Vulnerabilities tagged "cool-vuln"

Integer Truncation in Java's XML Signature Verification

The root of the issue is that XSLTC (turns XSLT into a Java Class to be executed for better performance) does not account for that fact that the `constant_pool_count` in a Java class is only 16bits. An attacker can create an XSLT document containing too many constants, all of which will be written to the class file, but the count will be truncated to 16bits, leading to some of those constants being interpreted as part of the classfile containing things like field and method descriptions for the class.
 

Facebook SMS Captcha Was Vulnerable to CSRF Attack

Facebook's SMS Captcha page would as you might expect, display a captcha, the user fills it out, and then it makes a POST request to the next page including the anti-CSRF token. The problem being that the next location was determined by the `next` url parameter which was entirely attacker controlled, and could be pointed to sensitive GraphQL endpoints.
 

Analysis of a Remote Code Execution (RCE) Vulnerability in Cobalt Strike 4.7.1

So Java's Swing UI Toolkit in some cases will try to parse any strings that start with a `<` as HTML, and dangerously so as its handling of `` tags will attempt to initialize a class with the name from the `classid` attribute (must inherit from `java.awt.Component`), and it will attempt to set any `` tags through their setter functions.
 

Windows Kernel integer overflows in registry subkey lists leading to memory corruption

A couple integer overflows in the the Windows Kernel through the registry, the core problem being that a 16bit integer is used for the `Count` field storing the number of subkeys inside an index.Under normal circumstances, when adding new subkeys the registry will automatically divide itself so you won't have more than ~1000 subkeys, but you can import arbitrarily formatted indexes, using this you can craft one with 65535 keys...
 
1
2
3
4
5