Microsoft Windows win32k local privilege escalation exploit that leverages the vulnerability detailed in MS15-010.
4f24264b386fc93f4e7321fea7aa41a1b8a93d94de1ffd60457886fa2cb4772d
This Metasploit module exploits an use after free condition on Internet Explorer as used in the wild on the "Operation SnowMan" in February 2014. The module uses Flash Player 12 in order to bypass ASLR and finally DEP.
10fcb5c8d675a721b05ed3e69363ebeb92832f95ef6672333150a8c4b295da5e
Microsoft Internet Explorer CMarkup use-after-free exploit that demonstrates the issue documented in MS14-012.
c372cfa21ed6ed039af78c69c1242e4a591d2b3c923280149f5e686dbcd28be0
MuPDF versions 1.3 and below suffer from a stack-based buffer overflow in xps_parse_color(). Proof of concept file included.
7d0272e5a941d51fad81deef68d7e97246b779ea7b1e7ff989e5baf9afe9ee13