{"uuid": "e9b178c7-5d28-4290-9db7-68c357b45f01", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2017-15944", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/119", "content": "#exploit\nInformation security vulnerabilities:\n\n1. CVE-2018-3608:\nVulnerability in Trend Micro Maximum Security's 2018 (&gt;=12.0.1191) User-Mode Hooking driver could allow an attacker to create a specially crafted packet that could alter a vulnerable system in such a way that malicious code could be injected into other processes\nhttps://github.com/ZhiyuanWang-Chengdu-Qihoo360/Trend_Micro_POC\n\n2. CVE-2017-15944:\nPalo Alto Networks firewalls Remote RCE\nhttps://seclists.org/fulldisclosure/2017/Dec/38\n\n3. CVE-2018-8550:\nMS Windows 10 1803 - DfMarshal Unsafe Unmarshaling Privilege Escalation\nhttps://www.exploit-db.com/exploits/45893", "creation_timestamp": "2024-05-24T06:39:44.000000Z"}