header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Touchpad / Trivum WebTouch Setup V9 V2.53 build 13163 – Unauthorized Authentication Reset

Touchpad / Trivum WebTouch Setup V9 V2.53 build 13163 of Apr 6 2018 09:10:14 (FW 303) before 2.56 build 13381 - 12.07.2018, allow unauthorized remote attackers to reset the authentication via "/xml/system/setAttribute.xml" URL, using GET request to the end-point "?id=0&attr=protectAccess&newValue=0" (successful attack will allow attackers to login without authorization).

Object Lifetime Issue in Swiftshader OpenGL Texture Bindings

There is an object lifetime issue in the Swiftshader OpenGL texture bindings (OpenGL/libGLESv2/Texture.cpp). The same bug is present in all versions of TextureXX::copyImage. The bug is triggered when egl::Image::create fails and the reference taken on renderTarget by source->getRenderTarget() is never dropped. The PoC is tested against 68.0.3440.7, and for versions prior to the fixes a different strategy (or at least texture sizes) will be needed to cause the allocations to fail. Note that the PoC is triggering the bug directly from javascript, which will taint the renderer process, so it's not possible to use this bug to escape the sandbox.

SwiftShader Memory Corruption Issue

There is a remotely triggerable memory corruption issue in SwiftShader that is reachable from WebGL, resulting from an integer overflow issue. In the GPU process, there is validation on the sizes passed to texture creation functions to ensure that they shouldn't cause overflow. However, in the Swiftshader code there is a separate rounding up of render-target sizes to the next even size, which allows bypassing this validation.

WordPress Plugin All In One Favicon <= 4.6 - Authenticated Multiple XSS Persistent

WordPress Plugin All In One Favicon before 4.6 allows remote authenticated users to execute javascript code through XSS Persistent attacks. The following parameters are vulnerable: backendApple-Text, backendICO-Text, backendPNG-Text, backendGIF-Text, frontendApple-Text, frontendICO-Text, frontendPNG-Text, frontendGIF-Text.

Modx Revolution < 2.6.4 - Remote Code Execution

Modx Revolution version 2.6.4 and below is vulnerable to Remote Code Execution. An attacker can exploit this vulnerability by sending a malicious payload to the vulnerable server via the 'ctx' parameter in the 'connectors/system/phpthumb.php' file. This payload will create a new file 'payload.php' in the root directory of the server. The attacker can then access the file to execute arbitrary code on the vulnerable server.

Recent Exploits: