DB: 2022-11-22

93 changes to exploits/shellcodes/ghdb
This commit is contained in:
Offensive Security 2022-11-22 11:08:59 +00:00
parent 03db452e11
commit ec8ac60c13
93 changed files with 94 additions and 94 deletions

View file

@ -1,3 +1,3 @@
I wrote a fuzzer "dumb fuzzer" and used a sample from http://www.ccp14.ac.uk/ccp/web-mirrors/bca-spreadsheets/scanplot101.xls which I randomly found on the internet. I mutated the data and tested roughly 1000 cases on several Document Reader Applications for iPhone. I wrote a fuzzer "dumb fuzzer" and used a sample from http://www.ccp14.ac.uk/ccp/web-mirrors/bca-spreadsheets/scanplot101.xls which I randomly found on the internet. I mutated the data and tested roughly 1000 cases on several Document Reader Applications for iPhone.
https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/13823.xls (savysoda_poc.xls) https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/13825.xls (savysoda_poc.xls)

View file

@ -9,7 +9,7 @@
# V100R001B121Telmex # V100R001B121Telmex
# Exploit Download Link: # Exploit Download Link:
# http://www.hakim.ws/huawei/HG520_udpinfo.tar.gz # http://www.hakim.ws/huawei/HG520_udpinfo.tar.gz
# https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/12298.tar.gz (HG520_udpinfo.tar.gz) # https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/33869.tar.gz (HG520_udpinfo.tar.gz)
By sending a specially crafted UDP packet you can remotely obtain the By sending a specially crafted UDP packet you can remotely obtain the

View file

@ -4,4 +4,4 @@ LibTIFF is prone to a denial-of-service vulnerability because it fails to proper
An attacker can exploit this issue to crash an application that uses the vulnerable library, denying service to legitimate users. An attacker can exploit this issue to crash an application that uses the vulnerable library, denying service to legitimate users.
https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/34278.tif https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/34279.tif

View file

@ -4,4 +4,4 @@ mtink is prone to a locally exploitable buffer overflow condition. This is due t
mtink is reportedly installed setgid 'sys' on Mandrake Linux, so it is possible that this issue may be exploited to execute arbitrary code with elevated privileges. Other distributions may also be affected if mtink is installed or runs with elevated privileges. mtink is reportedly installed setgid 'sys' on Mandrake Linux, so it is possible that this issue may be exploited to execute arbitrary code with elevated privileges. Other distributions may also be affected if mtink is installed or runs with elevated privileges.
https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/22189.tar.gz https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/21001.tar.gz

View file

@ -4,4 +4,4 @@ It has been reported that a buffer overflow in escputil exists. When supplied wi
escputil is reportedly installed setgid 'sys' on Mandrake Linux, so it is possible that this issue may be exploited to execute arbitrary code with elevated privileges. Other distributions may also be affected if the utility is installed or runs with elevated privileges. escputil is reportedly installed setgid 'sys' on Mandrake Linux, so it is possible that this issue may be exploited to execute arbitrary code with elevated privileges. Other distributions may also be affected if the utility is installed or runs with elevated privileges.
https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/22190.tar.gz https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/21001.tar.gz

View file

@ -6,6 +6,6 @@ Successfully exploiting these issues can allow an attacker to execute arbitrary
Vim 7.1.298 is vulnerable; other versions may also be affected. Vim 7.1.298 is vulnerable; other versions may also be affected.
https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/31911-1.zip https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/32055.zip
https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/31911-2.zip https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/31911-2.zip
https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/31911-3.zip https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/31911-3.zip

View file

@ -301,6 +301,6 @@
http://grsecurity.net/~spender/cheddar_bay.tgz http://grsecurity.net/~spender/cheddar_bay.tgz
backup: https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/9191.tgz (2009-cheddar_bay.tgz) backup: https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/33088-2.tgz (2009-cheddar_bay.tgz)
# milw0rm.com [2009-07-17] # milw0rm.com [2009-07-17]

View file

@ -37,6 +37,6 @@
*/ */
http://www.grsecurity.net/~spender/enlightenment.tgz http://www.grsecurity.net/~spender/enlightenment.tgz
back: https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/9627.tgz (2009-enlightenment.tgz) back: https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/33088-1.tgz (2009-enlightenment.tgz)
# milw0rm.com [2009-09-10] # milw0rm.com [2009-09-10]

View file

@ -4,4 +4,4 @@ Opera is prone to vulnerability that may allow attackers to obtain potentially s
A successful exploit of this issue would cause the affected application to connect to arbitrary TCP ports and potentially reveal sensitive information about services that are running on the affected computer. Information obtained may aid attackers in further attacks. A successful exploit of this issue would cause the affected application to connect to arbitrary TCP ports and potentially reveal sensitive information about services that are running on the affected computer. Information obtained may aid attackers in further attacks.
https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/29769.zip https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/29768.zip

View file

@ -4,4 +4,4 @@ KDE Konqueror is prone to a vulnerability that may allow attackers to obtain pot
A successful exploit of this issue would cause the affected application to connect to arbitrary TCP ports and potentially reveal sensitive information about services that are running on the affected computer. Information obtained may aid attackers in further attacks. A successful exploit of this issue would cause the affected application to connect to arbitrary TCP ports and potentially reveal sensitive information about services that are running on the affected computer. Information obtained may aid attackers in further attacks.
https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/29770.zip https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/29768.zip

View file

@ -4,4 +4,4 @@ Wireshark is prone to a memory-corruption vulnerability because it fails to prop
Successful exploits may allow attackers to execute arbitrary code within the context of the affected application. Failed exploit attempts will likely crash the application. Successful exploits may allow attackers to execute arbitrary code within the context of the affected application. Failed exploit attempts will likely crash the application.
https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/35314.pcap https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/36128.pcap

View file

@ -168,4 +168,4 @@ An attacker can exploit this issue to execute arbitrary malicious code in the co
LibTIFF 3.8.2 is vulnerable; other versions may be affected as well. LibTIFF 3.8.2 is vulnerable; other versions may be affected as well.
https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/10205.zip (2009-11-22-35451.zip) https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/33049.zip (2009-11-22-35451.zip)

View file

@ -69,7 +69,7 @@ Multi-Computer Virtual Whiteboard and so on.
http://aluigi.org/poc/qtsslame.zip http://aluigi.org/poc/qtsslame.zip
or or
https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/14268.zip (qtsslame.zip) https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/34227.zip (qtsslame.zip)
####################################################################### #######################################################################

View file

@ -104,7 +104,7 @@ bytes.
http://aluigi.org/testz/udpsz.zip http://aluigi.org/testz/udpsz.zip
https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/18600.zip https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/18112.zip
A] A]
udpsz -T -C "00000100 ffff0200" 0 -b a -C "00 00 1000000000000000 00" -1 SERVER 2502 8+0x02ffff udpsz -T -C "00000100 ffff0200" 0 -b a -C "00 00 1000000000000000 00" -1 SERVER 2502 8+0x02ffff

View file

@ -94,7 +94,7 @@ INCREMENT SYSAM_LICENSE_SERVER SYBASE 2.0 permanent 1 ISSUER="Sybase, \
http://aluigi.org/testz/udpsz.zip http://aluigi.org/testz/udpsz.zip
https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/18877.zip https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/18112.zip
udpsz -D -T -C "2f 24 189d 4000 0000 0000 00000000 00000000 0000" -b 0x61 SERVER 27000 0x4000 udpsz -D -T -C "2f 24 189d 4000 0000 0000 00000000 00000000 0000" -b 0x61 SERVER 27000 0x4000

View file

@ -4,4 +4,4 @@ Roger Wilco Server has been reported prone to a remote denial of service vulnera
A remote attacker may exploit this condition to deny service to legitimate users. A remote attacker may exploit this condition to deny service to legitimate users.
https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/23902.zip https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/23904.zip

View file

@ -4,4 +4,4 @@ Live For Speed is prone to four vulnerabilities, including buffer-overflow and d
Successful exploits could allow attackers to execute arbitrary code or to crash game servers. Successful exploits could allow attackers to execute arbitrary code or to crash game servers.
https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/30498.zip https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/33182-2.zip

View file

@ -7,4 +7,4 @@ An attacker can exploit this issue to crash the affected application, denying se
This issue affects Foxit WAC Server 2.0 Build 3503 and prior versions. This issue affects Foxit WAC Server 2.0 Build 3503 and prior versions.
https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/30990-1.zip https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/30990-1.zip
https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/30990-2.zip https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/31232.zip

View file

@ -6,4 +6,4 @@ Successful exploits may allow attackers to cause denial-of-service conditions. D
GRAW 1.35 and GRAW 2 1.05 are vulnerable; other versions may also be affected. GRAW 1.35 and GRAW 2 1.05 are vulnerable; other versions may also be affected.
https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/34270.zip https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/14286.zip

View file

@ -1,5 +1,5 @@
Acrobat <= 9.1.1 Stack Overflow Crashy PoC Acrobat <= 9.1.1 Stack Overflow Crashy PoC
https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/8826.pdf (2009-crashy_the_clown.pdf) https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/33017.pdf (2009-crashy_the_clown.pdf)
# milw0rm.com [2009-05-29] # milw0rm.com [2009-05-29]

View file

@ -16,4 +16,4 @@ By combining these two flaws a malicious applet can accept connections from any
Both Netscape and Microsoft Java Virtual Machines are affected by this vulnerability, however in Microsoft products the file: URL type will not be effective in reading files, meaning that only web-available documents can be retreived via this method. However, the file: method will verify the existence of a file. It will check to see if the file exists and if it does not, it will return a SecurityException error message. Netscape browsers will pass both web documents and local files to the attacker. Both Netscape and Microsoft Java Virtual Machines are affected by this vulnerability, however in Microsoft products the file: URL type will not be effective in reading files, meaning that only web-available documents can be retreived via this method. However, the file: method will verify the existence of a file. It will check to see if the file exists and if it does not, it will return a SecurityException error message. Netscape browsers will pass both web documents and local files to the attacker.
https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/20139.tar.gz https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/20140.tar.gz

View file

@ -4,4 +4,4 @@ A remote format string vulnerability affects XPand Rally. This issue is due to a
An attacker may leverage this issue to execute arbitrary code with the privileges of an unsuspecting user that activated the vulnerable server or client application. An attacker may leverage this issue to execute arbitrary code with the privileges of an unsuspecting user that activated the vulnerable server or client application.
https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/25205.zip https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/25574-1.zip

View file

@ -6,4 +6,4 @@ An attacker may leverage this issue to execute arbitrary code with the privilege
https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/25574-1.zip https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/25574-1.zip
https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/25574-2.zip https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/25584.zip

View file

@ -6,4 +6,4 @@ This vulnerability allows remote attackers to crash affected game servers. Due t
https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/25691-1.zip https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/25691-1.zip
https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/25691-2.zip https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/25692.zip

View file

@ -6,4 +6,4 @@ This issue allows remote attackers to execute arbitrary code within the context
Version 0.7.0, CVS July 30th 2006 and prior versions are vulnerable to this issue. Version 0.7.0, CVS July 30th 2006 and prior versions are vulnerable to this issue.
https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/28344.zip https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/28345.zip

View file

@ -6,4 +6,4 @@ An attacker can exploit this issue to execute arbitrary code with the privileges
RakNet 3.72 is affected; other versions may be vulnerable as well. RakNet 3.72 is affected; other versions may be vulnerable as well.
https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/33802.zip https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/14286.zip

View file

@ -6,4 +6,4 @@ Successful exploits can allow remote attackers to execute arbitrary machine code
netkar-PRO 1.1 is vulnerable; other versions may also be affected. netkar-PRO 1.1 is vulnerable; other versions may also be affected.
https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/33847.zip https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/33849.zip

View file

@ -9,4 +9,4 @@ The following applications include the vulnerable engine:
Enemy Territory: Quake Wars 1.5.12642.33243 and prior Enemy Territory: Quake Wars 1.5.12642.33243 and prior
Wolfenstein 1.3.344272 and prior Wolfenstein 1.3.344272 and prior
https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/34271.zip https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/14286.zip

View file

@ -6,4 +6,4 @@ Successful exploits may allow an attacker to execute arbitrary code in the conte
The issue affects lm_tcp <= 9.0.0 0248.18.0.0; other versions may also be affected. The issue affects lm_tcp <= 9.0.0 0248.18.0.0; other versions may also be affected.
https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/35062.zip https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/15707.zip

View file

@ -4,4 +4,4 @@ A vulnerability has been discovered in the PHP-Nuke Web Mail module. When a user
By accessing a PHP script located in the web directory, arbitrary PHP commands will be executed on the target server. By accessing a PHP script located in the web directory, arbitrary PHP commands will be executed on the target server.
https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/22089.zip https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/22090.zip

View file

@ -1,5 +1,5 @@
Sun Solaris <= 10 rpc.ypupdated Remote Root Exploit Sun Solaris <= 10 rpc.ypupdated Remote Root Exploit
https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/5282.tar.gz (2008-ypk2008.tar.gz) https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/20259.tar.gz (2008-ypk2008.tar.gz)
# milw0rm.com [2008-03-20] # milw0rm.com [2008-03-20]

View file

@ -14,4 +14,4 @@ Foxit Reader is prone to a remote code-execution vulnerability because is fails
An attacker can exploit this issue by supplying a malicious PDF file or webpage. Successful exploits may allow the attacker to execute arbitrary code in the context of a user running the affected application. Failed attempts will likely result in denial-of-service conditions. An attacker can exploit this issue by supplying a malicious PDF file or webpage. Successful exploits may allow the attacker to execute arbitrary code in the context of a user running the affected application. Failed attempts will likely result in denial-of-service conditions.
Exploit-DB Mirror: https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/10204.tar (2009-11-22-36668.tar) Exploit-DB Mirror: https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/33283.tar (2009-11-22-36668.tar)

View file

@ -1,7 +1,7 @@
When Orb is first installed it registers several Direct Show filters with the system. When registered these filters are then called whenever a file which has a dependency on such a required filter is accessed. By specially crafting specific headers embedded into an mp3 file we can create a direct code path to code which is vulnerable to a integer division by zero. This vulnerability can be triggered remotely be embedding the crafted mp3 file into HTML. It is also not dependent on a certain media player. Attached is a PoC (Proof-Of-Concept) I wrote for this specific bug. Also included is a Rebuild file for IDA Pro examining the crash. When Orb is first installed it registers several Direct Show filters with the system. When registered these filters are then called whenever a file which has a dependency on such a required filter is accessed. By specially crafting specific headers embedded into an mp3 file we can create a direct code path to code which is vulnerable to a integer division by zero. This vulnerability can be triggered remotely be embedding the crafted mp3 file into HTML. It is also not dependent on a certain media player. Attached is a PoC (Proof-Of-Concept) I wrote for this specific bug. Also included is a Rebuild file for IDA Pro examining the crash.
Download POC: Download POC:
https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/11632.zip (aac_parser_int_div_by_0_orb.zip) https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/33707.zip (aac_parser_int_div_by_0_orb.zip)
Timeline: Timeline:

View file

@ -7,7 +7,7 @@
|_| |_|\____/_/ \_\____/|____/ |_| |_|\____/_/ \_\____/|____/
http://www.exploit-db.com/moaub-9-mozilla-firefox-xslt-sort-remote-code-execution-vulnerability/ http://www.exploit-db.com/moaub-9-mozilla-firefox-xslt-sort-remote-code-execution-vulnerability/
https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/14949.zip (moaub-day9-ba.zip) https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/34192.zip (moaub-day9-ba.zip)
''' '''

View file

@ -7,7 +7,7 @@
|_| |_|\____/_/ \_\____/|____/ |_| |_|\____/_/ \_\____/|____/
http://www.exploit-db.com/moaub-17-firefox-plugin-parameter-ensurecachedattrparamarrays-remote-code-execution/ http://www.exploit-db.com/moaub-17-firefox-plugin-parameter-ensurecachedattrparamarrays-remote-code-execution/
https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/15027.zip (moaub-17-exploit.zip) https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/34358.zip (moaub-17-exploit.zip)
''' '''
''' '''
Title : Firefox Plugin Parameter EnsureCachedAttrParamArrays Remote Code Execution Title : Firefox Plugin Parameter EnsureCachedAttrParamArrays Remote Code Execution

View file

@ -202,7 +202,7 @@ K (maybe)]
http://aluigi.org/poc/snabase_1.zip http://aluigi.org/poc/snabase_1.zip
https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/17159.zip https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/36211.zip
A] A]
nc SERVER PORT < snabase_1a.dat nc SERVER PORT < snabase_1a.dat

View file

@ -208,7 +208,7 @@ flow and executing code under SYSTEM privileges.
http://aluigi.org/testz/udpsz.zip http://aluigi.org/testz/udpsz.zip
https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/17830.zip (udpsz.zip) https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/15992.zip (udpsz.zip)
udpsz -C 00140004 -b a -l 0 -T 0xffffffff SERVER 42 0x140008 udpsz -C 00140004 -b a -l 0 -T 0xffffffff SERVER 42 0x140008

View file

@ -54,7 +54,7 @@ Denial of Service caused by an invalid read access.
http://aluigi.org/testz/udpsz.zip http://aluigi.org/testz/udpsz.zip
https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/17835.zip https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/15707.zip
udpsz -C "03 66 14 71 00 00 00 00 06 00 00 00 0a ff ff 02 01 01 10 27" -b 0xff SERVER 48899 0x5fe udpsz -C "03 66 14 71 00 00 00 00 06 00 00 00 0a ff ff 02 01 01 10 27" -b 0xff SERVER 48899 0x5fe

View file

@ -83,7 +83,7 @@ buffer of 8192 bytes for containing the incoming HTTP requests.
http://aluigi.org/testz/udpsz.zip http://aluigi.org/testz/udpsz.zip
https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/17842-2.dat https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/15707.zip
udpsz -T -b 0x61 SERVER 808 10000 udpsz -T -b 0x61 SERVER 808 10000

View file

@ -126,7 +126,7 @@ for executing any desired custom command.
http://aluigi.org/testz/udpsz.zip http://aluigi.org/testz/udpsz.zip
https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/17844-1.zip https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/15707.zip
only a simple scanner: only a simple scanner:
udpsz -d 2 -c "xx%" -b a -X 0 16 l 0x6161 -T -l 0 SERVER 11234 0x2000 udpsz -d 2 -c "xx%" -b a -X 0 16 l 0x6161 -T -l 0 SERVER 11234 0x2000

View file

@ -238,7 +238,7 @@ effect.
http://aluigi.org/testz/udpsz.zip (version 0.3.3) http://aluigi.org/testz/udpsz.zip (version 0.3.3)
https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/17885-1.zip https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/17879.zip
A] A]
udpsz -T -C "08000000 00000000 ffffffff" -b a SERVER 8800 0x400 udpsz -T -C "08000000 00000000 ffffffff" -b a SERVER 8800 0x400

View file

@ -89,7 +89,7 @@ integer overflow vulnerability:
http://aluigi.org/testz/udpsz.zip http://aluigi.org/testz/udpsz.zip
https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/17889.zip https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/17879.zip
udpsz -b a -T -c "1=4294967279~2=0~" SERVER PORT 0xffff udpsz -b a -T -c "1=4294967279~2=0~" SERVER PORT 0xffff

View file

@ -111,7 +111,7 @@ http://aluigi.org/mytoolz/mydown.zip
https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/17963-1.zip https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/17963-1.zip
http://aluigi.org/testz/udpsz.zip http://aluigi.org/testz/udpsz.zip
https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/17963-2.zip https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/17879.zip
A] A]
mydown http://SERVER/..\..\..\..\..\..\..\boot.ini mydown http://SERVER/..\..\..\..\..\..\..\boot.ini

View file

@ -58,7 +58,7 @@ No additional research performed.
http://aluigi.org/testz/udpsz.zip http://aluigi.org/testz/udpsz.zip
https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/17965.zip https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/17879.zip
udpsz -l 2000 -c ".NET\1\0\0\0\0\0\xff\xff\xff\xff\4\0\1\1\x25\0\0\0tcp://127.0.0.1/OPC Systems Interface\6\0\1\1" -T SERVER 58723 0x80 udpsz -l 2000 -c ".NET\1\0\0\0\0\0\xff\xff\xff\xff\4\0\1\1\x25\0\0\0tcp://127.0.0.1/OPC Systems Interface\6\0\1\1" -T SERVER 58723 0x80

View file

@ -194,7 +194,7 @@ number or on the sum of both:
http://aluigi.org/testz/udpsz.zip http://aluigi.org/testz/udpsz.zip
https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/18166-1.zip https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/18112.zip
A] A]
udpsz -C "0004 02 00 00 00 ffffffff" -b a -T SERVER 2308 2+0x400 udpsz -C "0004 02 00 00 00 ffffffff" -b a -T SERVER 2308 2+0x400

View file

@ -91,4 +91,4 @@ a use-after-free by e.g. tricking a user into opening a specially crafted file.
=========== ===========
http://www.protekresearchlab.com/exploits/PRL-2012-07.tif http://www.protekresearchlab.com/exploits/PRL-2012-07.tif
https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/18633.tif https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/19338.tif

View file

@ -62,7 +62,7 @@ and can be exploited to cause a heap-based buffer overflow via a specially craft
4) The PoC 4) The PoC
============= =============
https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/18739.fpx https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/19960.fpx
############################################################################### ###############################################################################

View file

@ -87,7 +87,7 @@ Stack overflow in the BackupToAvi method used by the ActiveX components
A] A]
http://aluigi.org/testz/udpsz.zip http://aluigi.org/testz/udpsz.zip
https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/18765-1.zip https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/18112.zip
NiwMasterService: NiwMasterService:
udpsz -b 0x80 -T SERVER 4505 0x28 udpsz -b 0x80 -T SERVER 4505 0x28

View file

@ -82,7 +82,7 @@ advisory must be considered only a case study and nothing more.
http://aluigi.org/testz/udpsz.zip http://aluigi.org/testz/udpsz.zip
https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/18864.zip https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/18112.zip
A] A]

View file

@ -65,4 +65,4 @@ and can be exploited to cause a heap-based buffer overflow via a specially craft
============= =============
http://protekresearchlab.com/exploits/PRL-2012-10.ecw http://protekresearchlab.com/exploits/PRL-2012-10.ecw
https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/18964.ecw https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/19182.ecw

View file

@ -63,7 +63,7 @@ The vulnerability is located in the lupin3 (libpin3) library.
http://aluigi.org/testz/udpsz.zip http://aluigi.org/testz/udpsz.zip
https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/19289.zip https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/15992.zip
udpsz -c "POST /DocumentViewer/Control/blah HTTP/1.1\r\nCONTENT-LENGTH: 2147483647\r\n\r\n" -T SERVER 9500 -1 udpsz -c "POST /DocumentViewer/Control/blah HTTP/1.1\r\nCONTENT-LENGTH: 2147483647\r\n\r\n" -T SERVER 9500 -1
or or

View file

@ -61,4 +61,4 @@ The vulnerabilities are confirmed in version 1.98.8. Other versions may also be
=========== ===========
http://protekresearchlab.com/exploits/PRL-2012-18.gif http://protekresearchlab.com/exploits/PRL-2012-18.gif
https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/19335.gif https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/37347.gif

View file

@ -158,7 +158,7 @@ the specified size to reallocate is negative or unallocable:
http://aluigi.org/testz/udpsz.zip http://aluigi.org/testz/udpsz.zip
https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/19409.zip https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/15992.zip
A] A]
udpsz -b a -T -C 15 0x14 -C "e6563600 e6563600" 0x15 SERVER 46824 0x119 udpsz -b a -T -C 15 0x14 -C "e6563600 e6563600" 0x15 SERVER 46824 0x119

View file

@ -79,7 +79,7 @@ Service.
http://aluigi.org/testz/udpsz.zip http://aluigi.org/testz/udpsz.zip
https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/19456.zip https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/15992.zip
udpsz -T -b 0x41 -C "11 00" SERVER 1804 100 udpsz -T -b 0x41 -C "11 00" SERVER 1804 100

View file

@ -20,7 +20,7 @@ html
POC file posted at: POC file posted at:
http://www.reactionpenetrationtesting.co.uk/vuln.jls http://www.reactionpenetrationtesting.co.uk/vuln.jls
https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/19483.jls https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/21741.jls
Affected Products Affected Products

View file

@ -9,4 +9,4 @@ This vulnerability can only be launched against a machine a user can interactive
start porttool -s6 \BaseNamedObjects\Foo start porttool -s6 \BaseNamedObjects\Foo
porttool -c6 \BaseNamedObject\Foo porttool -c6 \BaseNamedObject\Foo
https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/20255.zip https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/20254.zip

View file

@ -6,4 +6,4 @@ The vulnerability occurs when numerous chat dialog boxes are opened by the eDonk
An attacker can exploit this vulnerability by connecting to a vulnerable eDonkey user and issuing numerous chat requests. An attacker can exploit this vulnerability by connecting to a vulnerable eDonkey user and issuing numerous chat requests.
https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/22395.zip https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/22420.zip

View file

@ -6,4 +6,4 @@ This issue was identified by creating random input for the browser, and has not
Successful exploitation may result in execution of arbitrary code in the context of the user executing the affected browser. Successful exploitation may result in execution of arbitrary code in the context of the user executing the affected browser.
https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/25991.jpg https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/25992-1.jpg

View file

@ -8,4 +8,4 @@ Successful exploitation results in crashing the affected Web browser. It may be
https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/25992-1.jpg https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/25992-1.jpg
https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/25992-2.jpg https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/31984.jpg

View file

@ -8,6 +8,6 @@ This BID will be updated and potentially split into separate records as further
UPDATE (Mar 14, 2006): Microsoft has released security advisory MS06-012 addressing this and other issues. UPDATE (Mar 14, 2006): Microsoft has released security advisory MS06-012 addressing this and other issues.
https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/26869-1.xls https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/27055-2.xls
https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/26869-2.xls https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/27055-1.xls

View file

@ -9,4 +9,4 @@ This issue affects the following:
SurgeMail 38k4, beta 39a and earlier SurgeMail 38k4, beta 39a and earlier
Netwin WebMail 3.1s and earlier Netwin WebMail 3.1s and earlier
https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/31300.zip https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/31301.zip

View file

@ -6,4 +6,4 @@ Attackers may leverage this issue to execute arbitrary code in the context of th
Media Jukebox 12 is vulnerable; other versions may also be affected. Media Jukebox 12 is vulnerable; other versions may also be affected.
https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/33710.mp3 https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/8837.mp3

View file

@ -6,4 +6,4 @@ Attackers may leverage this issue to execute arbitrary code in the context of th
BS.Player 2.51 Build 1022 is vulnerable; other versions may also be affected. BS.Player 2.51 Build 1022 is vulnerable; other versions may also be affected.
https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/33711.mp3 https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/8837.mp3

View file

@ -6,7 +6,7 @@ Attackers can exploit this issue to cause the server to dereference an invalid m
RealityServer Web Services 3.1.1 build 144525.5057 is vulnerable; other versions may also be affected. RealityServer Web Services 3.1.1 build 144525.5057 is vulnerable; other versions may also be affected.
https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/35895.zip https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/15992.zip

View file

@ -5,6 +5,6 @@ Yahoo! Messenger 8.1.0.413 (webcam) Remote Crash Exploit
3.when the otherside accept the invatation , inject the dll to local yahoo! messenger 8.1.0.413 's process. 3.when the otherside accept the invatation , inject the dll to local yahoo! messenger 8.1.0.413 's process.
4 . the otherside's yahoo! messenger will be crashed. 4 . the otherside's yahoo! messenger will be crashed.
Exploit-DB Mirror: https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/4335.rar (08292007-expyahoo.rar) Exploit-DB Mirror: https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/30500.rar (08292007-expyahoo.rar)
# milw0rm.com [2007-08-29] # milw0rm.com [2007-08-29]

View file

@ -23,7 +23,7 @@ cccccccc ??
== ==
*** Proof Of Concept: http://zeroscience.org/codes/aimp2_evil.mp3 http://www.zeroscience.mk/old/codes/aimp2_evil.mp3 *** Proof Of Concept: http://zeroscience.org/codes/aimp2_evil.mp3 http://www.zeroscience.mk/old/codes/aimp2_evil.mp3
https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/9167.mp3 (2009-aimp2_evil.mp3) https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/8837.mp3 (2009-aimp2_evil.mp3)
** Note: The same PoC used in: ** Note: The same PoC used in:
- http://secunia.com/advisories/35305/ - http://secunia.com/advisories/35305/

View file

@ -75,7 +75,7 @@
# # # #
# - 1. http://zeroscience.org/codes/aimp2_evil.mp3 # # - 1. http://zeroscience.org/codes/aimp2_evil.mp3 #
# # # #
# - 2. https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/9167.mp3 (2009-aimp2_evil.mp3) (mirror) # # - 2. https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/8837.mp3 (2009-aimp2_evil.mp3) (mirror) #
# # # #
# - 3. http://securityreason.com/download/11/13 (mirror) # # - 3. http://securityreason.com/download/11/13 (mirror) #
# # # #

View file

@ -44,7 +44,7 @@ http://www.zeroscience.org/
PoC: 1. http://zeroscience.org/codes/aimp2_evil.mp3 PoC: 1. http://zeroscience.org/codes/aimp2_evil.mp3
2. https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/9167.mp3 (2009-aimp2_evil.mp3) 2. https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/8837.mp3 (2009-aimp2_evil.mp3)
3. http://securityreason.com/download/11/13 3. http://securityreason.com/download/11/13
# milw0rm.com [2009-07-16] # milw0rm.com [2009-07-16]

View file

@ -22,4 +22,4 @@ int evil()
return 0; return 0;
} }
// POC: https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/14744.zip // POC: https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/14745.zip

View file

@ -63,4 +63,4 @@ porttool -c \BaseNamedObjects\Foo3
(in window for porttool -s5b) (in window for porttool -s5b)
Enter PID, TID, MID, CID from porttool -s Enter PID, TID, MID, CID from porttool -s
https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/20257.zip https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/20254.zip

View file

@ -13,4 +13,4 @@ start porttool -c \BaseNamedObjects\Foo
porttool -s3 \BaseNamedObjects\Foo2 porttool -s3 \BaseNamedObjects\Foo2
(enter PID, TID, MID from porttool -s ...) (enter PID, TID, MID from porttool -s ...)
https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/20265.zip https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/20254.zip

View file

@ -4,4 +4,4 @@ Microsoft Windows is prone to a privilege-escalation vulnerability.
Successful exploits may allow authenticated users to elevate their privileges to NetworkService. This allows attackers to execute code with elevated privileges and aids in further exploits. Successful exploits may allow authenticated users to elevate their privileges to NetworkService. This allows attackers to execute code with elevated privileges and aids in further exploits.
https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/31667.zip https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/6705.zip

View file

@ -24,7 +24,7 @@
+ Reference : http://www.microsoft.com/technet/security/advisory/932114.mspx - Microsoft Security Advisory (932114) + Reference : http://www.microsoft.com/technet/security/advisory/932114.mspx - Microsoft Security Advisory (932114)
- https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/3260.doc (02032007-word2000exp.doc) - https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/29524.doc (02032007-word2000exp.doc)
- http://www.returnaddr.org/exploit/word2000 - http://www.returnaddr.org/exploit/word2000
############ use at your own risk ******* ############ use at your own risk *******

View file

@ -11,4 +11,4 @@ Windows Server 2003
Windows Vista Windows Vista
Windows Server 2008 Windows Server 2008
https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/32891.zip https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/6705.zip

View file

@ -9,4 +9,4 @@ The issue affects the following:
Windows XP SP2 Windows XP SP2
Windows Server 2003 Windows Server 2003
https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/32892.zip https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/6705.zip

View file

@ -9,4 +9,4 @@ The issue affects the following:
Windows Vista Windows Vista
Windows Server 2008 Windows Server 2008
https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/32893.zip https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/6705.zip

View file

@ -2,7 +2,7 @@ Runs calc.exe on Office XP SP3 with updates < 03/11/08.
Just for fun... Just for fun...
https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/5320.tgz (2008-ms08-016.tgz) https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/31361.tgz (2008-ms08-016.tgz)
Marsupilamipowa@hotmail.fr Marsupilamipowa@hotmail.fr

View file

@ -27,7 +27,7 @@
Exploit: Exploit:
http://www.ntinternals.org/ntiadv0802/AKEProtect_Exp.zip http://www.ntinternals.org/ntiadv0802/AKEProtect_Exp.zip
backup: https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/7054.zip (2008-AKEProtect_Exp.zip) backup: https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/32572-1.zip (2008-AKEProtect_Exp.zip)
Advisory: Advisory:
http://www.ntinternals.org/ntiadv0802/ntiadv0802.html http://www.ntinternals.org/ntiadv0802/ntiadv0802.html

View file

@ -33,7 +33,7 @@
Exploit: Exploit:
http://ntinternals.org/ntiadv0812/ElbyCDIO_Exp.zip http://ntinternals.org/ntiadv0812/ElbyCDIO_Exp.zip
https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/8250.zip (2009-ElbyCDIO_Exp.zip) https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/32850.zip (2009-ElbyCDIO_Exp.zip)
Advisory: Advisory:
http://ntinternals.org/ntiadv0812/ntiadv0812.html http://ntinternals.org/ntiadv0812/ntiadv0812.html

View file

@ -349,4 +349,4 @@ binary info:
POC: POC:
pocs availiable here: http://retrogod.altervista.org/9sg_realgames_i.html pocs availiable here: http://retrogod.altervista.org/9sg_realgames_i.html
https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/17104.zip (9sg_StubbyUtil.ShellCtl.1.zip) https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/35560-1.zip (9sg_StubbyUtil.ShellCtl.1.zip)

View file

@ -226,4 +226,4 @@ binary info:
poc: poc:
pocs availiable here: http://retrogod.altervista.org/9sg_realgames_ii.html pocs availiable here: http://retrogod.altervista.org/9sg_realgames_ii.html
https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/17105.zip (9sg_StubbyUtil.ProcessMgr.1.zip) https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/35560-2.zip (9sg_StubbyUtil.ProcessMgr.1.zip)

View file

@ -6,4 +6,4 @@ There have been reports that some users may not be able to reproduce this vulner
https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/22288-1.zip https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/22288-1.zip
https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/22288-2.zip https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/22338.zip

View file

@ -2,4 +2,4 @@ source: https://www.securityfocus.com/bid/8577/info
Multiple issues have been reported in Microsoft Internet Explorer. Though these issues have been reported by a reliable source, communication issues have presented difficulty in obtaining details surrounding the reported issues. This vulnerability entry will be updated when additional information becomes available. Multiple issues have been reported in Microsoft Internet Explorer. Though these issues have been reported by a reliable source, communication issues have presented difficulty in obtaining details surrounding the reported issues. This vulnerability entry will be updated when additional information becomes available.
https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/23131.zip https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/21199.zip

View file

@ -6,4 +6,4 @@ This could aid in exploitation of other vulnerabilities, such as issues that per
Liu Die Yu has released conflicting information that states that this issue occurs because the user is redirected into a local resource and then the local resource is being refreshed. It is reported that other variations such as "file://" or "[DriveLetter]:\[...]" also work with this exploit. This is currently under investigation. Liu Die Yu has released conflicting information that states that this issue occurs because the user is redirected into a local resource and then the local resource is being refreshed. It is reported that other variations such as "file://" or "[DriveLetter]:\[...]" also work with this exploit. This is currently under investigation.
https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/23283.zip https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/21199.zip

View file

@ -8,6 +8,6 @@ The extra slash prior to "Documents and Settings" will cause the referenced cont
** A new proof-of-concept has been made available which uses the vulnerability described in BID 9106 to locate the Internet Explorer cache. ** A new proof-of-concept has been made available which uses the vulnerability described in BID 9106 to locate the Internet Explorer cache.
https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/23340-1.zip https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/21199.zip
https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/23340-2.zip https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/23340-2.zip

View file

@ -6,4 +6,4 @@ A successful attack can allow the attacker to place potentially malicious files
This issue affects UltraISO version 8.0.0. 1392; other versions may also be affected. This issue affects UltraISO version 8.0.0. 1392; other versions may also be affected.
https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/27758.iso.bin https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/27746.iso.bin

View file

@ -6,4 +6,4 @@ A successful attack can allow the attacker to place potentially malicious files
This issue affects MagicISO version 5.0 Build 0166; other versions may also be affected. This issue affects MagicISO version 5.0 Build 0166; other versions may also be affected.
https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/27759.iso.bin https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/27746.iso.bin

View file

@ -6,4 +6,4 @@ A successful attack can allow the attacker to place potentially malicious files
This issue affects PowerISO version 2.9; other versions may also be affected. This issue affects PowerISO version 2.9; other versions may also be affected.
https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/27760.iso.bin https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/27746.iso.bin

View file

@ -6,4 +6,4 @@ An attacker can exploit this issue to execute arbitrary code within the context
BootManage TFTP Server 1.99 is vulnerable; other versions may also be affected. BootManage TFTP Server 1.99 is vulnerable; other versions may also be affected.
https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/31409.zip https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/31591.zip

View file

@ -6,4 +6,4 @@ Attackers can exploit this issue to port-scan networks inside a victim computer'
Google Chrome 1.0.154.36 is affected; other versions may also be vulnerable. Google Chrome 1.0.154.36 is affected; other versions may also be vulnerable.
https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/32699.zip https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/29768.zip

View file

@ -6,4 +6,4 @@ Attackers may leverage this issue to execute arbitrary code in the context of th
VLC Media Player 1.0.5 is vulnerable; other versions may also be affected. VLC Media Player 1.0.5 is vulnerable; other versions may also be affected.
https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/33712.mp3 https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/8837.mp3

View file

@ -2,6 +2,6 @@ Author:(yunshu)
http://www.ph4nt0m.org http://www.ph4nt0m.org
poc: poc:
https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/4188.zip (07162007-flash_flv_9.0.45.0_exp.zip) https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/30288.zip (07162007-flash_flv_9.0.45.0_exp.zip)
# milw0rm.com [2007-07-16] # milw0rm.com [2007-07-16]

View file

@ -7,6 +7,6 @@ thanks ole andre again, His ospy is perfect.
3. choose "send my webcam" to a contact id who is online using 7.x (8.0?). 3. choose "send my webcam" to a contact id who is online using 7.x (8.0?).
4.when the otherside accept the invatation , the otherside's msn will be at least crashed, if you using aChinese version windows 2000 sp4 , maybe a reverse shell , if other verison windows 2000, you need adjust the jmpa address in the dll's sourcecode. 4.when the otherside accept the invatation , the otherside's msn will be at least crashed, if you using aChinese version windows 2000 sp4 , maybe a reverse shell , if other verison windows 2000, you need adjust the jmpa address in the dll's sourcecode.
https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/4334.rar (08292007-exp_msn.rar) https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/30537.rar (08292007-exp_msn.rar)
# milw0rm.com [2007-08-29] # milw0rm.com [2007-08-29]