DB: 2017-11-24

116602 new exploits

Too many to list!
This commit is contained in:
Offensive Security 2017-11-24 20:56:23 +00:00
parent 68825c6583
commit d304cc3d3e
38870 changed files with 40994 additions and 40878 deletions

View file

@ -35,4 +35,4 @@ In this code snippet, the data.buf_out.num_planes value is attacker-controlled "
Proof-of-concept code to trigger this issue (from a privileged shell) is attached (m2m1shot_compat.c). Proof-of-concept code to trigger this issue (from a privileged shell) is attached (m2m1shot_compat.c).
Proof of Concept: Proof of Concept:
https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/38555.zip https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/38555.zip

View file

@ -56,4 +56,4 @@ One ioctl should have valid data, the other should fail
At this point ctx->mm will now have invalid or free data (free if the forked process dies). Proof-of-concept code to trigger this condition is attached (fimg2d-lock.c) At this point ctx->mm will now have invalid or free data (free if the forked process dies). Proof-of-concept code to trigger this condition is attached (fimg2d-lock.c)
Proof of Concept: Proof of Concept:
https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/38557.zip https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/38557.zip

View file

@ -26,4 +26,4 @@ I/DEBUG ( 2958): #03 pc 000000000042ec00 /system/priv-app/SecGallery2015/
To reproduce, download the file and open it in Gallery To reproduce, download the file and open it in Gallery
Proof of Concept: Proof of Concept:
https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/38610.zip https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/38610.zip

View file

@ -31,4 +31,4 @@ To reproduce, download the attached file and wait, or trigger media scanning by
adb shell am broadcast -a android.intent.action.MEDIA_MOUNTED -d file:///mnt/shell/emulated/0/ adb shell am broadcast -a android.intent.action.MEDIA_MOUNTED -d file:///mnt/shell/emulated/0/
Proof of Concept: Proof of Concept:
https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/38611.zip https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/38611.zip

Some files were not shown because too many files have changed in this diff Show more