - Date: 2016-06-13 11:08:40
        8Software maintenance / Software release / Patch / Dynamic software updating / Common Vulnerabilities and Exposures / Binary translation / Linux kernel / Sandbox / Privilege escalation / Windows XP / Android / Shellshock

        Hot-Patching a Web Server: a Case Study of ASAP Code Repair Mathias Payer Thomas R. Gross

        Add to Reading List

        Source URL: hexhive.github.io

        Language: English - Date: 2016-06-13 11:08:40
        9

        Two for One: Microsoft Office Encapsulated PostScript and Windows Privilege Escalation Zero-Days FireEye recently uncovered an attack exploiting two previously unknown vulnerabilities, one in Microsoft Office (CVE

        Add to Reading List

        Source URL: www.fireeye.com

        Language: English - Date: 2015-09-08 16:29:39
          10FreeBSD / Qmail / Privilege escalation / Computer security / Berkeley Software Distribution / Kernel / Exploit / Linux kernel / Software bug

          What is a Security Flaw? Colin Percival Colin Percival

          Add to Reading List

          Source URL: www.daemonology.net

          Language: English - Date: 2006-05-14 06:23:45
          UPDATE