From c9a65a1f7baff5b24ac1186db768ab04bc930e8c Mon Sep 17 00:00:00 2001 From: Offensive Security Date: Fri, 3 Sep 2021 21:04:54 +0000 Subject: [PATCH] DB: 2021-09-03 52 changes to exploits/shellcodes --- exploits/aix/dos/34588.txt | 6 +- exploits/android/dos/39629.txt | 4 +- exploits/cgi/webapps/34103.txt | 2 +- exploits/hardware/local/44820.txt | 14 +- exploits/hardware/webapps/21395.txt | 4 +- exploits/hardware/webapps/31765.txt | 2 +- exploits/hardware/webapps/31790.txt | 8 +- exploits/hardware/webapps/33129.html | 2 +- exploits/hardware/webapps/44933.txt | 2 +- exploits/hardware/webapps/44939.txt | 2 +- exploits/hardware/webapps/47663.txt | 278 +++++++++++++-------------- exploits/ios/webapps/31733.txt | 8 +- exploits/ios/webapps/34626.txt | 4 +- exploits/ios/webapps/35083.txt | 4 +- exploits/linux/webapps/38833.txt | 2 +- exploits/linux/webapps/45090.txt | 2 +- exploits/multiple/remote/49418.py | 22 +-- exploits/multiple/webapps/43177.txt | 6 +- exploits/multiple/webapps/44360.txt | 2 +- exploits/php/webapps/18873.txt | 4 +- exploits/php/webapps/22907.txt | 2 +- exploits/php/webapps/33697.txt | 2 +- exploits/php/webapps/34405.txt | 20 +- exploits/php/webapps/35541.txt | 2 +- exploits/php/webapps/35840.txt | 2 +- exploits/php/webapps/41143.rb | 10 +- exploits/php/webapps/42263.txt | 2 +- exploits/php/webapps/42980.txt | 2 +- exploits/php/webapps/44028.txt | 2 +- exploits/php/webapps/44029.html | 2 +- exploits/php/webapps/44137.html | 2 +- exploits/php/webapps/44144.txt | 2 +- exploits/php/webapps/44354.txt | 2 +- exploits/php/webapps/44383.html | 2 +- exploits/php/webapps/45068.txt | 8 +- exploits/php/webapps/49267.txt | 2 +- exploits/windows/dos/34458.html | 28 +-- exploits/windows/dos/38272.txt | 2 +- exploits/windows/dos/39647.txt | 2 +- exploits/windows/local/35901.txt | 2 +- exploits/windows/local/35902.txt | 2 +- exploits/windows/remote/44068.md | 4 +- exploits/windows/remote/49216.py | 16 +- exploits/windows/webapps/24500.txt | 18 +- exploits/windows_x86/dos/38270.txt | 2 +- exploits/windows_x86/dos/38274.txt | 2 +- exploits/windows_x86/dos/38277.txt | 2 +- exploits/windows_x86/dos/38278.txt | 2 +- exploits/windows_x86/dos/38307.txt | 2 +- shellcodes/linux_x86/37289.txt | 2 +- shellcodes/windows_x86-64/35794.txt | 2 +- shellcodes/windows_x86/35793.txt | 2 +- 52 files changed, 266 insertions(+), 266 deletions(-) diff --git a/exploits/aix/dos/34588.txt b/exploits/aix/dos/34588.txt index 4843caa02..5e6ea00dc 100644 --- a/exploits/aix/dos/34588.txt +++ b/exploits/aix/dos/34588.txt @@ -1,9 +1,9 @@ # Exploit Title: PHP Stock Management System 1.02 - Multiple Vulnerabilty # Date : 9-9-2014 # Author : jsass -​# Vendor Homepage: ​http://www.posnic.com/​ -# Software Link:​ http://sourceforge.net/projects/stockmanagement/ -# Version: ​1.02 +# Vendor Homepage: http://www.posnic.com/ +# Software Link: http://sourceforge.net/projects/stockmanagement/ +# Version: 1.02 # Tested on: kali linux # Twitter : @KwSecurity # Group : Q8 GRAY HAT TEAM diff --git a/exploits/android/dos/39629.txt b/exploits/android/dos/39629.txt index 1358bd93b..3e7bec8a0 100644 --- a/exploits/android/dos/39629.txt +++ b/exploits/android/dos/39629.txt @@ -4,8 +4,8 @@ The wireless driver for the Android One (sprout) devices has a bad copy_from_use This ioctl is permitted for access from the untrusted-app selinux domain, so this is an app-to-kernel privilege escalation from any app with android.permission.INTERNET. -See ​ - hello-jni.tar.gz​ for a PoC (NDK required to build) that should redirect kernel code execution to 0x40404040. +See + hello-jni.tar.gz for a PoC (NDK required to build) that should redirect kernel code execution to 0x40404040. [ 56.843672]-(0)[880:tx_thread]CPU: 0 PID: 880 Comm: tx_thread Tainted: G W 3.10.57-g9e1c396 #1 [ 56.844867]-(0)[880:tx_thread]task: dea3b480 ti: cb99e000 task.ti: cb99e000 diff --git a/exploits/cgi/webapps/34103.txt b/exploits/cgi/webapps/34103.txt index 346c82c79..9c0544fe2 100644 --- a/exploits/cgi/webapps/34103.txt +++ b/exploits/cgi/webapps/34103.txt @@ -147,7 +147,7 @@ primary_tab=USERS&realm=&secondary_tab=per_user_add_update&user=benjaminKM PoC: Benutzer > Neu Anlegen > Rolle: Auditor > Domänen > (domain_list_table-r0) - %20​​​​​">​​​​​ diff --git a/exploits/hardware/local/44820.txt b/exploits/hardware/local/44820.txt index 32c2c148e..3973cf14c 100644 --- a/exploits/hardware/local/44820.txt +++ b/exploits/hardware/local/44820.txt @@ -10,14 +10,14 @@ Due to the lack of proper checks after exiting the ROP chain, it is possible in ## PLEASE READ FIRST: - For best results with the flash dumper, here are the recommended steps. -- Open the browser & browse to the ps3xploit.com website, go to the page of the exploit you need. Set the current page as browser homepage. Don't launch the exploit initialization. Close the browser. ​ -- Open the browser. The exploit page will load automatically. Choose your dump path option or download the dump.jpg file if you use the hdd edition.​ +- Open the browser & browse to the ps3xploit.com website, go to the page of the exploit you need. Set the current page as browser homepage. Don't launch the exploit initialization. Close the browser. +- Open the browser. The exploit page will load automatically. Choose your dump path option or download the dump.jpg file if you use the hdd edition. - Press the exploit initialization button & wait until initialization succeeds. If it fails, follow the refresh/reload instructions on screen. -- Trigger the exploit.​ -- On success, check your dump with the py checker tool.​ +- Trigger the exploit. +- On success, check your dump with the py checker tool. ## Usage Tips: -- Try using a LAN connection or a solid WiFi connection during exploitation. A weak signal can cause problems.​ -- If the exploit takes more than 5 minutes to work, reload page, browser, or restart console and try again.​ -- If you are using a LAN connection and experience network issues, make sure all cables to router are in working order.​​ \ No newline at end of file +- Try using a LAN connection or a solid WiFi connection during exploitation. A weak signal can cause problems. +- If the exploit takes more than 5 minutes to work, reload page, browser, or restart console and try again. +- If you are using a LAN connection and experience network issues, make sure all cables to router are in working order. \ No newline at end of file diff --git a/exploits/hardware/webapps/21395.txt b/exploits/hardware/webapps/21395.txt index 67e61f835..64b74b140 100644 --- a/exploits/hardware/webapps/21395.txt +++ b/exploits/hardware/webapps/21395.txt @@ -140,7 +140,7 @@ align=``left``> Tags -​​​​​ + <[PERSISTENT INJECTED SCRIPT CODE!]'<``=````> @@ -162,7 +162,7 @@ type=``hidden``>
-
​​​​​ + ... or diff --git a/exploits/hardware/webapps/31765.txt b/exploits/hardware/webapps/31765.txt index 5f2c7f4a1..47fd87a3d 100644 --- a/exploits/hardware/webapps/31765.txt +++ b/exploits/hardware/webapps/31765.txt @@ -139,7 +139,7 @@ primary_tab=USERS&realm=&secondary_tab=per_user_add_update&user=benjaminKM PoC: Benutzer > Neu Anlegen > Rolle: Auditor > Domänen > (domain_list_table-r0) - %20​​​​​">​​​​​ diff --git a/exploits/hardware/webapps/31790.txt b/exploits/hardware/webapps/31790.txt index c09c31fb1..3e0d4850a 100644 --- a/exploits/hardware/webapps/31790.txt +++ b/exploits/hardware/webapps/31790.txt @@ -150,7 +150,7 @@ PoC: Create User Object > Create User Expression - Listing -Group Match​​​​​ +Group Match @@ -158,7 +158,7 @@ cellpadding="0" cellspacing="0">​​​​​
Pattern
a%20>"<[PERSISTENT INJECTED SCRIPT CODE!]">
+name="0" type="button">
@@ -175,10 +175,10 @@ If the check box is cleared, only one list item may match. Default: Off​​​​​NameNameGroup Match -a%20>"<[PERSISTENT INJECTED SCRIPT CODE!]">a%20>"​​​​​<[PERSISTENT INJECTED SCRIPT CODE!]"> +a%20>"<[PERSISTENT INJECTED SCRIPT CODE!]">a%20>"<[PERSISTENT INJECTED SCRIPT CODE!]"> diff --git a/exploits/hardware/webapps/33129.html b/exploits/hardware/webapps/33129.html index 8a33ba5c4..8ded8f103 100644 --- a/exploits/hardware/webapps/33129.html +++ b/exploits/hardware/webapps/33129.html @@ -1,4 +1,4 @@ -​​