From ec8ac60c1322b94d03a11a6d84e8892136fb7c60 Mon Sep 17 00:00:00 2001 From: Offensive Security Date: Tue, 22 Nov 2022 11:08:59 +0000 Subject: [PATCH] DB: 2022-11-22 93 changes to exploits/shellcodes/ghdb --- exploits/hardware/dos/13823.txt | 2 +- exploits/hardware/remote/12298.txt | 2 +- exploits/linux/dos/34278.txt | 2 +- exploits/linux/local/22189.txt | 2 +- exploits/linux/local/22190.txt | 2 +- exploits/linux/local/31911.txt | 2 +- exploits/linux/local/9191.txt | 2 +- exploits/linux/local/9627.txt | 2 +- exploits/linux/remote/29769.txt | 2 +- exploits/linux/remote/29770.txt | 2 +- exploits/linux/remote/35314.txt | 2 +- exploits/multiple/dos/10205.txt | 2 +- exploits/multiple/dos/14268.txt | 2 +- exploits/multiple/dos/18600.txt | 2 +- exploits/multiple/dos/18877.txt | 2 +- exploits/multiple/dos/23902.txt | 2 +- exploits/multiple/dos/30498.txt | 2 +- exploits/multiple/dos/30990.txt | 2 +- exploits/multiple/dos/34270.txt | 2 +- exploits/multiple/dos/8826.txt | 2 +- exploits/multiple/remote/20139.txt | 2 +- exploits/multiple/remote/25205.txt | 2 +- exploits/multiple/remote/25574.txt | 2 +- exploits/multiple/remote/25691.txt | 2 +- exploits/multiple/remote/28344.txt | 2 +- exploits/multiple/remote/33802.txt | 2 +- exploits/multiple/remote/33847.txt | 2 +- exploits/multiple/remote/34271.txt | 2 +- exploits/multiple/remote/35062.txt | 2 +- exploits/php/webapps/22089.txt | 2 +- exploits/solaris/remote/5282.txt | 2 +- exploits/windows/dos/10204.txt | 2 +- exploits/windows/dos/11632.txt | 2 +- exploits/windows/dos/14949.py | 2 +- exploits/windows/dos/15027.py | 2 +- exploits/windows/dos/17159.txt | 2 +- exploits/windows/dos/17830.txt | 2 +- exploits/windows/dos/17835.txt | 2 +- exploits/windows/dos/17842.txt | 2 +- exploits/windows/dos/17844.txt | 2 +- exploits/windows/dos/17885.txt | 2 +- exploits/windows/dos/17889.txt | 2 +- exploits/windows/dos/17963.txt | 2 +- exploits/windows/dos/17965.txt | 2 +- exploits/windows/dos/18166.txt | 2 +- exploits/windows/dos/18633.txt | 2 +- exploits/windows/dos/18739.txt | 2 +- exploits/windows/dos/18765.txt | 2 +- exploits/windows/dos/18864.txt | 2 +- exploits/windows/dos/18964.txt | 2 +- exploits/windows/dos/19289.txt | 2 +- exploits/windows/dos/19335.txt | 2 +- exploits/windows/dos/19409.txt | 2 +- exploits/windows/dos/19456.txt | 2 +- exploits/windows/dos/19483.txt | 2 +- exploits/windows/dos/20255.txt | 2 +- exploits/windows/dos/22395.txt | 2 +- exploits/windows/dos/25991.txt | 2 +- exploits/windows/dos/25992.txt | 2 +- exploits/windows/dos/26869.txt | 4 ++-- exploits/windows/dos/31300.txt | 2 +- exploits/windows/dos/33710.txt | 2 +- exploits/windows/dos/33711.txt | 2 +- exploits/windows/dos/35895.txt | 2 +- exploits/windows/dos/4335.txt | 2 +- exploits/windows/dos/9167.txt | 2 +- exploits/windows/dos/9169.py | 2 +- exploits/windows/dos/9170.txt | 2 +- exploits/windows/local/14744.c | 2 +- exploits/windows/local/20257.txt | 2 +- exploits/windows/local/20265.txt | 2 +- exploits/windows/local/31667.txt | 2 +- exploits/windows/local/3260.txt | 2 +- exploits/windows/local/32891.txt | 2 +- exploits/windows/local/32892.txt | 2 +- exploits/windows/local/32893.txt | 2 +- exploits/windows/local/5320.txt | 2 +- exploits/windows/local/7054.txt | 2 +- exploits/windows/local/8250.txt | 2 +- exploits/windows/remote/17104.txt | 2 +- exploits/windows/remote/17105.txt | 2 +- exploits/windows/remote/22288.txt | 2 +- exploits/windows/remote/23131.txt | 2 +- exploits/windows/remote/23283.txt | 2 +- exploits/windows/remote/23340.txt | 2 +- exploits/windows/remote/27758.txt | 2 +- exploits/windows/remote/27759.txt | 2 +- exploits/windows/remote/27760.txt | 2 +- exploits/windows/remote/31409.txt | 2 +- exploits/windows/remote/32699.txt | 2 +- exploits/windows/remote/33712.txt | 2 +- exploits/windows/remote/4188.txt | 2 +- exploits/windows/remote/4334.txt | 2 +- 93 files changed, 94 insertions(+), 94 deletions(-) diff --git a/exploits/hardware/dos/13823.txt b/exploits/hardware/dos/13823.txt index 839999428..d8db7541f 100644 --- a/exploits/hardware/dos/13823.txt +++ b/exploits/hardware/dos/13823.txt @@ -1,3 +1,3 @@ I wrote a fuzzer "dumb fuzzer" and used a sample from http://www.ccp14.ac.uk/ccp/web-mirrors/bca-spreadsheets/scanplot101.xls which I randomly found on the internet. I mutated the data and tested roughly 1000 cases on several Document Reader Applications for iPhone. -https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/13823.xls (savysoda_poc.xls) \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/13825.xls (savysoda_poc.xls) \ No newline at end of file diff --git a/exploits/hardware/remote/12298.txt b/exploits/hardware/remote/12298.txt index f27d65885..ad2459d2e 100644 --- a/exploits/hardware/remote/12298.txt +++ b/exploits/hardware/remote/12298.txt @@ -9,7 +9,7 @@ # V100R001B121Telmex # Exploit Download Link: # http://www.hakim.ws/huawei/HG520_udpinfo.tar.gz -# https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/12298.tar.gz (HG520_udpinfo.tar.gz) +# https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/33869.tar.gz (HG520_udpinfo.tar.gz) By sending a specially crafted UDP packet you can remotely obtain the diff --git a/exploits/linux/dos/34278.txt b/exploits/linux/dos/34278.txt index 0cb37a32b..9d90aa797 100644 --- a/exploits/linux/dos/34278.txt +++ b/exploits/linux/dos/34278.txt @@ -4,4 +4,4 @@ LibTIFF is prone to a denial-of-service vulnerability because it fails to proper An attacker can exploit this issue to crash an application that uses the vulnerable library, denying service to legitimate users. -https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/34278.tif \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/34279.tif \ No newline at end of file diff --git a/exploits/linux/local/22189.txt b/exploits/linux/local/22189.txt index c57529413..55babcc4c 100644 --- a/exploits/linux/local/22189.txt +++ b/exploits/linux/local/22189.txt @@ -4,4 +4,4 @@ mtink is prone to a locally exploitable buffer overflow condition. This is due t mtink is reportedly installed setgid 'sys' on Mandrake Linux, so it is possible that this issue may be exploited to execute arbitrary code with elevated privileges. Other distributions may also be affected if mtink is installed or runs with elevated privileges. -https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/22189.tar.gz \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/21001.tar.gz \ No newline at end of file diff --git a/exploits/linux/local/22190.txt b/exploits/linux/local/22190.txt index c5e07c16b..8b5521c3e 100644 --- a/exploits/linux/local/22190.txt +++ b/exploits/linux/local/22190.txt @@ -4,4 +4,4 @@ It has been reported that a buffer overflow in escputil exists. When supplied wi escputil is reportedly installed setgid 'sys' on Mandrake Linux, so it is possible that this issue may be exploited to execute arbitrary code with elevated privileges. Other distributions may also be affected if the utility is installed or runs with elevated privileges. -https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/22190.tar.gz \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/21001.tar.gz \ No newline at end of file diff --git a/exploits/linux/local/31911.txt b/exploits/linux/local/31911.txt index fd91eb8a7..37b252397 100644 --- a/exploits/linux/local/31911.txt +++ b/exploits/linux/local/31911.txt @@ -6,6 +6,6 @@ Successfully exploiting these issues can allow an attacker to execute arbitrary Vim 7.1.298 is vulnerable; other versions may also be affected. -https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/31911-1.zip +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/32055.zip https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/31911-2.zip https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/31911-3.zip \ No newline at end of file diff --git a/exploits/linux/local/9191.txt b/exploits/linux/local/9191.txt index 2cbf87d1d..8bbf1e405 100644 --- a/exploits/linux/local/9191.txt +++ b/exploits/linux/local/9191.txt @@ -301,6 +301,6 @@ http://grsecurity.net/~spender/cheddar_bay.tgz -backup: https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/9191.tgz (2009-cheddar_bay.tgz) +backup: https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/33088-2.tgz (2009-cheddar_bay.tgz) # milw0rm.com [2009-07-17] \ No newline at end of file diff --git a/exploits/linux/local/9627.txt b/exploits/linux/local/9627.txt index 0af543eb4..172f0bfff 100644 --- a/exploits/linux/local/9627.txt +++ b/exploits/linux/local/9627.txt @@ -37,6 +37,6 @@ */ http://www.grsecurity.net/~spender/enlightenment.tgz -back: https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/9627.tgz (2009-enlightenment.tgz) +back: https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/33088-1.tgz (2009-enlightenment.tgz) # milw0rm.com [2009-09-10] \ No newline at end of file diff --git a/exploits/linux/remote/29769.txt b/exploits/linux/remote/29769.txt index a753d0e95..d89e9c062 100644 --- a/exploits/linux/remote/29769.txt +++ b/exploits/linux/remote/29769.txt @@ -4,4 +4,4 @@ Opera is prone to vulnerability that may allow attackers to obtain potentially s A successful exploit of this issue would cause the affected application to connect to arbitrary TCP ports and potentially reveal sensitive information about services that are running on the affected computer. Information obtained may aid attackers in further attacks. -https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/29769.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/29768.zip \ No newline at end of file diff --git a/exploits/linux/remote/29770.txt b/exploits/linux/remote/29770.txt index 07fb4a717..17186c8a6 100644 --- a/exploits/linux/remote/29770.txt +++ b/exploits/linux/remote/29770.txt @@ -4,4 +4,4 @@ KDE Konqueror is prone to a vulnerability that may allow attackers to obtain pot A successful exploit of this issue would cause the affected application to connect to arbitrary TCP ports and potentially reveal sensitive information about services that are running on the affected computer. Information obtained may aid attackers in further attacks. -https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/29770.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/29768.zip \ No newline at end of file diff --git a/exploits/linux/remote/35314.txt b/exploits/linux/remote/35314.txt index 0480376b3..aac35e4d8 100644 --- a/exploits/linux/remote/35314.txt +++ b/exploits/linux/remote/35314.txt @@ -4,4 +4,4 @@ Wireshark is prone to a memory-corruption vulnerability because it fails to prop Successful exploits may allow attackers to execute arbitrary code within the context of the affected application. Failed exploit attempts will likely crash the application. -https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/35314.pcap \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/36128.pcap \ No newline at end of file diff --git a/exploits/multiple/dos/10205.txt b/exploits/multiple/dos/10205.txt index 556f7bbe0..f55e0ed0f 100644 --- a/exploits/multiple/dos/10205.txt +++ b/exploits/multiple/dos/10205.txt @@ -168,4 +168,4 @@ An attacker can exploit this issue to execute arbitrary malicious code in the co LibTIFF 3.8.2 is vulnerable; other versions may be affected as well. -https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/10205.zip (2009-11-22-35451.zip) \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/33049.zip (2009-11-22-35451.zip) \ No newline at end of file diff --git a/exploits/multiple/dos/14268.txt b/exploits/multiple/dos/14268.txt index 621520918..a6661eab2 100644 --- a/exploits/multiple/dos/14268.txt +++ b/exploits/multiple/dos/14268.txt @@ -69,7 +69,7 @@ Multi-Computer Virtual Whiteboard and so on. http://aluigi.org/poc/qtsslame.zip or -https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/14268.zip (qtsslame.zip) +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/34227.zip (qtsslame.zip) ####################################################################### diff --git a/exploits/multiple/dos/18600.txt b/exploits/multiple/dos/18600.txt index c947a43b4..8918cdfae 100644 --- a/exploits/multiple/dos/18600.txt +++ b/exploits/multiple/dos/18600.txt @@ -104,7 +104,7 @@ bytes. http://aluigi.org/testz/udpsz.zip -https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/18600.zip +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/18112.zip A] udpsz -T -C "00000100 ffff0200" 0 -b a -C "00 00 1000000000000000 00" -1 SERVER 2502 8+0x02ffff diff --git a/exploits/multiple/dos/18877.txt b/exploits/multiple/dos/18877.txt index 86617ad34..f246b5078 100644 --- a/exploits/multiple/dos/18877.txt +++ b/exploits/multiple/dos/18877.txt @@ -94,7 +94,7 @@ INCREMENT SYSAM_LICENSE_SERVER SYBASE 2.0 permanent 1 ISSUER="Sybase, \ http://aluigi.org/testz/udpsz.zip -https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/18877.zip +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/18112.zip udpsz -D -T -C "2f 24 189d 4000 0000 0000 00000000 00000000 0000" -b 0x61 SERVER 27000 0x4000 diff --git a/exploits/multiple/dos/23902.txt b/exploits/multiple/dos/23902.txt index 7336d0bed..6153d2c09 100644 --- a/exploits/multiple/dos/23902.txt +++ b/exploits/multiple/dos/23902.txt @@ -4,4 +4,4 @@ Roger Wilco Server has been reported prone to a remote denial of service vulnera A remote attacker may exploit this condition to deny service to legitimate users. -https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/23902.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/23904.zip \ No newline at end of file diff --git a/exploits/multiple/dos/30498.txt b/exploits/multiple/dos/30498.txt index d8b7c0c26..757a8b0c7 100644 --- a/exploits/multiple/dos/30498.txt +++ b/exploits/multiple/dos/30498.txt @@ -4,4 +4,4 @@ Live For Speed is prone to four vulnerabilities, including buffer-overflow and d Successful exploits could allow attackers to execute arbitrary code or to crash game servers. -https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/30498.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/33182-2.zip \ No newline at end of file diff --git a/exploits/multiple/dos/30990.txt b/exploits/multiple/dos/30990.txt index d340bc9e4..7dbc4486e 100644 --- a/exploits/multiple/dos/30990.txt +++ b/exploits/multiple/dos/30990.txt @@ -7,4 +7,4 @@ An attacker can exploit this issue to crash the affected application, denying se This issue affects Foxit WAC Server 2.0 Build 3503 and prior versions. https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/30990-1.zip -https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/30990-2.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/31232.zip \ No newline at end of file diff --git a/exploits/multiple/dos/34270.txt b/exploits/multiple/dos/34270.txt index 992424982..85747a97e 100644 --- a/exploits/multiple/dos/34270.txt +++ b/exploits/multiple/dos/34270.txt @@ -6,4 +6,4 @@ Successful exploits may allow attackers to cause denial-of-service conditions. D GRAW 1.35 and GRAW 2 1.05 are vulnerable; other versions may also be affected. -https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/34270.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/14286.zip \ No newline at end of file diff --git a/exploits/multiple/dos/8826.txt b/exploits/multiple/dos/8826.txt index 361a2bba2..046b831c6 100644 --- a/exploits/multiple/dos/8826.txt +++ b/exploits/multiple/dos/8826.txt @@ -1,5 +1,5 @@ Acrobat <= 9.1.1 Stack Overflow Crashy PoC -https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/8826.pdf (2009-crashy_the_clown.pdf) +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/33017.pdf (2009-crashy_the_clown.pdf) # milw0rm.com [2009-05-29] \ No newline at end of file diff --git a/exploits/multiple/remote/20139.txt b/exploits/multiple/remote/20139.txt index 4f1240254..2daa04f17 100644 --- a/exploits/multiple/remote/20139.txt +++ b/exploits/multiple/remote/20139.txt @@ -16,4 +16,4 @@ By combining these two flaws a malicious applet can accept connections from any Both Netscape and Microsoft Java Virtual Machines are affected by this vulnerability, however in Microsoft products the file: URL type will not be effective in reading files, meaning that only web-available documents can be retreived via this method. However, the file: method will verify the existence of a file. It will check to see if the file exists and if it does not, it will return a SecurityException error message. Netscape browsers will pass both web documents and local files to the attacker. -https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/20139.tar.gz \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/20140.tar.gz \ No newline at end of file diff --git a/exploits/multiple/remote/25205.txt b/exploits/multiple/remote/25205.txt index 7a959bc63..cf3f4e4ad 100644 --- a/exploits/multiple/remote/25205.txt +++ b/exploits/multiple/remote/25205.txt @@ -4,4 +4,4 @@ A remote format string vulnerability affects XPand Rally. This issue is due to a An attacker may leverage this issue to execute arbitrary code with the privileges of an unsuspecting user that activated the vulnerable server or client application. -https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/25205.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/25574-1.zip \ No newline at end of file diff --git a/exploits/multiple/remote/25574.txt b/exploits/multiple/remote/25574.txt index 34b5f96dd..494237ba5 100644 --- a/exploits/multiple/remote/25574.txt +++ b/exploits/multiple/remote/25574.txt @@ -6,4 +6,4 @@ An attacker may leverage this issue to execute arbitrary code with the privilege https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/25574-1.zip -https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/25574-2.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/25584.zip \ No newline at end of file diff --git a/exploits/multiple/remote/25691.txt b/exploits/multiple/remote/25691.txt index f702a58fd..7c3fa7365 100644 --- a/exploits/multiple/remote/25691.txt +++ b/exploits/multiple/remote/25691.txt @@ -6,4 +6,4 @@ This vulnerability allows remote attackers to crash affected game servers. Due t https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/25691-1.zip -https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/25691-2.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/25692.zip \ No newline at end of file diff --git a/exploits/multiple/remote/28344.txt b/exploits/multiple/remote/28344.txt index 6f1ca39e1..8b9b585df 100644 --- a/exploits/multiple/remote/28344.txt +++ b/exploits/multiple/remote/28344.txt @@ -6,4 +6,4 @@ This issue allows remote attackers to execute arbitrary code within the context Version 0.7.0, CVS July 30th 2006 and prior versions are vulnerable to this issue. -https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/28344.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/28345.zip \ No newline at end of file diff --git a/exploits/multiple/remote/33802.txt b/exploits/multiple/remote/33802.txt index 1b15f19de..7d0e45783 100644 --- a/exploits/multiple/remote/33802.txt +++ b/exploits/multiple/remote/33802.txt @@ -6,4 +6,4 @@ An attacker can exploit this issue to execute arbitrary code with the privileges RakNet 3.72 is affected; other versions may be vulnerable as well. -https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/33802.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/14286.zip \ No newline at end of file diff --git a/exploits/multiple/remote/33847.txt b/exploits/multiple/remote/33847.txt index f08b6d855..6e1e7feab 100644 --- a/exploits/multiple/remote/33847.txt +++ b/exploits/multiple/remote/33847.txt @@ -6,4 +6,4 @@ Successful exploits can allow remote attackers to execute arbitrary machine code netkar-PRO 1.1 is vulnerable; other versions may also be affected. -https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/33847.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/33849.zip \ No newline at end of file diff --git a/exploits/multiple/remote/34271.txt b/exploits/multiple/remote/34271.txt index f1e19a16c..506c3e3c4 100644 --- a/exploits/multiple/remote/34271.txt +++ b/exploits/multiple/remote/34271.txt @@ -9,4 +9,4 @@ The following applications include the vulnerable engine: Enemy Territory: Quake Wars 1.5.12642.33243 and prior Wolfenstein 1.3.344272 and prior -https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/34271.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/14286.zip \ No newline at end of file diff --git a/exploits/multiple/remote/35062.txt b/exploits/multiple/remote/35062.txt index 5012efeef..a124af91a 100644 --- a/exploits/multiple/remote/35062.txt +++ b/exploits/multiple/remote/35062.txt @@ -6,4 +6,4 @@ Successful exploits may allow an attacker to execute arbitrary code in the conte The issue affects lm_tcp <= 9.0.0 0248.18.0.0; other versions may also be affected. -https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/35062.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/15707.zip \ No newline at end of file diff --git a/exploits/php/webapps/22089.txt b/exploits/php/webapps/22089.txt index 943240407..f1172e1e4 100644 --- a/exploits/php/webapps/22089.txt +++ b/exploits/php/webapps/22089.txt @@ -4,4 +4,4 @@ A vulnerability has been discovered in the PHP-Nuke Web Mail module. When a user By accessing a PHP script located in the web directory, arbitrary PHP commands will be executed on the target server. -https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/22089.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/22090.zip \ No newline at end of file diff --git a/exploits/solaris/remote/5282.txt b/exploits/solaris/remote/5282.txt index f5ab9a64e..1200b2840 100644 --- a/exploits/solaris/remote/5282.txt +++ b/exploits/solaris/remote/5282.txt @@ -1,5 +1,5 @@ Sun Solaris <= 10 rpc.ypupdated Remote Root Exploit -https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/5282.tar.gz (2008-ypk2008.tar.gz) +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/20259.tar.gz (2008-ypk2008.tar.gz) # milw0rm.com [2008-03-20] \ No newline at end of file diff --git a/exploits/windows/dos/10204.txt b/exploits/windows/dos/10204.txt index 9eb7b258d..f2f91300e 100644 --- a/exploits/windows/dos/10204.txt +++ b/exploits/windows/dos/10204.txt @@ -14,4 +14,4 @@ Foxit Reader is prone to a remote code-execution vulnerability because is fails An attacker can exploit this issue by supplying a malicious PDF file or webpage. Successful exploits may allow the attacker to execute arbitrary code in the context of a user running the affected application. Failed attempts will likely result in denial-of-service conditions. -Exploit-DB Mirror: https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/10204.tar (2009-11-22-36668.tar) \ No newline at end of file +Exploit-DB Mirror: https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/33283.tar (2009-11-22-36668.tar) \ No newline at end of file diff --git a/exploits/windows/dos/11632.txt b/exploits/windows/dos/11632.txt index 1fd1e79a4..c522f4a77 100644 --- a/exploits/windows/dos/11632.txt +++ b/exploits/windows/dos/11632.txt @@ -1,7 +1,7 @@ When Orb is first installed it registers several Direct Show filters with the system. When registered these filters are then called whenever a file which has a dependency on such a required filter is accessed. By specially crafting specific headers embedded into an mp3 file we can create a direct code path to code which is vulnerable to a integer division by zero. This vulnerability can be triggered remotely be embedding the crafted mp3 file into HTML. It is also not dependent on a certain media player. Attached is a PoC (Proof-Of-Concept) I wrote for this specific bug. Also included is a Rebuild file for IDA Pro examining the crash. Download POC: -https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/11632.zip (aac_parser_int_div_by_0_orb.zip) +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/33707.zip (aac_parser_int_div_by_0_orb.zip) Timeline: diff --git a/exploits/windows/dos/14949.py b/exploits/windows/dos/14949.py index 938691377..402cd24b9 100755 --- a/exploits/windows/dos/14949.py +++ b/exploits/windows/dos/14949.py @@ -7,7 +7,7 @@ |_| |_|\____/_/ \_\____/|____/ http://www.exploit-db.com/moaub-9-mozilla-firefox-xslt-sort-remote-code-execution-vulnerability/ - https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/14949.zip (moaub-day9-ba.zip) + https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/34192.zip (moaub-day9-ba.zip) ''' diff --git a/exploits/windows/dos/15027.py b/exploits/windows/dos/15027.py index 251f6d4df..c5f6f4ebf 100755 --- a/exploits/windows/dos/15027.py +++ b/exploits/windows/dos/15027.py @@ -7,7 +7,7 @@ |_| |_|\____/_/ \_\____/|____/ http://www.exploit-db.com/moaub-17-firefox-plugin-parameter-ensurecachedattrparamarrays-remote-code-execution/ -https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/15027.zip (moaub-17-exploit.zip) +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/34358.zip (moaub-17-exploit.zip) ''' ''' Title : Firefox Plugin Parameter EnsureCachedAttrParamArrays Remote Code Execution diff --git a/exploits/windows/dos/17159.txt b/exploits/windows/dos/17159.txt index 7985b1fd3..3d8bc5be3 100644 --- a/exploits/windows/dos/17159.txt +++ b/exploits/windows/dos/17159.txt @@ -202,7 +202,7 @@ K (maybe)] http://aluigi.org/poc/snabase_1.zip -https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/17159.zip +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/36211.zip A] nc SERVER PORT < snabase_1a.dat diff --git a/exploits/windows/dos/17830.txt b/exploits/windows/dos/17830.txt index 3e4a3a5df..5d3fc7af4 100644 --- a/exploits/windows/dos/17830.txt +++ b/exploits/windows/dos/17830.txt @@ -208,7 +208,7 @@ flow and executing code under SYSTEM privileges. http://aluigi.org/testz/udpsz.zip -https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/17830.zip (udpsz.zip) +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/15992.zip (udpsz.zip) udpsz -C 00140004 -b a -l 0 -T 0xffffffff SERVER 42 0x140008 diff --git a/exploits/windows/dos/17835.txt b/exploits/windows/dos/17835.txt index 2482a7848..abcd37d9e 100644 --- a/exploits/windows/dos/17835.txt +++ b/exploits/windows/dos/17835.txt @@ -54,7 +54,7 @@ Denial of Service caused by an invalid read access. http://aluigi.org/testz/udpsz.zip -https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/17835.zip +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/15707.zip udpsz -C "03 66 14 71 00 00 00 00 06 00 00 00 0a ff ff 02 01 01 10 27" -b 0xff SERVER 48899 0x5fe diff --git a/exploits/windows/dos/17842.txt b/exploits/windows/dos/17842.txt index 8ff154344..592266113 100644 --- a/exploits/windows/dos/17842.txt +++ b/exploits/windows/dos/17842.txt @@ -83,7 +83,7 @@ buffer of 8192 bytes for containing the incoming HTTP requests. http://aluigi.org/testz/udpsz.zip -https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/17842-2.dat +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/15707.zip udpsz -T -b 0x61 SERVER 808 10000 diff --git a/exploits/windows/dos/17844.txt b/exploits/windows/dos/17844.txt index 08552e6a8..47f349d4f 100644 --- a/exploits/windows/dos/17844.txt +++ b/exploits/windows/dos/17844.txt @@ -126,7 +126,7 @@ for executing any desired custom command. http://aluigi.org/testz/udpsz.zip -https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/17844-1.zip +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/15707.zip only a simple scanner: udpsz -d 2 -c "xx%" -b a -X 0 16 l 0x6161 -T -l 0 SERVER 11234 0x2000 diff --git a/exploits/windows/dos/17885.txt b/exploits/windows/dos/17885.txt index 80284ae71..c25f71b23 100644 --- a/exploits/windows/dos/17885.txt +++ b/exploits/windows/dos/17885.txt @@ -238,7 +238,7 @@ effect. http://aluigi.org/testz/udpsz.zip (version 0.3.3) -https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/17885-1.zip +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/17879.zip A] udpsz -T -C "08000000 00000000 ffffffff" -b a SERVER 8800 0x400 diff --git a/exploits/windows/dos/17889.txt b/exploits/windows/dos/17889.txt index 4aadad4b8..f88f223d3 100644 --- a/exploits/windows/dos/17889.txt +++ b/exploits/windows/dos/17889.txt @@ -89,7 +89,7 @@ integer overflow vulnerability: http://aluigi.org/testz/udpsz.zip -https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/17889.zip +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/17879.zip udpsz -b a -T -c "1=4294967279~2=0~" SERVER PORT 0xffff diff --git a/exploits/windows/dos/17963.txt b/exploits/windows/dos/17963.txt index 7fabecd64..bb031f51f 100644 --- a/exploits/windows/dos/17963.txt +++ b/exploits/windows/dos/17963.txt @@ -111,7 +111,7 @@ http://aluigi.org/mytoolz/mydown.zip https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/17963-1.zip http://aluigi.org/testz/udpsz.zip -https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/17963-2.zip +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/17879.zip A] mydown http://SERVER/..\..\..\..\..\..\..\boot.ini diff --git a/exploits/windows/dos/17965.txt b/exploits/windows/dos/17965.txt index 09f7cfd1b..7212f0b8c 100644 --- a/exploits/windows/dos/17965.txt +++ b/exploits/windows/dos/17965.txt @@ -58,7 +58,7 @@ No additional research performed. http://aluigi.org/testz/udpsz.zip -https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/17965.zip +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/17879.zip udpsz -l 2000 -c ".NET\1\0\0\0\0\0\xff\xff\xff\xff\4\0\1\1\x25\0\0\0tcp://127.0.0.1/OPC Systems Interface\6\0\1\1" -T SERVER 58723 0x80 diff --git a/exploits/windows/dos/18166.txt b/exploits/windows/dos/18166.txt index eaf978b81..4a3485849 100644 --- a/exploits/windows/dos/18166.txt +++ b/exploits/windows/dos/18166.txt @@ -194,7 +194,7 @@ number or on the sum of both: http://aluigi.org/testz/udpsz.zip -https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/18166-1.zip +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/18112.zip A] udpsz -C "0004 02 00 00 00 ffffffff" -b a -T SERVER 2308 2+0x400 diff --git a/exploits/windows/dos/18633.txt b/exploits/windows/dos/18633.txt index 8e2e45919..f40233dcc 100644 --- a/exploits/windows/dos/18633.txt +++ b/exploits/windows/dos/18633.txt @@ -91,4 +91,4 @@ a use-after-free by e.g. tricking a user into opening a specially crafted file. =========== http://www.protekresearchlab.com/exploits/PRL-2012-07.tif -https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/18633.tif \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/19338.tif \ No newline at end of file diff --git a/exploits/windows/dos/18739.txt b/exploits/windows/dos/18739.txt index ece7158b9..ae3b17f5e 100644 --- a/exploits/windows/dos/18739.txt +++ b/exploits/windows/dos/18739.txt @@ -62,7 +62,7 @@ and can be exploited to cause a heap-based buffer overflow via a specially craft 4) The PoC ============= -https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/18739.fpx +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/19960.fpx ############################################################################### \ No newline at end of file diff --git a/exploits/windows/dos/18765.txt b/exploits/windows/dos/18765.txt index 46fb5365d..232666e9a 100644 --- a/exploits/windows/dos/18765.txt +++ b/exploits/windows/dos/18765.txt @@ -87,7 +87,7 @@ Stack overflow in the BackupToAvi method used by the ActiveX components A] http://aluigi.org/testz/udpsz.zip -https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/18765-1.zip +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/18112.zip NiwMasterService: udpsz -b 0x80 -T SERVER 4505 0x28 diff --git a/exploits/windows/dos/18864.txt b/exploits/windows/dos/18864.txt index 67c064354..a8074fbc8 100644 --- a/exploits/windows/dos/18864.txt +++ b/exploits/windows/dos/18864.txt @@ -82,7 +82,7 @@ advisory must be considered only a case study and nothing more. http://aluigi.org/testz/udpsz.zip -https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/18864.zip +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/18112.zip A] diff --git a/exploits/windows/dos/18964.txt b/exploits/windows/dos/18964.txt index fe87f8781..11765d8f7 100644 --- a/exploits/windows/dos/18964.txt +++ b/exploits/windows/dos/18964.txt @@ -65,4 +65,4 @@ and can be exploited to cause a heap-based buffer overflow via a specially craft ============= http://protekresearchlab.com/exploits/PRL-2012-10.ecw -https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/18964.ecw \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/19182.ecw \ No newline at end of file diff --git a/exploits/windows/dos/19289.txt b/exploits/windows/dos/19289.txt index 5d3764348..2e625e3d4 100644 --- a/exploits/windows/dos/19289.txt +++ b/exploits/windows/dos/19289.txt @@ -63,7 +63,7 @@ The vulnerability is located in the lupin3 (libpin3) library. http://aluigi.org/testz/udpsz.zip -https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/19289.zip +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/15992.zip udpsz -c "POST /DocumentViewer/Control/blah HTTP/1.1\r\nCONTENT-LENGTH: 2147483647\r\n\r\n" -T SERVER 9500 -1 or diff --git a/exploits/windows/dos/19335.txt b/exploits/windows/dos/19335.txt index 7e7fc0dee..8b7548edb 100644 --- a/exploits/windows/dos/19335.txt +++ b/exploits/windows/dos/19335.txt @@ -61,4 +61,4 @@ The vulnerabilities are confirmed in version 1.98.8. Other versions may also be =========== http://protekresearchlab.com/exploits/PRL-2012-18.gif -https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/19335.gif \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/37347.gif \ No newline at end of file diff --git a/exploits/windows/dos/19409.txt b/exploits/windows/dos/19409.txt index 01467c828..50be3d261 100644 --- a/exploits/windows/dos/19409.txt +++ b/exploits/windows/dos/19409.txt @@ -158,7 +158,7 @@ the specified size to reallocate is negative or unallocable: http://aluigi.org/testz/udpsz.zip -https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/19409.zip +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/15992.zip A] udpsz -b a -T -C 15 0x14 -C "e6563600 e6563600" 0x15 SERVER 46824 0x119 diff --git a/exploits/windows/dos/19456.txt b/exploits/windows/dos/19456.txt index f79543da0..8dd7b4a0c 100644 --- a/exploits/windows/dos/19456.txt +++ b/exploits/windows/dos/19456.txt @@ -79,7 +79,7 @@ Service. http://aluigi.org/testz/udpsz.zip -https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/19456.zip +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/15992.zip udpsz -T -b 0x41 -C "11 00" SERVER 1804 100 diff --git a/exploits/windows/dos/19483.txt b/exploits/windows/dos/19483.txt index 458d42226..207fd5cb6 100644 --- a/exploits/windows/dos/19483.txt +++ b/exploits/windows/dos/19483.txt @@ -20,7 +20,7 @@ html POC file posted at: http://www.reactionpenetrationtesting.co.uk/vuln.jls -https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/19483.jls +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/21741.jls Affected Products diff --git a/exploits/windows/dos/20255.txt b/exploits/windows/dos/20255.txt index 110b9de00..39b8b5ff2 100644 --- a/exploits/windows/dos/20255.txt +++ b/exploits/windows/dos/20255.txt @@ -9,4 +9,4 @@ This vulnerability can only be launched against a machine a user can interactive start porttool -s6 \BaseNamedObjects\Foo porttool -c6 \BaseNamedObject\Foo -https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/20255.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/20254.zip \ No newline at end of file diff --git a/exploits/windows/dos/22395.txt b/exploits/windows/dos/22395.txt index 01c0fe9fe..101a6501b 100644 --- a/exploits/windows/dos/22395.txt +++ b/exploits/windows/dos/22395.txt @@ -6,4 +6,4 @@ The vulnerability occurs when numerous chat dialog boxes are opened by the eDonk An attacker can exploit this vulnerability by connecting to a vulnerable eDonkey user and issuing numerous chat requests. -https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/22395.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/22420.zip \ No newline at end of file diff --git a/exploits/windows/dos/25991.txt b/exploits/windows/dos/25991.txt index 9e0d33aa6..ad8e55fd6 100644 --- a/exploits/windows/dos/25991.txt +++ b/exploits/windows/dos/25991.txt @@ -6,4 +6,4 @@ This issue was identified by creating random input for the browser, and has not Successful exploitation may result in execution of arbitrary code in the context of the user executing the affected browser. -https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/25991.jpg \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/25992-1.jpg \ No newline at end of file diff --git a/exploits/windows/dos/25992.txt b/exploits/windows/dos/25992.txt index 857a2bee8..52416b099 100644 --- a/exploits/windows/dos/25992.txt +++ b/exploits/windows/dos/25992.txt @@ -8,4 +8,4 @@ Successful exploitation results in crashing the affected Web browser. It may be https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/25992-1.jpg -https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/25992-2.jpg \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/31984.jpg \ No newline at end of file diff --git a/exploits/windows/dos/26869.txt b/exploits/windows/dos/26869.txt index 580554b16..0351dda6f 100644 --- a/exploits/windows/dos/26869.txt +++ b/exploits/windows/dos/26869.txt @@ -8,6 +8,6 @@ This BID will be updated and potentially split into separate records as further UPDATE (Mar 14, 2006): Microsoft has released security advisory MS06-012 addressing this and other issues. -https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/26869-1.xls +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/27055-2.xls -https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/26869-2.xls \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/27055-1.xls \ No newline at end of file diff --git a/exploits/windows/dos/31300.txt b/exploits/windows/dos/31300.txt index 282023aef..580eca2cd 100644 --- a/exploits/windows/dos/31300.txt +++ b/exploits/windows/dos/31300.txt @@ -9,4 +9,4 @@ This issue affects the following: SurgeMail 38k4, beta 39a and earlier Netwin WebMail 3.1s and earlier -https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/31300.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/31301.zip \ No newline at end of file diff --git a/exploits/windows/dos/33710.txt b/exploits/windows/dos/33710.txt index 30c4b62c1..ca22125ea 100644 --- a/exploits/windows/dos/33710.txt +++ b/exploits/windows/dos/33710.txt @@ -6,4 +6,4 @@ Attackers may leverage this issue to execute arbitrary code in the context of th Media Jukebox 12 is vulnerable; other versions may also be affected. -https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/33710.mp3 \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/8837.mp3 \ No newline at end of file diff --git a/exploits/windows/dos/33711.txt b/exploits/windows/dos/33711.txt index 5ed6148af..0021e45e6 100644 --- a/exploits/windows/dos/33711.txt +++ b/exploits/windows/dos/33711.txt @@ -6,4 +6,4 @@ Attackers may leverage this issue to execute arbitrary code in the context of th BS.Player 2.51 Build 1022 is vulnerable; other versions may also be affected. -https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/33711.mp3 \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/8837.mp3 \ No newline at end of file diff --git a/exploits/windows/dos/35895.txt b/exploits/windows/dos/35895.txt index 62354f09a..9816e0f73 100644 --- a/exploits/windows/dos/35895.txt +++ b/exploits/windows/dos/35895.txt @@ -6,7 +6,7 @@ Attackers can exploit this issue to cause the server to dereference an invalid m RealityServer Web Services 3.1.1 build 144525.5057 is vulnerable; other versions may also be affected. -https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/35895.zip +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/15992.zip diff --git a/exploits/windows/dos/4335.txt b/exploits/windows/dos/4335.txt index 03c9879fa..4c26cb0b5 100644 --- a/exploits/windows/dos/4335.txt +++ b/exploits/windows/dos/4335.txt @@ -5,6 +5,6 @@ Yahoo! Messenger 8.1.0.413 (webcam) Remote Crash Exploit 3.when the otherside accept the invatation , inject the dll to local yahoo! messenger 8.1.0.413 's process. 4 . the otherside's yahoo! messenger will be crashed. -Exploit-DB Mirror: https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/4335.rar (08292007-expyahoo.rar) +Exploit-DB Mirror: https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/30500.rar (08292007-expyahoo.rar) # milw0rm.com [2007-08-29] \ No newline at end of file diff --git a/exploits/windows/dos/9167.txt b/exploits/windows/dos/9167.txt index f341d6629..51f7e13f4 100644 --- a/exploits/windows/dos/9167.txt +++ b/exploits/windows/dos/9167.txt @@ -23,7 +23,7 @@ cccccccc ?? == *** Proof Of Concept: http://zeroscience.org/codes/aimp2_evil.mp3 http://www.zeroscience.mk/old/codes/aimp2_evil.mp3 - https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/9167.mp3 (2009-aimp2_evil.mp3) + https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/8837.mp3 (2009-aimp2_evil.mp3) ** Note: The same PoC used in: - http://secunia.com/advisories/35305/ diff --git a/exploits/windows/dos/9169.py b/exploits/windows/dos/9169.py index a5748a89c..dd49dc2af 100755 --- a/exploits/windows/dos/9169.py +++ b/exploits/windows/dos/9169.py @@ -75,7 +75,7 @@ # # # - 1. http://zeroscience.org/codes/aimp2_evil.mp3 # # # - # - 2. https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/9167.mp3 (2009-aimp2_evil.mp3) (mirror) # + # - 2. https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/8837.mp3 (2009-aimp2_evil.mp3) (mirror) # # # # - 3. http://securityreason.com/download/11/13 (mirror) # # # diff --git a/exploits/windows/dos/9170.txt b/exploits/windows/dos/9170.txt index a7f77ed29..925408c46 100644 --- a/exploits/windows/dos/9170.txt +++ b/exploits/windows/dos/9170.txt @@ -44,7 +44,7 @@ http://www.zeroscience.org/ PoC: 1. http://zeroscience.org/codes/aimp2_evil.mp3 - 2. https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/9167.mp3 (2009-aimp2_evil.mp3) + 2. https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/8837.mp3 (2009-aimp2_evil.mp3) 3. http://securityreason.com/download/11/13 # milw0rm.com [2009-07-16] \ No newline at end of file diff --git a/exploits/windows/local/14744.c b/exploits/windows/local/14744.c index 139441a04..a9fcb5cfd 100644 --- a/exploits/windows/local/14744.c +++ b/exploits/windows/local/14744.c @@ -22,4 +22,4 @@ int evil() return 0; } -// POC: https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/14744.zip \ No newline at end of file +// POC: https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/14745.zip \ No newline at end of file diff --git a/exploits/windows/local/20257.txt b/exploits/windows/local/20257.txt index 343802b06..38b9663fa 100644 --- a/exploits/windows/local/20257.txt +++ b/exploits/windows/local/20257.txt @@ -63,4 +63,4 @@ porttool -c \BaseNamedObjects\Foo3 (in window for porttool -s5b) Enter PID, TID, MID, CID from porttool -s -https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/20257.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/20254.zip \ No newline at end of file diff --git a/exploits/windows/local/20265.txt b/exploits/windows/local/20265.txt index 22699b896..20934c240 100644 --- a/exploits/windows/local/20265.txt +++ b/exploits/windows/local/20265.txt @@ -13,4 +13,4 @@ start porttool -c \BaseNamedObjects\Foo porttool -s3 \BaseNamedObjects\Foo2 (enter PID, TID, MID from porttool -s ...) -https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/20265.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/20254.zip \ No newline at end of file diff --git a/exploits/windows/local/31667.txt b/exploits/windows/local/31667.txt index a686d7330..0a0060fba 100644 --- a/exploits/windows/local/31667.txt +++ b/exploits/windows/local/31667.txt @@ -4,4 +4,4 @@ Microsoft Windows is prone to a privilege-escalation vulnerability. Successful exploits may allow authenticated users to elevate their privileges to NetworkService. This allows attackers to execute code with elevated privileges and aids in further exploits. -https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/31667.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/6705.zip \ No newline at end of file diff --git a/exploits/windows/local/3260.txt b/exploits/windows/local/3260.txt index 5dae4c45b..33cd8831d 100644 --- a/exploits/windows/local/3260.txt +++ b/exploits/windows/local/3260.txt @@ -24,7 +24,7 @@ + Reference : http://www.microsoft.com/technet/security/advisory/932114.mspx - Microsoft Security Advisory (932114) -- https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/3260.doc (02032007-word2000exp.doc) +- https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/29524.doc (02032007-word2000exp.doc) - http://www.returnaddr.org/exploit/word2000 ############ use at your own risk ******* diff --git a/exploits/windows/local/32891.txt b/exploits/windows/local/32891.txt index 154733d8b..fc29bbc4c 100644 --- a/exploits/windows/local/32891.txt +++ b/exploits/windows/local/32891.txt @@ -11,4 +11,4 @@ Windows Server 2003 Windows Vista Windows Server 2008 -https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/32891.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/6705.zip \ No newline at end of file diff --git a/exploits/windows/local/32892.txt b/exploits/windows/local/32892.txt index 1f4ba5459..4812516a9 100644 --- a/exploits/windows/local/32892.txt +++ b/exploits/windows/local/32892.txt @@ -9,4 +9,4 @@ The issue affects the following: Windows XP SP2 Windows Server 2003 -https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/32892.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/6705.zip \ No newline at end of file diff --git a/exploits/windows/local/32893.txt b/exploits/windows/local/32893.txt index 51b18fa5b..c63729ccd 100644 --- a/exploits/windows/local/32893.txt +++ b/exploits/windows/local/32893.txt @@ -9,4 +9,4 @@ The issue affects the following: Windows Vista Windows Server 2008 -https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/32893.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/6705.zip \ No newline at end of file diff --git a/exploits/windows/local/5320.txt b/exploits/windows/local/5320.txt index 3af9c6d46..aaa569a09 100644 --- a/exploits/windows/local/5320.txt +++ b/exploits/windows/local/5320.txt @@ -2,7 +2,7 @@ Runs calc.exe on Office XP SP3 with updates < 03/11/08. Just for fun... -https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/5320.tgz (2008-ms08-016.tgz) +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/31361.tgz (2008-ms08-016.tgz) Marsupilamipowa@hotmail.fr diff --git a/exploits/windows/local/7054.txt b/exploits/windows/local/7054.txt index 6d729d6b2..159398404 100644 --- a/exploits/windows/local/7054.txt +++ b/exploits/windows/local/7054.txt @@ -27,7 +27,7 @@ Exploit: http://www.ntinternals.org/ntiadv0802/AKEProtect_Exp.zip -backup: https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/7054.zip (2008-AKEProtect_Exp.zip) +backup: https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/32572-1.zip (2008-AKEProtect_Exp.zip) Advisory: http://www.ntinternals.org/ntiadv0802/ntiadv0802.html diff --git a/exploits/windows/local/8250.txt b/exploits/windows/local/8250.txt index 153e39b62..f03bbd70d 100644 --- a/exploits/windows/local/8250.txt +++ b/exploits/windows/local/8250.txt @@ -33,7 +33,7 @@ Exploit: http://ntinternals.org/ntiadv0812/ElbyCDIO_Exp.zip -https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/8250.zip (2009-ElbyCDIO_Exp.zip) +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/32850.zip (2009-ElbyCDIO_Exp.zip) Advisory: http://ntinternals.org/ntiadv0812/ntiadv0812.html diff --git a/exploits/windows/remote/17104.txt b/exploits/windows/remote/17104.txt index fc2f72f67..056b13cb2 100644 --- a/exploits/windows/remote/17104.txt +++ b/exploits/windows/remote/17104.txt @@ -349,4 +349,4 @@ binary info: POC: pocs availiable here: http://retrogod.altervista.org/9sg_realgames_i.html - https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/17104.zip (9sg_StubbyUtil.ShellCtl.1.zip) \ No newline at end of file + https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/35560-1.zip (9sg_StubbyUtil.ShellCtl.1.zip) \ No newline at end of file diff --git a/exploits/windows/remote/17105.txt b/exploits/windows/remote/17105.txt index 1d9e2fc76..4e28dcc59 100644 --- a/exploits/windows/remote/17105.txt +++ b/exploits/windows/remote/17105.txt @@ -226,4 +226,4 @@ binary info: poc: pocs availiable here: http://retrogod.altervista.org/9sg_realgames_ii.html - https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/17105.zip (9sg_StubbyUtil.ProcessMgr.1.zip) \ No newline at end of file + https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/35560-2.zip (9sg_StubbyUtil.ProcessMgr.1.zip) \ No newline at end of file diff --git a/exploits/windows/remote/22288.txt b/exploits/windows/remote/22288.txt index 5d40a3a12..4f310860f 100644 --- a/exploits/windows/remote/22288.txt +++ b/exploits/windows/remote/22288.txt @@ -6,4 +6,4 @@ There have been reports that some users may not be able to reproduce this vulner https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/22288-1.zip -https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/22288-2.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/22338.zip \ No newline at end of file diff --git a/exploits/windows/remote/23131.txt b/exploits/windows/remote/23131.txt index c0d12447c..9b5922ff4 100644 --- a/exploits/windows/remote/23131.txt +++ b/exploits/windows/remote/23131.txt @@ -2,4 +2,4 @@ source: https://www.securityfocus.com/bid/8577/info Multiple issues have been reported in Microsoft Internet Explorer. Though these issues have been reported by a reliable source, communication issues have presented difficulty in obtaining details surrounding the reported issues. This vulnerability entry will be updated when additional information becomes available. -https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/23131.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/21199.zip \ No newline at end of file diff --git a/exploits/windows/remote/23283.txt b/exploits/windows/remote/23283.txt index a88b94402..4e1aca031 100644 --- a/exploits/windows/remote/23283.txt +++ b/exploits/windows/remote/23283.txt @@ -6,4 +6,4 @@ This could aid in exploitation of other vulnerabilities, such as issues that per Liu Die Yu has released conflicting information that states that this issue occurs because the user is redirected into a local resource and then the local resource is being refreshed. It is reported that other variations such as "file://" or "[DriveLetter]:\[...]" also work with this exploit. This is currently under investigation. -https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/23283.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/21199.zip \ No newline at end of file diff --git a/exploits/windows/remote/23340.txt b/exploits/windows/remote/23340.txt index 1fcc7a646..3d900a719 100644 --- a/exploits/windows/remote/23340.txt +++ b/exploits/windows/remote/23340.txt @@ -8,6 +8,6 @@ The extra slash prior to "Documents and Settings" will cause the referenced cont ** A new proof-of-concept has been made available which uses the vulnerability described in BID 9106 to locate the Internet Explorer cache. -https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/23340-1.zip +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/21199.zip https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/23340-2.zip \ No newline at end of file diff --git a/exploits/windows/remote/27758.txt b/exploits/windows/remote/27758.txt index 1dbd55d0f..baafb96d2 100644 --- a/exploits/windows/remote/27758.txt +++ b/exploits/windows/remote/27758.txt @@ -6,4 +6,4 @@ A successful attack can allow the attacker to place potentially malicious files This issue affects UltraISO version 8.0.0. 1392; other versions may also be affected. -https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/27758.iso.bin \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/27746.iso.bin \ No newline at end of file diff --git a/exploits/windows/remote/27759.txt b/exploits/windows/remote/27759.txt index edb720dd9..f0d3b94f5 100644 --- a/exploits/windows/remote/27759.txt +++ b/exploits/windows/remote/27759.txt @@ -6,4 +6,4 @@ A successful attack can allow the attacker to place potentially malicious files This issue affects MagicISO version 5.0 Build 0166; other versions may also be affected. -https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/27759.iso.bin \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/27746.iso.bin \ No newline at end of file diff --git a/exploits/windows/remote/27760.txt b/exploits/windows/remote/27760.txt index d9450c356..b277ef208 100644 --- a/exploits/windows/remote/27760.txt +++ b/exploits/windows/remote/27760.txt @@ -6,4 +6,4 @@ A successful attack can allow the attacker to place potentially malicious files This issue affects PowerISO version 2.9; other versions may also be affected. -https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/27760.iso.bin \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/27746.iso.bin \ No newline at end of file diff --git a/exploits/windows/remote/31409.txt b/exploits/windows/remote/31409.txt index bf024f20d..ccd622d26 100644 --- a/exploits/windows/remote/31409.txt +++ b/exploits/windows/remote/31409.txt @@ -6,4 +6,4 @@ An attacker can exploit this issue to execute arbitrary code within the context BootManage TFTP Server 1.99 is vulnerable; other versions may also be affected. -https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/31409.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/31591.zip \ No newline at end of file diff --git a/exploits/windows/remote/32699.txt b/exploits/windows/remote/32699.txt index 2db47255c..701222157 100644 --- a/exploits/windows/remote/32699.txt +++ b/exploits/windows/remote/32699.txt @@ -6,4 +6,4 @@ Attackers can exploit this issue to port-scan networks inside a victim computer' Google Chrome 1.0.154.36 is affected; other versions may also be vulnerable. -https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/32699.zip \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/29768.zip \ No newline at end of file diff --git a/exploits/windows/remote/33712.txt b/exploits/windows/remote/33712.txt index 91af66e08..ff3cafb33 100644 --- a/exploits/windows/remote/33712.txt +++ b/exploits/windows/remote/33712.txt @@ -6,4 +6,4 @@ Attackers may leverage this issue to execute arbitrary code in the context of th VLC Media Player 1.0.5 is vulnerable; other versions may also be affected. -https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/33712.mp3 \ No newline at end of file +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/8837.mp3 \ No newline at end of file diff --git a/exploits/windows/remote/4188.txt b/exploits/windows/remote/4188.txt index d9b6c01f7..162d65975 100644 --- a/exploits/windows/remote/4188.txt +++ b/exploits/windows/remote/4188.txt @@ -2,6 +2,6 @@ Author:(yunshu) http://www.ph4nt0m.org poc: -https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/4188.zip (07162007-flash_flv_9.0.45.0_exp.zip) +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/30288.zip (07162007-flash_flv_9.0.45.0_exp.zip) # milw0rm.com [2007-07-16] \ No newline at end of file diff --git a/exploits/windows/remote/4334.txt b/exploits/windows/remote/4334.txt index 9892fa2f1..d72ee0770 100644 --- a/exploits/windows/remote/4334.txt +++ b/exploits/windows/remote/4334.txt @@ -7,6 +7,6 @@ thanks ole andre again, His ospy is perfect. 3. choose "send my webcam" to a contact id who is online using 7.x (8.0?). 4.when the otherside accept the invatation , the otherside's msn will be at least crashed, if you using aChinese version windows 2000 sp4 , maybe a reverse shell , if other verison windows 2000, you need adjust the jmpa address in the dll's sourcecode. -https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/4334.rar (08292007-exp_msn.rar) +https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/30537.rar (08292007-exp_msn.rar) # milw0rm.com [2007-08-29] \ No newline at end of file