DB: 2022-11-10
2776 changes to exploits/shellcodes/ghdb
This commit is contained in:
parent
fba9658f51
commit
d63de06c7a
2774 changed files with 3267 additions and 3998 deletions
|
@ -138,5 +138,4 @@ print "[-] Cleaning up /etc/passwd and removing /tmp/wow.ksh \n";
|
|||
$result = `su wow "-c cp /tmp/passwd.backup /etc/passwd && echo 'wow::0:0::/:/usr/bin/ksh' >> /etc/passwd" && rm /tmp/wow.ksh`;
|
||||
|
||||
print "[-] Done \n";
|
||||
print "[+] 'su wow' for root shell \n";
|
||||
|
||||
print "[+] 'su wow' for root shell \n";
|
|
@ -35,4 +35,4 @@ In this code snippet, the data.buf_out.num_planes value is attacker-controlled "
|
|||
Proof-of-concept code to trigger this issue (from a privileged shell) is attached (m2m1shot_compat.c).
|
||||
|
||||
Proof of Concept:
|
||||
https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/38555.zip
|
||||
https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/38555.zip
|
|
@ -56,4 +56,4 @@ One ioctl should have valid data, the other should fail
|
|||
At this point ctx->mm will now have invalid or free data (free if the forked process dies). Proof-of-concept code to trigger this condition is attached (fimg2d-lock.c)
|
||||
|
||||
Proof of Concept:
|
||||
https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/38557.zip
|
||||
https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/38557.zip
|
|
@ -26,4 +26,4 @@ I/DEBUG ( 2958): #03 pc 000000000042ec00 /system/priv-app/SecGallery2015/
|
|||
To reproduce, download the file and open it in Gallery
|
||||
|
||||
Proof of Concept:
|
||||
https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/38610.zip
|
||||
https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/38610.zip
|
|
@ -31,4 +31,4 @@ To reproduce, download the attached file and wait, or trigger media scanning by
|
|||
adb shell am broadcast -a android.intent.action.MEDIA_MOUNTED -d file:///mnt/shell/emulated/0/
|
||||
|
||||
Proof of Concept:
|
||||
https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/38611.zip
|
||||
https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/38611.zip
|
|
@ -37,4 +37,4 @@ To reproduce, download the image file and wait, or trigger media scanning by cal
|
|||
adb shell am broadcast -a android.intent.action.MEDIA_MOUNTED -d file:///mnt/shell/emulated/0/
|
||||
|
||||
Proof of Concept:
|
||||
https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/38612.zip
|
||||
https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/38612.zip
|
|
@ -28,4 +28,4 @@ To reproduce, download the file and open it in Gallery.
|
|||
This issue was tested on a SM-G925V device running build number LRX22G.G925VVRU1AOE2.
|
||||
|
||||
Proof of Concept:
|
||||
https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/38613.zip
|
||||
https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/38613.zip
|
|
@ -55,4 +55,4 @@ adb shell am broadcast -a android.intent.action.MEDIA_MOUNTED -d file:///mnt/she
|
|||
This issue was tested on a SM-G925V device running build number LRX22G.G925VVRU1AOE2.
|
||||
|
||||
Proof of Concept:
|
||||
https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/38614.zip
|
||||
https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/38614.zip
|
|
@ -37,4 +37,4 @@ adb shell am broadcast -a android.intent.action.MEDIA_MOUNTED -d file:///mnt/she
|
|||
|
||||
|
||||
Proof of Concept:
|
||||
https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/39424.zip
|
||||
https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/39424.zip
|
|
@ -29,4 +29,4 @@ adb shell am broadcast -a android.intent.action.MEDIA_MOUNTED -d file:///mnt/she
|
|||
|
||||
|
||||
Proof of Concept:
|
||||
https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/39425.zip
|
||||
https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/39425.zip
|
|
@ -159,4 +159,4 @@ prNdisReq->ndisOidContent is in a static allocation of size 0x1000, and prIwReqD
|
|||
|
||||
|
||||
Proof of Concept:
|
||||
https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/39629.zip
|
||||
https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/39629.zip
|
|
@ -55,4 +55,4 @@ Reported to Android here: https://code.google.com/p/android/issues/detail?id=185
|
|||
|
||||
|
||||
Proof of Concept:
|
||||
https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/39651.zip
|
||||
https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/39651.zip
|
|
@ -42,4 +42,4 @@ Where XXXXXX should be uninitialized memory from the heap.
|
|||
|
||||
|
||||
Proof of Concept:
|
||||
https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/39685.zip
|
||||
https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/39685.zip
|
|
@ -86,4 +86,4 @@ I’ve provided a PoC which exploits the issue in ICrypto::decrypt. I will just
|
|||
|
||||
|
||||
Proof of Concept:
|
||||
https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/39686.zip
|
||||
https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/39686.zip
|
|
@ -92,4 +92,4 @@ cpsr 0x80070030 -2147024848
|
|||
|
||||
|
||||
Proof of Concept:
|
||||
https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/39921.zip
|
||||
https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/39921.zip
|
|
@ -140,4 +140,4 @@ If there is e.g. some system_app that performs permissions checks (which use the
|
|||
|
||||
|
||||
Proof of Concept:
|
||||
https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/40381.zip
|
||||
https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/40381.zip
|
|
@ -36,4 +36,4 @@ Its logcat output looks like this:
|
|||
|
||||
|
||||
Proof of Concept:
|
||||
https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/40449.zip
|
||||
https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/40449.zip
|
|
@ -142,4 +142,4 @@ a uint32_t is smaller than a binder_uintptr_t.
|
|||
|
||||
|
||||
Proof of Concept:
|
||||
https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/40515.zip
|
||||
https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/40515.zip
|
|
@ -165,4 +165,4 @@ Fixed in the November security bulletin at https://source.android.com/security/b
|
|||
|
||||
|
||||
Proof of Concept:
|
||||
https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/40876.zip
|
||||
https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/40876.zip
|
|
@ -135,4 +135,4 @@ Fixed in https://source.android.com/security/bulletin/2016-12-01.html
|
|||
|
||||
|
||||
Proof of Concept:
|
||||
https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/40945.zip
|
||||
https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/40945.zip
|
|
@ -58,4 +58,4 @@ According to the default SELinux rules as present on the SM-G935F (version XXS1A
|
|||
|
||||
|
||||
Proof of Concept:
|
||||
https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/40993.zip
|
||||
https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/40993.zip
|
|
@ -67,4 +67,4 @@ The sysfs entries mentioned above are world-readable and have an SELinux context
|
|||
|
||||
|
||||
Proof of Concept:
|
||||
https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/41161.zip
|
||||
https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/41161.zip
|
|
@ -30,4 +30,4 @@ This PoC uses the CFP_ROPP_* commands to modify a kernel address in the kernel V
|
|||
|
||||
|
||||
Proof of Concept:
|
||||
https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/41211.zip
|
||||
https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/41211.zip
|
|
@ -38,4 +38,4 @@ This PoC disables the M bit in SCTLR_EL1.
|
|||
|
||||
|
||||
Proof of Concept:
|
||||
https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/41212.zip
|
||||
https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/41212.zip
|
|
@ -44,4 +44,4 @@ This PoC s2-remaps RKP's physical address range and reads from it in EL1.
|
|||
|
||||
|
||||
Proof of Concept:
|
||||
https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/41218.zip
|
||||
https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/41218.zip
|
|
@ -64,4 +64,4 @@ This PoC modifies an instruction within RKP's address space by repeatedly callin
|
|||
|
||||
|
||||
Proof of Concept:
|
||||
https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/41232.zip
|
||||
https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/41232.zip
|
|
@ -63,4 +63,4 @@ backtrace:
|
|||
|
||||
|
||||
Proof of Concept:
|
||||
https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/41351.zip
|
||||
https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/41351.zip
|
|
@ -47,4 +47,4 @@ u:r:lghashstorageserver:s0
|
|||
|
||||
|
||||
Proof of Concept:
|
||||
https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/41352.zip
|
||||
https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/41352.zip
|
|
@ -92,4 +92,4 @@ disable selinux enforcement.
|
|||
|
||||
|
||||
Proof of Concept:
|
||||
https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/41353.zip
|
||||
https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/41353.zip
|
|
@ -80,4 +80,4 @@ Here is a sample crash from a successful execution of the PoC:
|
|||
|
||||
|
||||
Proofs of Concept:
|
||||
https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/41354.zip
|
||||
https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/41354.zip
|
|
@ -97,4 +97,4 @@ Here is a sample crash from a successful execution of the PoC:
|
|||
|
||||
|
||||
Proofs of Concept:
|
||||
https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/41355.zip
|
||||
https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/41355.zip
|
|
@ -79,4 +79,4 @@ backtrace:
|
|||
|
||||
|
||||
Proof of Concept:
|
||||
https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/41981.zip
|
||||
https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/41981.zip
|
|
@ -53,4 +53,4 @@ backtrace:
|
|||
|
||||
|
||||
Proof of Concept:
|
||||
https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/41982.zip
|
||||
https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/41982.zip
|
|
@ -130,4 +130,4 @@ backtrace:
|
|||
|
||||
|
||||
Proof of Concept:
|
||||
https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/41983.zip
|
||||
https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/41983.zip
|
|
@ -61,4 +61,4 @@ backtrace:
|
|||
|
||||
|
||||
Proof of Concept:
|
||||
https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/42169.zip
|
||||
https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/42169.zip
|
|
@ -77,4 +77,4 @@ backtrace:
|
|||
|
||||
|
||||
Proof of Concept:
|
||||
https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/42170.zip
|
||||
https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/42170.zip
|
|
@ -41,4 +41,4 @@ backtrace:
|
|||
|
||||
|
||||
Proof of Concept:
|
||||
https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/42171.zip
|
||||
https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/42171.zip
|
|
@ -23,4 +23,4 @@ backtrace:
|
|||
|
||||
|
||||
Proof of Concept:
|
||||
https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/42285.zip
|
||||
https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/42285.zip
|
|
@ -83,4 +83,4 @@ The issue can also be exploited from the "isolated_app" SELinux context (and per
|
|||
|
||||
|
||||
Proof of Concept:
|
||||
https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/43464.zip
|
||||
https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/43464.zip
|
|
@ -92,4 +92,4 @@ These commands are all similarly racy (due to the getpidcon(...) usage), but are
|
|||
|
||||
|
||||
Proof of Concept:
|
||||
https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/43513.zip
|
||||
https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/43513.zip
|
|
@ -60,4 +60,4 @@ After applying the patch, the attached PoC should be built as part of the Androi
|
|||
|
||||
|
||||
Proof of Concept:
|
||||
https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/43996.zip
|
||||
https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/43996.zip
|
|
@ -1,3 +1,3 @@
|
|||
This Exploit allows arbitrary memory writes and reads. Running the specified payload within this package will write to the device's main CPU kernel, causing it to crash. More information about its origins here: http://boosterok.com/blog/broadpwn2/
|
||||
|
||||
Download: https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/44268.zip
|
||||
Download: https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/44268.zip
|
|
@ -26,4 +26,4 @@ This was tested on Samsung build number NRD90M.G93FXXU1DQJ8, which is the most r
|
|||
|
||||
|
||||
Proof of Concept:
|
||||
https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/44724.zip
|
||||
https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/44724.zip
|
|
@ -200,4 +200,4 @@ To reproduce that, follow these steps:
|
|||
|
||||
|
||||
Proof of Concept:
|
||||
https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/45558.zip
|
||||
https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/45558.zip
|
|
@ -48,4 +48,4 @@ Logs from the crashes on Android and iPhone are attached. Note that I modified t
|
|||
|
||||
|
||||
Proof of Concept:
|
||||
https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/45579.zip
|
||||
https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/45579.zip
|
|
@ -267,4 +267,4 @@ the upstream kernel, too.
|
|||
|
||||
|
||||
Proof of Concept:
|
||||
https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/46356.zip
|
||||
https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/46356.zip
|
|
@ -223,4 +223,4 @@ The dmesg splat should look like this:
|
|||
|
||||
|
||||
Proof of Concept:
|
||||
https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/46357.zip
|
||||
https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/46357.zip
|
|
@ -161,4 +161,4 @@ You should see something like this in dmesg (if you have
|
|||
|
||||
|
||||
Proof of Concept:
|
||||
https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/46503.zip
|
||||
https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/46503.zip
|
|
@ -222,4 +222,4 @@ set VM_IO, it is possible to use madvise(..., MADV_DOFORK) to clear that flag:
|
|||
|
||||
|
||||
Proof of Concept:
|
||||
https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/46504.zip
|
||||
https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/46504.zip
|
|
@ -52,4 +52,4 @@ WeChat will crash now if a message that contains the overwritten emoji file
|
|||
|
||||
|
||||
Proof of Concept:
|
||||
https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/46853.zip
|
||||
https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/46853.zip
|
|
@ -292,4 +292,4 @@ The KASAN report points to instruction 267c in the following assembly:
|
|||
|
||||
|
||||
Proof of Concept:
|
||||
https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/46941.zip
|
||||
https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/46941.zip
|
|
@ -76,4 +76,4 @@ Hvec-"fright" is possible. You can own the mobile by viewing a video with payloa
|
|||
|
||||
|
||||
Proof of Concept:
|
||||
https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/47119.zip
|
||||
https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/47119.zip
|
|
@ -21,4 +21,4 @@ A crash log is attached.
|
|||
|
||||
|
||||
Proof of Concept:
|
||||
https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/47920.zip
|
||||
https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/47920.zip
|
|
@ -6,4 +6,4 @@ Qualcomm's Secure Execution Environment (QSEE) Privilege Escalation Exploit usi
|
|||
|
||||
|
||||
Proof of Concept:
|
||||
https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/39757.zip
|
||||
https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/39757.zip
|
|
@ -227,4 +227,4 @@ the JACK server process.
|
|||
|
||||
|
||||
Proof of Concept:
|
||||
https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/40066.zip
|
||||
https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/40066.zip
|
|
@ -70,4 +70,4 @@ The high-level flow for executing a function in the kernel is the following:
|
|||
|
||||
|
||||
Proof of Concept:
|
||||
https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/41130.zip
|
||||
https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/41130.zip
|
|
@ -92,4 +92,4 @@ This issue can be reproduced by simply writing code to any of these memory regio
|
|||
|
||||
|
||||
Proof of Concept:
|
||||
https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/41217.zip
|
||||
https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/41217.zip
|
|
@ -28,4 +28,4 @@ cedric:/ #
|
|||
|
||||
|
||||
Proof of Concept:
|
||||
https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/42601.zip
|
||||
https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/42601.zip
|
|
@ -344,4 +344,4 @@ and then interpreted, allowing the attacker to steal photos from the device
|
|||
|
||||
|
||||
Proof of Concept:
|
||||
https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/45192.zip
|
||||
https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/45192.zip
|
|
@ -95,4 +95,4 @@ I have attached an exploit for the full chain, with usage instructions in USAGE.
|
|||
WARNING: As always, this exploit is intended to be used only on research devices that don't store user data. This specific exploit is known to sometimes cause data corruption.
|
||||
|
||||
Proof of Concept:
|
||||
https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/45379.zip
|
||||
https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/45379.zip
|
|
@ -77,4 +77,4 @@ Vendor statement from Android:
|
|||
|
||||
|
||||
Proof of Concept:
|
||||
https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/47463.zip
|
||||
https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/47463.zip
|
|
@ -1,6 +1,6 @@
|
|||
Source for exploiting CVE-2009-2692 on Android; Hole is closed in Android kernels released August 2009 or later.
|
||||
|
||||
http://zenthought.org/content/file/android-root-2009-08-16-source
|
||||
Exploit-DB Mirror: https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/9477.tar.gz (android-root-20090816.tar.gz)
|
||||
Exploit-DB Mirror: https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/9477.tar.gz (android-root-20090816.tar.gz)
|
||||
|
||||
# milw0rm.com [2009-08-18]
|
|
@ -24,4 +24,4 @@ Credits: To the NorthBit team E.P. - My shining paladin, for assisting in boosti
|
|||
|
||||
|
||||
Proof of Concept:
|
||||
https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/39640.zip
|
||||
https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/39640.zip
|
|
@ -156,4 +156,4 @@ bool Parcel::enforceInterface(const String16& interface,
|
|||
|
||||
|
||||
Proofs of Concept:
|
||||
https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/40354.zip
|
||||
https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/40354.zip
|
|
@ -88,4 +88,4 @@ This notification will be of size THREAD_SIZE*2, and will therefore fill up the
|
|||
|
||||
|
||||
Proofs of Concept:
|
||||
https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/40874.zip
|
||||
https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/40874.zip
|
|
@ -78,4 +78,4 @@ I have attached a completely untested patch that should fix the x86, arm and arm
|
|||
|
||||
|
||||
Proof of Concept:
|
||||
https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/40182.zip
|
||||
https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/40182.zip
|
|
@ -10,7 +10,7 @@
|
|||
# Note from Exploit-db: This very first exploit was meant to work with Padbusterdornet or Padbuster v0.2.
|
||||
# A similar exploitation vector was also added lately in Padbuster v0.3:
|
||||
# http://www.gdssecurity.com/l/b/2010/10/04/padbuster-v0-3-and-the-net-padding-oracle-attack/
|
||||
# https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/15213.pl (padBuster.pl)
|
||||
# https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/15213.pl (padBuster.pl)
|
||||
#
|
||||
#
|
||||
# Giorgio Fedon - (giorgio.fedon@mindedsecurity.com)
|
||||
|
|
|
@ -17,4 +17,4 @@ Thank You For Your Perfect Web Site.
|
|||
http://server/main.asp?id=5945&grp=[SQL Injection]
|
||||
|
||||
|
||||
[~]######################################### FinisH :D #############################################[~]
|
||||
[~]######################################### FinisH :D #############################################[~]
|
|
@ -16,4 +16,4 @@ admin page : http://site.com/[path]/admin.asp
|
|||
Victem :
|
||||
http://www.etoshop.com/demo/pcstore
|
||||
---------------------------------------------------------
|
||||
#########################################################
|
||||
#########################################################
|
|
@ -122,4 +122,4 @@ Persistent XSS Vulnerabilities:
|
|||
entity.Title = txtTitle_E.Text.Trim();
|
||||
|
||||
|
||||
===========================================================================================
|
||||
===========================================================================================
|
|
@ -64,4 +64,4 @@ PoC:
|
|||
shell.aspx ---> http://Example.com/downloads/uploads/2010_7_25_shell.aspx
|
||||
Note that : the value 2010_7_25 is the exact date of server.
|
||||
|
||||
===========================================================================================
|
||||
===========================================================================================
|
|
@ -65,4 +65,4 @@ Description :
|
|||
Which the Password was encrypted by SHA algorithm using .../lib/sha256.asp file.
|
||||
|
||||
|
||||
===========================================================================================
|
||||
===========================================================================================
|
|
@ -35,4 +35,4 @@ Description :
|
|||
http://Example.com/Images/
|
||||
|
||||
|
||||
===========================================================================================
|
||||
===========================================================================================
|
|
@ -73,4 +73,4 @@ Persistent XSS:
|
|||
}
|
||||
|
||||
|
||||
===========================================================================================
|
||||
===========================================================================================
|
|
@ -82,4 +82,4 @@ This page remove Admins Role in VWD-CMS.
|
|||
|
||||
|
||||
|
||||
===========================================================================================
|
||||
===========================================================================================
|
|
@ -178,4 +178,4 @@ Persistent XSS and XSRF:
|
|||
---------------------------------------------------------------------------------------
|
||||
|
||||
|
||||
===========================================================================================
|
||||
===========================================================================================
|
|
@ -182,4 +182,4 @@ This page uploads a file
|
|||
</html>
|
||||
|
||||
|
||||
===========================================================================================
|
||||
===========================================================================================
|
|
@ -60,4 +60,4 @@ Persistent XSS in admin section:
|
|||
http://Example.com/SearchResults.aspx?q={}
|
||||
|
||||
|
||||
===========================================================================================
|
||||
===========================================================================================
|
|
@ -41,4 +41,4 @@ Description :
|
|||
and so on.
|
||||
|
||||
|
||||
===========================================================================================
|
||||
===========================================================================================
|
|
@ -159,4 +159,4 @@ This page uploads a file with "xml" extension
|
|||
</body>
|
||||
</html>
|
||||
|
||||
===========================================================================================
|
||||
===========================================================================================
|
|
@ -33,6 +33,4 @@ Personal
|
|||
|
||||
# KinG,Bl4ckl0rd,Turk_server
|
||||
|
||||
# Special Thanks : Farzad_Ho,R3dMind,rAbiN_hoOd,Falcon
|
||||
|
||||
|
||||
# Special Thanks : Farzad_Ho,R3dMind,rAbiN_hoOd,Falcon
|
|
@ -23,5 +23,4 @@ http://www.site.com/news/news.asp?intSeq=69' and '0'='1 FALSE
|
|||
POC
|
||||
---
|
||||
http://www.site.com/news/news.asp?id=256 and 1=1 TRUE
|
||||
http://www.site.com/news/news.asp?id=256 and 1=0 FALSE
|
||||
|
||||
http://www.site.com/news/news.asp?id=256 and 1=0 FALSE
|
|
@ -7,7 +7,4 @@
|
|||
[+] Tested on: Windows 7 and Linux
|
||||
[+] Vulnerable File: default.asp
|
||||
[+} Dork : intext:"Powered by CIS Manager"
|
||||
[+] Exploit : http://host/site/default.asp?TroncoID=[SQL Injection]
|
||||
|
||||
|
||||
|
||||
[+] Exploit : http://host/site/default.asp?TroncoID=[SQL Injection]
|
|
@ -10,4 +10,4 @@
|
|||
|
||||
Proof of Concept:
|
||||
|
||||
https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/42776.zip
|
||||
https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/42776.zip
|
|
@ -73,4 +73,4 @@ Help AG Middle East
|
|||
References
|
||||
----------
|
||||
[1] Help AG Middle East http://www.helpag.com/
|
||||
[2] Sitefinity CMS Version Notes http://www.sitefinity.com/product/version-notes
|
||||
[2] Sitefinity CMS Version Notes http://www.sitefinity.com/product/version-notes
|
|
@ -15,7 +15,7 @@
|
|||
|
||||
# for working with this exploit you need two asp file for updating hash you can download both from :
|
||||
# www.abysssec.com/files/dana.zip
|
||||
# https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/8719.zip (2009-dana.zip)
|
||||
# https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/8719.zip (2009-dana.zip)
|
||||
|
||||
# then need to upload asp files and change this "http://wwww.yourasphost.com/salt.asp?salt=" in exploit code
|
||||
|
||||
|
|
|
@ -47,4 +47,4 @@ Thanks
|
|||
@mwulftange initially discovered this vulnerability. @bao7uo wrote all of the logic for breaking RadAsyncUpload encryption, which enabled manipulating the file upload configuration object in rauPostData and subsequently exploiting insecure deserialization of that object.
|
||||
|
||||
Proof of Concept:
|
||||
https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/47793.zip
|
||||
https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/47793.zip
|
|
@ -2,4 +2,4 @@ source: https://www.securityfocus.com/bid/1098/info
|
|||
|
||||
A direct system call containing invalid parameters through int 0x25 will cause the BeOS to crash. Reboot of the machine is required in order to regain normal functionality.
|
||||
|
||||
https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/19840.tgz
|
||||
https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/19840.tgz
|
|
@ -31,7 +31,4 @@ write(p[0], crap, BUFFERSIZE);
|
|||
write(p[1], crap, BUFFERSIZE);
|
||||
}
|
||||
exit(0);
|
||||
}
|
||||
|
||||
|
||||
|
||||
}
|
|
@ -10,4 +10,4 @@ Hacker writes directly to device previously mounted as /usr, clearing file flags
|
|||
Hacker mounts modified device as /usr.
|
||||
Hacker installs backdoored /usr/bin/login.
|
||||
|
||||
https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/19411.tgz
|
||||
https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/19411.tgz
|
|
@ -2,4 +2,4 @@ source: https://www.securityfocus.com/bid/9586/info
|
|||
|
||||
A vulnerability has been reported to reside in the 'shmat()' system call used in the BSD kernel. Exploiting this issue may allow a local attacker to inject instructions into the memory of a privileged process.
|
||||
|
||||
https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/23655.tar.gz
|
||||
https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/23655.tar.gz
|
|
@ -3,7 +3,7 @@ This exploit was leaked on the Full Disclosure mailing list:
|
|||
http://seclists.org/fulldisclosure/2012/Jun/404
|
||||
|
||||
|
||||
Exploit-DB Mirror: https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/19520.zip
|
||||
Exploit-DB Mirror: https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/19520.zip
|
||||
|
||||
|
||||
BSD telnetd Remote Root Exploit *ZERODAY*
|
||||
|
|
|
@ -105,5 +105,4 @@ References
|
|||
|
||||
|
||||
* Vendor advisory: http://www.getmura.com/index.cfm/blog/critical-security-patch/
|
||||
* CVE item: CVE-2010-3468
|
||||
|
||||
* CVE item: CVE-2010-3468
|
|
@ -6,6 +6,4 @@ Dork : intext:"Powered by Alcassoft SOPHIA"
|
|||
SQL
|
||||
---
|
||||
|
||||
http://site.com/path/dsp_page.cfm?pageid=[SQL]
|
||||
|
||||
|
||||
http://site.com/path/dsp_page.cfm?pageid=[SQL]
|
|
@ -129,4 +129,4 @@ be somewhere in the html output\n";
|
|||
print $recv;
|
||||
print "the above is received from the server, if you have a 404 or 403, theres somethin wrong
|
||||
if not, and no command output, try again..
|
||||
if command ouput buggy, convert \\v to \\n with tr\n";
|
||||
if command ouput buggy, convert \\v to \\n with tr\n";
|
|
@ -47,4 +47,4 @@ chmod -R 777 /mail/tmp/
|
|||
|
||||
## Create smb backup mount point
|
||||
/bin/mkdir -p /mnt/smb/
|
||||
chmod 777 /mnt/smb/
|
||||
chmod 777 /mnt/smb/
|
|
@ -12,7 +12,4 @@ Cookie: cosign=X
|
|||
Content-Type: application/x-www-form-urlencoded
|
||||
Content-Length: N
|
||||
|
||||
required=&ref=https%3A%2F%2Fweblogin.example.com%2F&service=cosign-servicename=Y%0DLOGIN cosign=X2 1.2.3.4 username%0DREGISTER cosign=X2 1.2.3.4 cosign-servicename=Y2&login=test&password=pass&passcode=&doLogin=Log+In
|
||||
|
||||
|
||||
|
||||
required=&ref=https%3A%2F%2Fweblogin.example.com%2F&service=cosign-servicename=Y%0DLOGIN cosign=X2 1.2.3.4 username%0DREGISTER cosign=X2 1.2.3.4 cosign-servicename=Y2&login=test&password=pass&passcode=&doLogin=Log+In
|
|
@ -41,5 +41,4 @@
|
|||
|
||||
Raw Response: MTI3LjAuMC4xCWxvY2FsaG9zdC5sb2NhbGRvbWFpbglsb2NhbGhvc3QK
|
||||
|
||||
Base64 Decoded: 127.0.0.1 localhost.localdomain localhost
|
||||
|
||||
Base64 Decoded: 127.0.0.1 localhost.localdomain localhost
|
|
@ -5,4 +5,4 @@
|
|||
|
||||
|
||||
Full Exploit:
|
||||
https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/40272.zip
|
||||
https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/40272.zip
|
|
@ -5,4 +5,4 @@
|
|||
|
||||
|
||||
Full Exploit:
|
||||
https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/40273.zip
|
||||
https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/40273.zip
|
Some files were not shown because too many files have changed in this diff Show more
Loading…
Add table
Reference in a new issue