{"uuid": "3fc48745-ab01-4999-873b-ff0e7b3be2a0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2018-8550", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/119", "content": "#exploit\nInformation security vulnerabilities:\n\n1. CVE-2018-3608:\nVulnerability in Trend Micro Maximum Security's 2018 (&gt;=12.0.1191) User-Mode Hooking driver could allow an attacker to create a specially crafted packet that could alter a vulnerable system in such a way that malicious code could be injected into other processes\nhttps://github.com/ZhiyuanWang-Chengdu-Qihoo360/Trend_Micro_POC\n\n2. CVE-2017-15944:\nPalo Alto Networks firewalls Remote RCE\nhttps://seclists.org/fulldisclosure/2017/Dec/38\n\n3. CVE-2018-8550:\nMS Windows 10 1803 - DfMarshal Unsafe Unmarshaling Privilege Escalation\nhttps://www.exploit-db.com/exploits/45893", "creation_timestamp": "2024-05-24T06:39:44.000000Z"}