header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

eVestigator Forensic PenTester v1 – Remote Code Execution via MITM

The Android application reviewed, according to the developer, performs a 'thorough forensic level Penetration Test'. During run-time and reverse engineering analysis, it was discovered that the application does a connect() scan (i.e. TCP 3-way handshake) to all 65535 TCP ports, for the external IP address of the app user, with 10 simultaneous threads. However, in case a target has all 65535 TCP ports open, the application will actually report that there are 87375 'threats' (i.e. ports) open. Even after scanning all the ports, the application will continue to run forever, and for example count down from the same minute several times. (i.e. when the timer hits 14:00, it goes back up to 14:59). The application does not report to the user which ports are open, and it does not provide a final report either. Nor does it even attempt to grab any service banners. If the 'Send to eVestigator' button is clicked, none of the scan details are sent either. Instead, the external IP address along with other details about the Android environment + user-entered details are sent.

Out-of-Bounds Access in RegExp.prototype.exec and RegExp.prototype.test

The code defined in BranchIfFastRegExp checks whether a regular expression object has the default map, however, it is possible to alter the map after this check has been performed. This can cause inline fields, such as lastIndex to be changed to dictionary properties. This will cause out-of-bounds reads and writes the next time lastIndex is accessed on the fast path.

Stack Buffer Overflow in LG ASF Parser

There are three variants of the below crash, all of which stemming from an unbound copy into a fixed size stack buffer allocated in the function ASFParser::SetMetaData, used as an argument to each of the three calls to the function unicodeToUtf_8 without checking that the output length will be less than the size of the buffer.

Humax Backup file download

Humax HG100R backup file download vulnerability allows an attacker to download the configuration file without authentication. This vulnerability is due to the lack of authentication in the GatewaySettings.bin file. An attacker can exploit this vulnerability by sending a GET request to the GatewaySettings.bin file. The configuration file will be downloaded and decoded in base64 format.

Veritas/Symantec Backup Exec SSL NDMP Connection Use-After-Free

This module exploits a use-after-free vulnerability in the handling of SSL NDMP connections in Veritas/Symantec Backup Exec's Remote Agent for Windows. When SSL is re-established on a NDMP connection that previously has had SSL established, the BIO struct for the connection's previous SSL session is reused, even though it has previously been freed.

FreeBSD_CVE-2017-FGPE.c

FreeBSD_CVE-2017-FGPE.c is a program for CVE-2017-1084 which is a stack clash vulnerability. It is a type of vulnerability which allows an attacker to overwrite the stack guard page and gain control of the program execution flow. This program is written in C language and it is compiled with -O0. It is a free software which is distributed under the GNU General Public License. It uses mmap() and setrlimit() functions to allocate memory and set the resource limit respectively. It also uses clash_smash_no_jump() function to overwrite the stack guard page. The program prints the character at the last page and the final distance.

Recent Exploits: