header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Type Confusion in Intl.js Initializers

The InitializeNumberFormat and InitializeDateTimeFormat functions in Intl.js are used to initialize an Intl.NumberFormat object and Intl.DateTimeFormat object respectively. There are two versions of each initializer, one for WinGlob and the other for ICU. The problem is that the versions for ICU don't check whether the given object has been initialized, which allows to initialize the same object multiple times and can lead to type confusion. This vulnerability was tested on Microsoft Edge 42.17672.1000.0 and Microsoft EdgeHTML 17.17672.

Type Confusion with Array.prototype.push Method

This vulnerability is similar to issue 1531. The patch seems to prevent type confusion triggered from StElemI_A instructions. But the SetItem method can also be invoked through the Array.prototype.push method which can be inlineed. A proof-of-concept code is provided which shows how type confusion can be achieved with the push method in the same way used for issue 1531. The code creates an array with three elements, deletes the second element, and then calls the opt() function with the array and a value. The opt() function pushes the value to the array and sets the first element to a magic value. When the main() function is called, it creates an array with one element and calls the opt() function with the array and a magic value. When the alert() function is called, it shows the array with the magic value in the first element.

Type Confusion in DictionaryPropertyDescriptor::CopyFrom() Method

The DictionaryPropertyDescriptor::CopyFrom() method is used to copy all the fields from another descriptor to 'this'. However, it leaves some fields uncopied, such as the 'IsShadowed' field which indicates that a Let or Const variable has been declared in the global object with the same name as the name of a property of the global object. This lack of copying the 'IsShadowed' field can lead to type confusion, as demonstrated in the proof-of-concept code.

Intl Object Property Access Vulnerability

This vulnerability is caused by the Intl object not being initialized, which triggers the initialization process which runs Intl.js without caring about the ImplicitCallFlags flag. The PoC redefines Map.prototype.get to intercept the execution of Intl.js, and arr[0] is set to an empty object. This can lead to type confusion and arbitrary code execution.

Asustor ADM 3.1.2RHG1 – Remote Code Execution

This exploit takes advantage an unauthenticated os command injection discovered by Kyle Lovette if exploitation occurs successfully, a root shell is granted. Authors: matthew fulton and Kyle Lovett. Date: 27 May 2018. Background: Both Kyle and I found a number of vulnerabilities that we had independently reported to Asustor that Asustor hasn't acknowledge nor apparenlty fixed. After a twitter communication Kyle was kind enough to share a few details exploit created on MacOS system, python 2.7.10, may port to metasploit module soon.

Authentication Bypass Vulnerability in Paramiko SSH Library

A vulnerability in the Paramiko SSH library allows an attacker to bypass authentication by sending an invalid username. This vulnerability is due to the library not properly handling invalid usernames. An attacker can exploit this vulnerability by sending an invalid username to the SSH server. If the server is using the Paramiko library, the authentication will be bypassed and the attacker will be able to access the server.

Mikrotik WinBox 6.42 – Credential Disclosure ( golang edition )

This exploit is a golang edition of the Mikrotik WinBox 6.42 Credential Disclosure vulnerability. It allows an attacker to gain access to the user credentials of a Mikrotik router by sending a malicious packet to the router. The exploit was discovered by Maxim Yefimenko and was tested on Fedora 28, Debian 9, Windows 10, and Android.

SQL Injection, XSS & CSRF vulnerabilities

Multiple SQL injection vulnerabilities have been identified in the REST web service API. An attacker who obtains a valid API key that is granted a necessary permission could successfully perform an attack to extract information from the database. Multiple stored cross-site scripting vulnerabilities have been identified across multiple functions in the application, which allows an authenticated attacker to insert a malicious script into the application. Multiple cross-site request forgery vulnerabilities have been identified across multiple functions in the application, which allows an attacker to perform malicious actions on behalf of the victim.

Recent Exploits: