header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Multiple programming errors in the implementation of the CREATECOLORSPACEW record in EMF files

The MRCREATECOLORSPACEW::bCheckRecord() function starts off by checking if the length of the record is greater or equal than 0x50 (80) and then immediately proceeds to reading the .cbData field at offset 0x25c (604). Since the record is not guaranteed to be large enough to hold the value at +0x25c, the instruction shown above can read beyond the allocated buffer. Furthermore, the value obtained from offset +0x25c is also used to verify the remaning size of the record, however, the comparison is performed without taking into account the possibility of an integer overflow.

Use-after-free in addProperty

There is a use-after-free in addProperty. If a property is added to a MovieClip object that already has a watch defined, and the watch deleted the MovieClip, it is used after it is freed. A minimal PoC follows: var t = this.createEmptyMovieClip( "t", 1); t.watch("a", func); t.addProperty("a", func, func); function func(){ trace("a"); } A sample fla and swf are attached.

Type Confusion in FileReference Constructor

There is a type confusion issue in the FileReference constructor. The constructor adds several properties to the constructed object before setting the type and data. If a watch is set on one of these properties, code can be called and the object can be initialized to one with a destructor before the FileReference constructor sets the object data, leading to type confusion when the object is garbage collected.

Flash Player MP4 File Parsing Stack Corruption

A stack corruption vulnerability exists in Adobe Flash Player versions prior to 28.0.0.137. The vulnerability is caused by a boundary error when parsing MP4 files. An attacker can exploit this vulnerability to execute arbitrary code in the context of the current user.

Cisco CLI and /bin/sh Reverse Shells

This exploit is a proof-of-concept code for a remote code execution vulnerability in Cisco IOS. It allows an attacker to execute arbitrary code on a vulnerable Cisco IOS device. The exploit works by sending a specially crafted packet to the vulnerable device. The packet contains two shellcodes, one for spawning a reverse Cisco CLI shell and one for spawning a reverse "/bin/sh" shell. The shellcodes are written in assembly language and are encoded using a simple XOR encoding scheme.

Recent Exploits: