header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Use-after-free Vulnerability in Android-msm-wahoo-4.4-pie

A use-after-free vulnerability exists in the android-msm-wahoo-4.4-pie branch of https://android.googlesource.com/kernel/msm when kgsl_mem_entry_destroy() in drivers/gpu/msm/kgsl.c is called for a writable entry with memtype KGSL_MEM_ENTRY_USER. It attempts to mark the entry's pages as dirty using the function set_page_dirty(). This function first loads page->mapping using page_mapping(), then calls the function pointer mapping->a_ops->set_page_dirty. The bug is that, as explained in upstream commit e92bb4dd9673, the mapping of a page can be freed concurrently unless it is protected somehow (e.g. by holding the page lock, or by holding a reference to the mapping). For callers who don't hold any such lock or reference, set_page_dirty_lock() is provided to safely mark a page as dirty. To reproduce on a Pixel 2 (walleye), one must check out the tree specified, enable KASAN in the kernel config, apply the attached kernel patch kgsl-bigger-race-window.patch to make the race window much bigger, build and boot the kernel, build the attached poc.c with aarch64-linux-gnu-gcc -static -o poc poc.c -Wall, and run the PoC on the device (adb push, adb shell, ./poc).

Spidermonkey Crash Debug Builds

While fuzzing Spidermonkey, an exploit was encountered which crashes debug builds of the latest release version of Spidermonkey. The exploit is caused by a custom function being inlined which makes assumptions about the input ObjectGroup. This causes an unexpected ObjectGroup to be seen by the ObjectGroupDispatch operation, which in debug builds will crash with an assertion failure.

Privilege Escalation via DACL Permissions Overwrite (CVE-2019-0841)

A vulnerability in Microsoft Edge allows an attacker to overwrite DACL permissions and gain privilege escalation. This is done by creating a directory and hardlink in the local appdata folder, which will write the DACL. The version of Microsoft Edge must be specified in the PoC (polarbear.exe) for the exploit to work.

pfSense 2.4.4-p3 (ACMEPackage 0.5.7_1) – Stored Cross-Site Scripting

pfSense software is a free, open source customized distribution of FreeBSD specifically tailored for use as a firewall and router that is entirely managed via web interface. The ACME Package for pfSense interfaces with Let’s Encrypt to handle the certificate generation, validation, and renewal processes. An attacker can exploit this vulnerability by navigating to the acme_accountkeys_edit.php page and inputting malicious payloads into the Name and Description fields, which will then trigger an XSS box to pop-up.

Petraware pTransformer ADC before 2.1.7.22827 allows SQL Injection via the User ID parameter to the login form.

The login form on pTransformer ADC does not filter dangerous character such as single quote ('). This has cause the application to be vulnerable to SQL Injection. The vulnerable parameter is User ID. By injecting ' or '1'='1'-- ,it will bypass the login form.

Recent Exploits: