DB: 2022-11-22

93 changes to exploits/shellcodes/ghdb
This commit is contained in:
Offensive Security 2022-11-22 11:08:59 +00:00
parent 03db452e11
commit ec8ac60c13
93 changed files with 94 additions and 94 deletions

View file

@ -1,3 +1,3 @@
I wrote a fuzzer "dumb fuzzer" and used a sample from http://www.ccp14.ac.uk/ccp/web-mirrors/bca-spreadsheets/scanplot101.xls which I randomly found on the internet. I mutated the data and tested roughly 1000 cases on several Document Reader Applications for iPhone.
https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/13823.xls (savysoda_poc.xls)
https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/13825.xls (savysoda_poc.xls)

View file

@ -9,7 +9,7 @@
# V100R001B121Telmex
# Exploit Download Link:
# http://www.hakim.ws/huawei/HG520_udpinfo.tar.gz
# https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/12298.tar.gz (HG520_udpinfo.tar.gz)
# https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/33869.tar.gz (HG520_udpinfo.tar.gz)
By sending a specially crafted UDP packet you can remotely obtain the

View file

@ -4,4 +4,4 @@ LibTIFF is prone to a denial-of-service vulnerability because it fails to proper
An attacker can exploit this issue to crash an application that uses the vulnerable library, denying service to legitimate users.
https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/34278.tif
https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/34279.tif

View file

@ -4,4 +4,4 @@ mtink is prone to a locally exploitable buffer overflow condition. This is due t
mtink is reportedly installed setgid 'sys' on Mandrake Linux, so it is possible that this issue may be exploited to execute arbitrary code with elevated privileges. Other distributions may also be affected if mtink is installed or runs with elevated privileges.
https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/22189.tar.gz
https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/21001.tar.gz

View file

@ -4,4 +4,4 @@ It has been reported that a buffer overflow in escputil exists. When supplied wi
escputil is reportedly installed setgid 'sys' on Mandrake Linux, so it is possible that this issue may be exploited to execute arbitrary code with elevated privileges. Other distributions may also be affected if the utility is installed or runs with elevated privileges.
https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/22190.tar.gz
https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/21001.tar.gz

View file

@ -6,6 +6,6 @@ Successfully exploiting these issues can allow an attacker to execute arbitrary
Vim 7.1.298 is vulnerable; other versions may also be affected.
https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/31911-1.zip
https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/32055.zip
https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/31911-2.zip
https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/31911-3.zip

View file

@ -301,6 +301,6 @@
http://grsecurity.net/~spender/cheddar_bay.tgz
backup: https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/9191.tgz (2009-cheddar_bay.tgz)
backup: https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/33088-2.tgz (2009-cheddar_bay.tgz)
# milw0rm.com [2009-07-17]

View file

@ -37,6 +37,6 @@
*/
http://www.grsecurity.net/~spender/enlightenment.tgz
back: https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/9627.tgz (2009-enlightenment.tgz)
back: https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/33088-1.tgz (2009-enlightenment.tgz)
# milw0rm.com [2009-09-10]

View file

@ -4,4 +4,4 @@ Opera is prone to vulnerability that may allow attackers to obtain potentially s
A successful exploit of this issue would cause the affected application to connect to arbitrary TCP ports and potentially reveal sensitive information about services that are running on the affected computer. Information obtained may aid attackers in further attacks.
https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/29769.zip
https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/29768.zip

View file

@ -4,4 +4,4 @@ KDE Konqueror is prone to a vulnerability that may allow attackers to obtain pot
A successful exploit of this issue would cause the affected application to connect to arbitrary TCP ports and potentially reveal sensitive information about services that are running on the affected computer. Information obtained may aid attackers in further attacks.
https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/29770.zip
https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/29768.zip

View file

@ -4,4 +4,4 @@ Wireshark is prone to a memory-corruption vulnerability because it fails to prop
Successful exploits may allow attackers to execute arbitrary code within the context of the affected application. Failed exploit attempts will likely crash the application.
https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/35314.pcap
https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/36128.pcap

View file

@ -168,4 +168,4 @@ An attacker can exploit this issue to execute arbitrary malicious code in the co
LibTIFF 3.8.2 is vulnerable; other versions may be affected as well.
https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/10205.zip (2009-11-22-35451.zip)
https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/33049.zip (2009-11-22-35451.zip)

View file

@ -69,7 +69,7 @@ Multi-Computer Virtual Whiteboard and so on.
http://aluigi.org/poc/qtsslame.zip
or
https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/14268.zip (qtsslame.zip)
https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/34227.zip (qtsslame.zip)
#######################################################################

View file

@ -104,7 +104,7 @@ bytes.
http://aluigi.org/testz/udpsz.zip
https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/18600.zip
https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/18112.zip
A]
udpsz -T -C "00000100 ffff0200" 0 -b a -C "00 00 1000000000000000 00" -1 SERVER 2502 8+0x02ffff

View file

@ -94,7 +94,7 @@ INCREMENT SYSAM_LICENSE_SERVER SYBASE 2.0 permanent 1 ISSUER="Sybase, \
http://aluigi.org/testz/udpsz.zip
https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/18877.zip
https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/18112.zip
udpsz -D -T -C "2f 24 189d 4000 0000 0000 00000000 00000000 0000" -b 0x61 SERVER 27000 0x4000

View file

@ -4,4 +4,4 @@ Roger Wilco Server has been reported prone to a remote denial of service vulnera
A remote attacker may exploit this condition to deny service to legitimate users.
https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/23902.zip
https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/23904.zip

View file

@ -4,4 +4,4 @@ Live For Speed is prone to four vulnerabilities, including buffer-overflow and d
Successful exploits could allow attackers to execute arbitrary code or to crash game servers.
https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/30498.zip
https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/33182-2.zip

View file

@ -7,4 +7,4 @@ An attacker can exploit this issue to crash the affected application, denying se
This issue affects Foxit WAC Server 2.0 Build 3503 and prior versions.
https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/30990-1.zip
https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/30990-2.zip
https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/31232.zip

View file

@ -6,4 +6,4 @@ Successful exploits may allow attackers to cause denial-of-service conditions. D
GRAW 1.35 and GRAW 2 1.05 are vulnerable; other versions may also be affected.
https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/34270.zip
https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/14286.zip

View file

@ -1,5 +1,5 @@
Acrobat <= 9.1.1 Stack Overflow Crashy PoC
https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/8826.pdf (2009-crashy_the_clown.pdf)
https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/33017.pdf (2009-crashy_the_clown.pdf)
# milw0rm.com [2009-05-29]

View file

@ -16,4 +16,4 @@ By combining these two flaws a malicious applet can accept connections from any
Both Netscape and Microsoft Java Virtual Machines are affected by this vulnerability, however in Microsoft products the file: URL type will not be effective in reading files, meaning that only web-available documents can be retreived via this method. However, the file: method will verify the existence of a file. It will check to see if the file exists and if it does not, it will return a SecurityException error message. Netscape browsers will pass both web documents and local files to the attacker.
https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/20139.tar.gz
https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/20140.tar.gz

View file

@ -4,4 +4,4 @@ A remote format string vulnerability affects XPand Rally. This issue is due to a
An attacker may leverage this issue to execute arbitrary code with the privileges of an unsuspecting user that activated the vulnerable server or client application.
https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/25205.zip
https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/25574-1.zip

View file

@ -6,4 +6,4 @@ An attacker may leverage this issue to execute arbitrary code with the privilege
https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/25574-1.zip
https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/25574-2.zip
https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/25584.zip

View file

@ -6,4 +6,4 @@ This vulnerability allows remote attackers to crash affected game servers. Due t
https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/25691-1.zip
https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/25691-2.zip
https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/25692.zip

View file

@ -6,4 +6,4 @@ This issue allows remote attackers to execute arbitrary code within the context
Version 0.7.0, CVS July 30th 2006 and prior versions are vulnerable to this issue.
https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/28344.zip
https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/28345.zip

View file

@ -6,4 +6,4 @@ An attacker can exploit this issue to execute arbitrary code with the privileges
RakNet 3.72 is affected; other versions may be vulnerable as well.
https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/33802.zip
https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/14286.zip

View file

@ -6,4 +6,4 @@ Successful exploits can allow remote attackers to execute arbitrary machine code
netkar-PRO 1.1 is vulnerable; other versions may also be affected.
https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/33847.zip
https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/33849.zip

View file

@ -9,4 +9,4 @@ The following applications include the vulnerable engine:
Enemy Territory: Quake Wars 1.5.12642.33243 and prior
Wolfenstein 1.3.344272 and prior
https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/34271.zip
https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/14286.zip

View file

@ -6,4 +6,4 @@ Successful exploits may allow an attacker to execute arbitrary code in the conte
The issue affects lm_tcp <= 9.0.0 0248.18.0.0; other versions may also be affected.
https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/35062.zip
https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/15707.zip

View file

@ -4,4 +4,4 @@ A vulnerability has been discovered in the PHP-Nuke Web Mail module. When a user
By accessing a PHP script located in the web directory, arbitrary PHP commands will be executed on the target server.
https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/22089.zip
https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/22090.zip

View file

@ -1,5 +1,5 @@
Sun Solaris <= 10 rpc.ypupdated Remote Root Exploit
https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/5282.tar.gz (2008-ypk2008.tar.gz)
https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/20259.tar.gz (2008-ypk2008.tar.gz)
# milw0rm.com [2008-03-20]

View file

@ -14,4 +14,4 @@ Foxit Reader is prone to a remote code-execution vulnerability because is fails
An attacker can exploit this issue by supplying a malicious PDF file or webpage. Successful exploits may allow the attacker to execute arbitrary code in the context of a user running the affected application. Failed attempts will likely result in denial-of-service conditions.
Exploit-DB Mirror: https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/10204.tar (2009-11-22-36668.tar)
Exploit-DB Mirror: https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/33283.tar (2009-11-22-36668.tar)

View file

@ -1,7 +1,7 @@
When Orb is first installed it registers several Direct Show filters with the system. When registered these filters are then called whenever a file which has a dependency on such a required filter is accessed. By specially crafting specific headers embedded into an mp3 file we can create a direct code path to code which is vulnerable to a integer division by zero. This vulnerability can be triggered remotely be embedding the crafted mp3 file into HTML. It is also not dependent on a certain media player. Attached is a PoC (Proof-Of-Concept) I wrote for this specific bug. Also included is a Rebuild file for IDA Pro examining the crash.
Download POC:
https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/11632.zip (aac_parser_int_div_by_0_orb.zip)
https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/33707.zip (aac_parser_int_div_by_0_orb.zip)
Timeline:

View file

@ -7,7 +7,7 @@
|_| |_|\____/_/ \_\____/|____/
http://www.exploit-db.com/moaub-9-mozilla-firefox-xslt-sort-remote-code-execution-vulnerability/
https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/14949.zip (moaub-day9-ba.zip)
https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/34192.zip (moaub-day9-ba.zip)
'''

View file

@ -7,7 +7,7 @@
|_| |_|\____/_/ \_\____/|____/
http://www.exploit-db.com/moaub-17-firefox-plugin-parameter-ensurecachedattrparamarrays-remote-code-execution/
https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/15027.zip (moaub-17-exploit.zip)
https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/34358.zip (moaub-17-exploit.zip)
'''
'''
Title : Firefox Plugin Parameter EnsureCachedAttrParamArrays Remote Code Execution

View file

@ -202,7 +202,7 @@ K (maybe)]
http://aluigi.org/poc/snabase_1.zip
https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/17159.zip
https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/36211.zip
A]
nc SERVER PORT < snabase_1a.dat

View file

@ -208,7 +208,7 @@ flow and executing code under SYSTEM privileges.
http://aluigi.org/testz/udpsz.zip
https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/17830.zip (udpsz.zip)
https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/15992.zip (udpsz.zip)
udpsz -C 00140004 -b a -l 0 -T 0xffffffff SERVER 42 0x140008

View file

@ -54,7 +54,7 @@ Denial of Service caused by an invalid read access.
http://aluigi.org/testz/udpsz.zip
https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/17835.zip
https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/15707.zip
udpsz -C "03 66 14 71 00 00 00 00 06 00 00 00 0a ff ff 02 01 01 10 27" -b 0xff SERVER 48899 0x5fe

View file

@ -83,7 +83,7 @@ buffer of 8192 bytes for containing the incoming HTTP requests.
http://aluigi.org/testz/udpsz.zip
https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/17842-2.dat
https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/15707.zip
udpsz -T -b 0x61 SERVER 808 10000

View file

@ -126,7 +126,7 @@ for executing any desired custom command.
http://aluigi.org/testz/udpsz.zip
https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/17844-1.zip
https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/15707.zip
only a simple scanner:
udpsz -d 2 -c "xx%" -b a -X 0 16 l 0x6161 -T -l 0 SERVER 11234 0x2000

View file

@ -238,7 +238,7 @@ effect.
http://aluigi.org/testz/udpsz.zip (version 0.3.3)
https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/17885-1.zip
https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/17879.zip
A]
udpsz -T -C "08000000 00000000 ffffffff" -b a SERVER 8800 0x400

View file

@ -89,7 +89,7 @@ integer overflow vulnerability:
http://aluigi.org/testz/udpsz.zip
https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/17889.zip
https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/17879.zip
udpsz -b a -T -c "1=4294967279~2=0~" SERVER PORT 0xffff

View file

@ -111,7 +111,7 @@ http://aluigi.org/mytoolz/mydown.zip
https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/17963-1.zip
http://aluigi.org/testz/udpsz.zip
https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/17963-2.zip
https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/17879.zip
A]
mydown http://SERVER/..\..\..\..\..\..\..\boot.ini

View file

@ -58,7 +58,7 @@ No additional research performed.
http://aluigi.org/testz/udpsz.zip
https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/17965.zip
https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/17879.zip
udpsz -l 2000 -c ".NET\1\0\0\0\0\0\xff\xff\xff\xff\4\0\1\1\x25\0\0\0tcp://127.0.0.1/OPC Systems Interface\6\0\1\1" -T SERVER 58723 0x80

View file

@ -194,7 +194,7 @@ number or on the sum of both:
http://aluigi.org/testz/udpsz.zip
https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/18166-1.zip
https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/18112.zip
A]
udpsz -C "0004 02 00 00 00 ffffffff" -b a -T SERVER 2308 2+0x400

View file

@ -91,4 +91,4 @@ a use-after-free by e.g. tricking a user into opening a specially crafted file.
===========
http://www.protekresearchlab.com/exploits/PRL-2012-07.tif
https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/18633.tif
https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/19338.tif

View file

@ -62,7 +62,7 @@ and can be exploited to cause a heap-based buffer overflow via a specially craft
4) The PoC
=============
https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/18739.fpx
https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/19960.fpx
###############################################################################

View file

@ -87,7 +87,7 @@ Stack overflow in the BackupToAvi method used by the ActiveX components
A]
http://aluigi.org/testz/udpsz.zip
https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/18765-1.zip
https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/18112.zip
NiwMasterService:
udpsz -b 0x80 -T SERVER 4505 0x28

View file

@ -82,7 +82,7 @@ advisory must be considered only a case study and nothing more.
http://aluigi.org/testz/udpsz.zip
https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/18864.zip
https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/18112.zip
A]

View file

@ -65,4 +65,4 @@ and can be exploited to cause a heap-based buffer overflow via a specially craft
=============
http://protekresearchlab.com/exploits/PRL-2012-10.ecw
https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/18964.ecw
https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/19182.ecw

View file

@ -63,7 +63,7 @@ The vulnerability is located in the lupin3 (libpin3) library.
http://aluigi.org/testz/udpsz.zip
https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/19289.zip
https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/15992.zip
udpsz -c "POST /DocumentViewer/Control/blah HTTP/1.1\r\nCONTENT-LENGTH: 2147483647\r\n\r\n" -T SERVER 9500 -1
or

View file

@ -61,4 +61,4 @@ The vulnerabilities are confirmed in version 1.98.8. Other versions may also be
===========
http://protekresearchlab.com/exploits/PRL-2012-18.gif
https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/19335.gif
https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/37347.gif

View file

@ -158,7 +158,7 @@ the specified size to reallocate is negative or unallocable:
http://aluigi.org/testz/udpsz.zip
https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/19409.zip
https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/15992.zip
A]
udpsz -b a -T -C 15 0x14 -C "e6563600 e6563600" 0x15 SERVER 46824 0x119

View file

@ -79,7 +79,7 @@ Service.
http://aluigi.org/testz/udpsz.zip
https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/19456.zip
https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/15992.zip
udpsz -T -b 0x41 -C "11 00" SERVER 1804 100

View file

@ -20,7 +20,7 @@ html
POC file posted at:
http://www.reactionpenetrationtesting.co.uk/vuln.jls
https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/19483.jls
https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/21741.jls
Affected Products

View file

@ -9,4 +9,4 @@ This vulnerability can only be launched against a machine a user can interactive
start porttool -s6 \BaseNamedObjects\Foo
porttool -c6 \BaseNamedObject\Foo
https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/20255.zip
https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/20254.zip

View file

@ -6,4 +6,4 @@ The vulnerability occurs when numerous chat dialog boxes are opened by the eDonk
An attacker can exploit this vulnerability by connecting to a vulnerable eDonkey user and issuing numerous chat requests.
https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/22395.zip
https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/22420.zip

View file

@ -6,4 +6,4 @@ This issue was identified by creating random input for the browser, and has not
Successful exploitation may result in execution of arbitrary code in the context of the user executing the affected browser.
https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/25991.jpg
https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/25992-1.jpg

View file

@ -8,4 +8,4 @@ Successful exploitation results in crashing the affected Web browser. It may be
https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/25992-1.jpg
https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/25992-2.jpg
https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/31984.jpg

View file

@ -8,6 +8,6 @@ This BID will be updated and potentially split into separate records as further
UPDATE (Mar 14, 2006): Microsoft has released security advisory MS06-012 addressing this and other issues.
https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/26869-1.xls
https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/27055-2.xls
https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/26869-2.xls
https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/27055-1.xls

View file

@ -9,4 +9,4 @@ This issue affects the following:
SurgeMail 38k4, beta 39a and earlier
Netwin WebMail 3.1s and earlier
https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/31300.zip
https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/31301.zip

View file

@ -6,4 +6,4 @@ Attackers may leverage this issue to execute arbitrary code in the context of th
Media Jukebox 12 is vulnerable; other versions may also be affected.
https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/33710.mp3
https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/8837.mp3

View file

@ -6,4 +6,4 @@ Attackers may leverage this issue to execute arbitrary code in the context of th
BS.Player 2.51 Build 1022 is vulnerable; other versions may also be affected.
https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/33711.mp3
https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/8837.mp3

View file

@ -6,7 +6,7 @@ Attackers can exploit this issue to cause the server to dereference an invalid m
RealityServer Web Services 3.1.1 build 144525.5057 is vulnerable; other versions may also be affected.
https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/35895.zip
https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/15992.zip

View file

@ -5,6 +5,6 @@ Yahoo! Messenger 8.1.0.413 (webcam) Remote Crash Exploit
3.when the otherside accept the invatation , inject the dll to local yahoo! messenger 8.1.0.413 's process.
4 . the otherside's yahoo! messenger will be crashed.
Exploit-DB Mirror: https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/4335.rar (08292007-expyahoo.rar)
Exploit-DB Mirror: https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/30500.rar (08292007-expyahoo.rar)
# milw0rm.com [2007-08-29]

View file

@ -23,7 +23,7 @@ cccccccc ??
==
*** Proof Of Concept: http://zeroscience.org/codes/aimp2_evil.mp3 http://www.zeroscience.mk/old/codes/aimp2_evil.mp3
https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/9167.mp3 (2009-aimp2_evil.mp3)
https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/8837.mp3 (2009-aimp2_evil.mp3)
** Note: The same PoC used in:
- http://secunia.com/advisories/35305/

View file

@ -75,7 +75,7 @@
# #
# - 1. http://zeroscience.org/codes/aimp2_evil.mp3 #
# #
# - 2. https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/9167.mp3 (2009-aimp2_evil.mp3) (mirror) #
# - 2. https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/8837.mp3 (2009-aimp2_evil.mp3) (mirror) #
# #
# - 3. http://securityreason.com/download/11/13 (mirror) #
# #

View file

@ -44,7 +44,7 @@ http://www.zeroscience.org/
PoC: 1. http://zeroscience.org/codes/aimp2_evil.mp3
2. https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/9167.mp3 (2009-aimp2_evil.mp3)
2. https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/8837.mp3 (2009-aimp2_evil.mp3)
3. http://securityreason.com/download/11/13
# milw0rm.com [2009-07-16]

View file

@ -22,4 +22,4 @@ int evil()
return 0;
}
// POC: https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/14744.zip
// POC: https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/14745.zip

View file

@ -63,4 +63,4 @@ porttool -c \BaseNamedObjects\Foo3
(in window for porttool -s5b)
Enter PID, TID, MID, CID from porttool -s
https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/20257.zip
https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/20254.zip

View file

@ -13,4 +13,4 @@ start porttool -c \BaseNamedObjects\Foo
porttool -s3 \BaseNamedObjects\Foo2
(enter PID, TID, MID from porttool -s ...)
https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/20265.zip
https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/20254.zip

View file

@ -4,4 +4,4 @@ Microsoft Windows is prone to a privilege-escalation vulnerability.
Successful exploits may allow authenticated users to elevate their privileges to NetworkService. This allows attackers to execute code with elevated privileges and aids in further exploits.
https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/31667.zip
https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/6705.zip

View file

@ -24,7 +24,7 @@
+ Reference : http://www.microsoft.com/technet/security/advisory/932114.mspx - Microsoft Security Advisory (932114)
- https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/3260.doc (02032007-word2000exp.doc)
- https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/29524.doc (02032007-word2000exp.doc)
- http://www.returnaddr.org/exploit/word2000
############ use at your own risk *******

View file

@ -11,4 +11,4 @@ Windows Server 2003
Windows Vista
Windows Server 2008
https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/32891.zip
https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/6705.zip

View file

@ -9,4 +9,4 @@ The issue affects the following:
Windows XP SP2
Windows Server 2003
https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/32892.zip
https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/6705.zip

View file

@ -9,4 +9,4 @@ The issue affects the following:
Windows Vista
Windows Server 2008
https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/32893.zip
https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/6705.zip

View file

@ -2,7 +2,7 @@ Runs calc.exe on Office XP SP3 with updates < 03/11/08.
Just for fun...
https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/5320.tgz (2008-ms08-016.tgz)
https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/31361.tgz (2008-ms08-016.tgz)
Marsupilamipowa@hotmail.fr

View file

@ -27,7 +27,7 @@
Exploit:
http://www.ntinternals.org/ntiadv0802/AKEProtect_Exp.zip
backup: https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/7054.zip (2008-AKEProtect_Exp.zip)
backup: https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/32572-1.zip (2008-AKEProtect_Exp.zip)
Advisory:
http://www.ntinternals.org/ntiadv0802/ntiadv0802.html

View file

@ -33,7 +33,7 @@
Exploit:
http://ntinternals.org/ntiadv0812/ElbyCDIO_Exp.zip
https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/8250.zip (2009-ElbyCDIO_Exp.zip)
https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/32850.zip (2009-ElbyCDIO_Exp.zip)
Advisory:
http://ntinternals.org/ntiadv0812/ntiadv0812.html

View file

@ -349,4 +349,4 @@ binary info:
POC:
pocs availiable here: http://retrogod.altervista.org/9sg_realgames_i.html
https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/17104.zip (9sg_StubbyUtil.ShellCtl.1.zip)
https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/35560-1.zip (9sg_StubbyUtil.ShellCtl.1.zip)

View file

@ -226,4 +226,4 @@ binary info:
poc:
pocs availiable here: http://retrogod.altervista.org/9sg_realgames_ii.html
https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/17105.zip (9sg_StubbyUtil.ProcessMgr.1.zip)
https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/35560-2.zip (9sg_StubbyUtil.ProcessMgr.1.zip)

View file

@ -6,4 +6,4 @@ There have been reports that some users may not be able to reproduce this vulner
https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/22288-1.zip
https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/22288-2.zip
https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/22338.zip

View file

@ -2,4 +2,4 @@ source: https://www.securityfocus.com/bid/8577/info
Multiple issues have been reported in Microsoft Internet Explorer. Though these issues have been reported by a reliable source, communication issues have presented difficulty in obtaining details surrounding the reported issues. This vulnerability entry will be updated when additional information becomes available.
https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/23131.zip
https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/21199.zip

View file

@ -6,4 +6,4 @@ This could aid in exploitation of other vulnerabilities, such as issues that per
Liu Die Yu has released conflicting information that states that this issue occurs because the user is redirected into a local resource and then the local resource is being refreshed. It is reported that other variations such as "file://" or "[DriveLetter]:\[...]" also work with this exploit. This is currently under investigation.
https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/23283.zip
https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/21199.zip

View file

@ -8,6 +8,6 @@ The extra slash prior to "Documents and Settings" will cause the referenced cont
** A new proof-of-concept has been made available which uses the vulnerability described in BID 9106 to locate the Internet Explorer cache.
https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/23340-1.zip
https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/21199.zip
https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/23340-2.zip

View file

@ -6,4 +6,4 @@ A successful attack can allow the attacker to place potentially malicious files
This issue affects UltraISO version 8.0.0. 1392; other versions may also be affected.
https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/27758.iso.bin
https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/27746.iso.bin

View file

@ -6,4 +6,4 @@ A successful attack can allow the attacker to place potentially malicious files
This issue affects MagicISO version 5.0 Build 0166; other versions may also be affected.
https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/27759.iso.bin
https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/27746.iso.bin

View file

@ -6,4 +6,4 @@ A successful attack can allow the attacker to place potentially malicious files
This issue affects PowerISO version 2.9; other versions may also be affected.
https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/27760.iso.bin
https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/27746.iso.bin

View file

@ -6,4 +6,4 @@ An attacker can exploit this issue to execute arbitrary code within the context
BootManage TFTP Server 1.99 is vulnerable; other versions may also be affected.
https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/31409.zip
https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/31591.zip

View file

@ -6,4 +6,4 @@ Attackers can exploit this issue to port-scan networks inside a victim computer'
Google Chrome 1.0.154.36 is affected; other versions may also be vulnerable.
https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/32699.zip
https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/29768.zip

View file

@ -6,4 +6,4 @@ Attackers may leverage this issue to execute arbitrary code in the context of th
VLC Media Player 1.0.5 is vulnerable; other versions may also be affected.
https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/33712.mp3
https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/8837.mp3

View file

@ -2,6 +2,6 @@ Author:(yunshu)
http://www.ph4nt0m.org
poc:
https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/4188.zip (07162007-flash_flv_9.0.45.0_exp.zip)
https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/30288.zip (07162007-flash_flv_9.0.45.0_exp.zip)
# milw0rm.com [2007-07-16]

View file

@ -7,6 +7,6 @@ thanks ole andre again, His ospy is perfect.
3. choose "send my webcam" to a contact id who is online using 7.x (8.0?).
4.when the otherside accept the invatation , the otherside's msn will be at least crashed, if you using aChinese version windows 2000 sp4 , maybe a reverse shell , if other verison windows 2000, you need adjust the jmpa address in the dll's sourcecode.
https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/4334.rar (08292007-exp_msn.rar)
https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/30537.rar (08292007-exp_msn.rar)
# milw0rm.com [2007-08-29]