Offensive Security
|
2a57bee5c6
|
DB: 2016-07-25
12 new exploits
Linux Kernel 2.6.x (Slackware 9.1 / Debian 3.0) - chown() Group Ownership Alteration Exploit
Linux Kernel 2.6.x (Slackware 9.1 / Debian 3.0) - chown() Group Ownership Alteration Privilege Escalation Exploit
Linux Kernel < 2.6.31-rc4 - nfs4_proc_lock() Denial of Service
FreeBSD/x86 - /bin/cat /etc/master.passwd NULL free shellcode (65 bytes)
FreeBSD/x86 - /bin/cat /etc/master.passwd Null Free Shellcode (65 bytes)
Linux/x86 - execve shellcode null byte free (Generator)
Linux/x86 - execve Null Free shellcode (Generator)
Linux/x86 - cmd shellcode null free (Generator)
Linux/x86 - cmd Null Free shellcode (Generator)
iOS - Version-independent shellcode
Linux/x86-64 - bindshell port:4444 shellcode (132 bytes)
Linux/x86-64 - bindshell port 4444 shellcode (132 bytes)
Solaris/x86 - setuid(0)_ execve(//bin/sh); exit(0) NULL Free shellcode (39 bytes)
Solaris/x86 - setuid(0)_ execve(//bin/sh); exit(0) Null Free shellcode (39 bytes)
Windows 5.0 < 7.0 x86 - null-free bindshell shellcode
Windows 5.0 < 7.0 x86 - Null Free bindshell port 28876 shellcode
Win32 - telnetbind by Winexec shellcode (111 bytes)
Win32 - telnetbind by Winexec 23 port shellcode (111 bytes)
Windows NT/2000/XP - add user _slim_ shellcode for Russian systems (318 bytes)
Windows NT/2000/XP (Russian) - Add User _slim_ Shellcode (318 bytes)
Windows XP Pro SP2 English - _Message-Box_ Shellcode Null-Free (16 bytes)
Windows XP Pro SP2 English - _Wordpad_ Shellcode Null Free (12 bytes)
Windows XP Pro SP2 English - _Message-Box_ Null Free Shellcode (16 bytes)
Windows XP Pro SP2 English - _Wordpad_ Null Free Shellcode (12 bytes)
Linux/x86 - /bin/sh Null-Free Polymorphic Shellcode (46 bytes)
Linux/x86 - /bin/sh Polymorphic Null Free Shellcode (46 bytes)
Win32 - Add new local administrator shellcode _secuid0_ (326 bytes)
Win32 - Add New Local Administrator _secuid0_ Shellcode (326 bytes)
ARM - Bindshell port 0x1337shellcode
ARM - Bindshell port 0x1337 shellcode
Linux Kernel <= 2.6.36 - VIDIOCSMICROCODE IOCTL Local Memory Overwrite
Linux Kernel <= 2.4.0 - Stack Infoleaks
bsd/x86 - connect back Shellcode (81 bytes)
FreeBSD/x86 - connect back Shellcode (81 bytes)
Acpid 1:2.0.10-1ubuntu2 (Ubuntu 11.10/11.04) - Privilege Boundary Crossing Local Root Exploit
Acpid 1:2.0.10-1ubuntu2 (Ubuntu 11.04/11.10) - Privilege Boundary Crossing Local Root Exploit
Linux Kernel 2.0 / 2.1 - SIGIO
Linux Kernel 2.0 / 2.1 - Send a SIGIO Signal To Any Process
Linux Kernel 2.2 - 'ldd core' Force Reboot
Debian 2.1_ Linux Kernel 2.0.x_ RedHat 5.2 - Packet Length with Options
Linux Kernel 2.0.x (Debian 2.1 / RedHat 5.2) - Packet Length with Options
Linux Kernel 2.2.x - Non-Readable File Ptrace
Linux Kernel 2.2.x - Non-Readable File Ptrace Local Information Leak
OS X 10.x_ FreeBSD 4.x_OpenBSD 2.x_Solaris 2.5/2.6/7.0/8 exec C Library Standard I/O File Descriptor Closure
OS X 10.x_ FreeBSD 4.x_ OpenBSD 2.x_ Solaris 2.5/2.6/7.0/8 - exec C Library Standard I/O File Descriptor Closure
Linux Kernel 2.4.18/19 - Privileged File Descriptor Resource Exhaustion
Linux Kernel 2.2.x / 2.4.x - Privileged Process Hijacking (1)
Linux Kernel 2.2.x / 2.4.x - Privileged Process Hijacking (2)
Linux Kernel 2.2.x / 2.4.x - Privileged Process Hijacking Local Root Exploit (1)
Linux Kernel 2.2.x / 2.4.x - Privileged Process Hijacking Local Root Exploit (2)
Linux Kernel 2.4 - suid execve() System Call Race Condition PoC
Linux Kernel 2.4 - suid execve() System Call Race Condition Executable File Read Proof of Concept
Linux Kernel 2.5.x / 2.6.x - CPUFreq Proc Handler Integer Handling
Linux Kernel 2.5.x / 2.6.x - CPUFreq Proc Handler Integer Handling Memory Read
Linux Kernel <= 2.6.32-5 (Debian 6.0.5) - /dev/ptmx Key Stroke Timing Local Disclosure
Microsoft Internet Explorer 6.0_ Firefox 0.x_Netscape 7.x - IMG Tag Multiple Vulnerabilities
Microsoft Internet Explorer 6.0 / Firefox 0.x / Netscape 7.x - IMG Tag Multiple Vulnerabilities
Linux Kernel 2.4.x / 2.6.x - Multiple Unspecified ISO9660 Filesystem Handling Vulnerabilities
Linux Kernel 2.4.x / 2.6.x - Bluetooth Signed Buffer Index (Proof of Concept) (1)
Linux/x86 - Reverse TCP Bind Shellcode (92 bytes)
Linux/x86 - Reverse TCP Bind 192.168.1.10:31337 Shellcode (92 bytes)
Linux Kernel 2.2.x / 2.3.x / 2.4.x / 2.5.x / 2.6.x - ELF Core Dump Local Buffer Overflow
Linux/x86-64 - Bind TCP port shellcode (81 bytes / 96 bytes with password)
Linux/x86-64 - Bind TCP 4444 Port Shellcode (81 bytes / 96 bytes with password)
Linux/x86 - TCP Bind Shel shellcode l (96 bytes)
Linux/x86 - TCP Bind Shell 33333 Port Shellcode (96 bytes)
Mac OS X < 10.7.5/10.8.2/10.9.5/10.10.2 - 'rootpipe' Privilege Escalation
Mac OS X < 10.7.5/10.8.2/10.9.5/10.10.2 - 'Rootpipe' Privilege Escalation
Windows x86 - user32!MessageBox _Hello World!_ Null-Free shellcode (199 bytes)
Windows x86 - user32!MessageBox _Hello World!_ Null Free Shellcode (199 bytes)
OS-X/x86-64 - /bin/sh Shellcode NULL Byte Free (34 bytes)
OS-X/x86-64 - /bin/sh Null Free Shellcode (34 bytes)
Mainframe/System Z - Bind Shell shellcode (2488 bytes)
Mainframe/System Z - Bind Shell Port 12345 Shellcode (2488 bytes)
OS-X/x86-64 - tcp bind shellcode_ NULL byte free (144 bytes)
OS-X/x86-64 - tcp 4444 port bind Nullfree shellcode (144 bytes)
Ubuntu Apport - Local Privilege Escalation
Apport 2.19 (Ubuntu 15.04) - Local Privilege Escalation
Linux/x86-64 - Bindshell with Password shellcode (92 bytes)
Linux/x86-64 - Bindshell 31173 port with Password shellcode (92 bytes)
Windows XP < 10 - Null-Free WinExec Shellcode (Python) (Generator)
Windows XP < 10 - WinExec Null Free Shellcode (Python) (Generator)
Linux/x86-64 - bind TCP port shellcode (103 bytes)
Linux/x86-64 - TCP Bindshell with Password Prompt shellcode (162 bytes)
Linux/x86-64 - Bind TCP 4444 Port Shellcode (103 bytes)
Linux/x86-64 - TCP 4444 port Bindshell with Password Prompt shellcode (162 bytes)
Windows x86 - Null-Free Download & Run via WebDAV Shellcode (96 bytes)
Windows x86 - Download & Run via WebDAV Null Free Shellcode (96 bytes)
Linux Kernel 3.10_ 3.18 + 4.4 - netfilter IPT_SO_SET_REPLACE Memory Corruption
Linux Kernel 3.10 / 3.18 / 4.4 - netfilter IPT_SO_SET_REPLACE Memory Corruption
Windows - Null-Free Shellcode Primitive Keylogger to File (431 (0x01AF) bytes)
Windows - Primitive Keylogger to File Null Free Shellcode (431 (0x01AF) bytes)
Linux Kernel (Ubuntu 14.04.3) - perf_event_open() Can Race with execve() (/etc/shadow)
Linux Kernel (Ubuntu 14.04.3) - perf_event_open() Can Race with execve() (Access /etc/shadow)
Windows - Null-Free Shellcode Functional Keylogger to File (601 (0x0259) bytes)
Windows - Functional Keylogger to File Null Free Shellcode (601 (0x0259) bytes)
Linux/x86-64 - Null-Free Reverse TCP Shell shellcode (134 bytes)
Linux/x86-64 - Reverse TCP Shell Null Free Shellcode (134 bytes)
Linux/x86-64 - Syscall Persistent Bind Shell + Multi-terminal + Password + Daemon (83_ 148_ 177 bytes)
Linux/x86-64 - Syscall Persistent Bind Shell + Multi-terminal + Password + Daemon Shellcode (83_ 148_ 177 bytes)
Linux/x86-64 - Subtle Probing Reverse Shell_ Timer_ Burst_ Password_ Multi-Terminal (84_ 122_ 172 bytes)
Linux/x86-64 - Subtle Probing Reverse Shell_ Timer_ Burst_ Password_ Multi-Terminal Shellcode (84_ 122_ 172 bytes)
|
2016-07-25 05:06:19 +00:00 |
|
Offensive Security
|
76bc268c80
|
DB: 2016-07-11
|
2016-07-11 05:06:57 +00:00 |
|
Offensive Security
|
39fe341c5b
|
DB: 2016-04-26
9 new exploits
Totemomail 4.x and 5.x - Persistent XSS
C/C++ Offline Compiler and C For OS - Persistent XSS
Gemtek CPE7000 - WLTCS-106 Administrator SID Retriever (MSF)
Gemtek CPE7000 - WLTCS-106 sysconf.cgi Unauthenticated Remote Command Execution (MSF)
CompuSource Systems - Real Time Home Banking - Local Privilege Escalation
Linux x64 - Bind Shell Shellcode Generator
PCMan FTP Server 2.0.7 - RENAME Command Buffer Overflow (MSF)
NationBuilder Multiple Stored XSS Vulnerabilities
Rough Auditing Tool for Security (RATS) 2.3 - Crash PoC
|
2016-04-26 05:03:34 +00:00 |
|
Offensive Security
|
f7b6199767
|
DB: 2016-02-23
7 new exploits
|
2016-02-23 05:02:07 +00:00 |
|
Offensive Security
|
958f5c3f9d
|
DB: 2016-01-29
40 new exploits
|
2016-01-29 05:03:51 +00:00 |
|
Offensive Security
|
a5b96c2067
|
DB: 2016-01-28
11 new exploits
|
2016-01-28 05:02:01 +00:00 |
|
Offensive Security
|
73b5663d00
|
DB: 2015-12-29
5 new exploits
|
2015-12-29 05:02:26 +00:00 |
|
Offensive Security
|
c4e7f4ce3a
|
DB: 2015-11-06
21 new exploits
|
2015-11-06 05:02:38 +00:00 |
|
Offensive Security
|
24fffa54a2
|
DB: 2015-09-29
25 new exploits
|
2015-09-29 05:03:06 +00:00 |
|
Offensive Security
|
1d1147296b
|
DB: 2015-09-23
35 new exploits
|
2015-09-23 05:02:17 +00:00 |
|
Offensive Security
|
37dce18f7f
|
DB: 2015-09-03
16 new exploits
|
2015-09-03 05:02:25 +00:00 |
|
Offensive Security
|
270dc872cf
|
DB: 2015-09-01
17 new exploits
|
2015-09-01 05:02:37 +00:00 |
|
Offensive Security
|
d891c95c0e
|
DB: 2015-08-29
11 new exploits
|
2015-08-29 05:01:51 +00:00 |
|
Offensive Security
|
cbdd64e888
|
DB: 2015-08-16
21 new exploits
|
2015-08-16 05:02:57 +00:00 |
|
Offensive Security
|
992137fd37
|
DB: 2015-07-22
5 new exploits
|
2015-07-22 05:01:58 +00:00 |
|
Offensive Security
|
8ad2e6be05
|
DB: 2015-07-06
3 new exploits
|
2015-07-06 05:01:55 +00:00 |
|
Offensive Security
|
5cd9f850c3
|
DB: 2015-06-07
11 new exploits
|
2015-06-07 05:02:18 +00:00 |
|
Offensive Security
|
132b3784f2
|
DB: 2015-05-26
11 new exploits
|
2015-05-26 05:02:24 +00:00 |
|
Offensive Security
|
6086516a4d
|
DB: 2015-05-19
19 new exploits
|
2015-05-19 05:03:23 +00:00 |
|
Offensive Security
|
b3321b3426
|
DB: 2015-05-15
17 new exploits
|
2015-05-15 05:02:32 +00:00 |
|
Offensive Security
|
e6dc3c025a
|
DB: 2015-05-09
28 new exploits
|
2015-05-09 05:03:14 +00:00 |
|
Offensive Security
|
01ba689949
|
DB: 2015-05-08
19 new exploits
|
2015-05-08 05:02:43 +00:00 |
|
Offensive Security
|
b2d25f8fa5
|
DB: 2015-05-07
9 new exploits
|
2015-05-07 05:03:16 +00:00 |
|
Offensive Security
|
dc83e39d07
|
DB: 2015-05-06
3 new exploits
|
2015-05-06 05:01:34 +00:00 |
|
Offensive Security
|
0df2ff7351
|
DB: 2015-05-05
15 new exploits
|
2015-05-05 05:03:01 +00:00 |
|
Offensive Security
|
fffcb94afe
|
DB: 2015-04-22
30 new exploits
|
2015-04-22 05:02:28 +00:00 |
|
Offensive Security
|
cc553d1147
|
DB: 2015-04-20
11 new exploits
|
2015-04-20 12:44:13 +00:00 |
|
Offensive Security
|
5924dde297
|
DB: 2015-03-19
2 new exploits
|
2015-03-19 09:39:10 +00:00 |
|
Offensive Security
|
97ea72788a
|
Update: 2015-01-15
10 new exploits
|
2015-01-15 08:37:04 +00:00 |
|
Offensive Security
|
1709d70e04
|
Updated 10_29_2014
|
2014-10-29 04:45:11 +00:00 |
|
Offensive Security
|
2d32c6c0f9
|
Updated 10_27_2014
|
2014-10-27 04:48:25 +00:00 |
|
Offensive Security
|
b7c11b0dcd
|
Updated 10_24_2014
|
2014-10-24 04:45:15 +00:00 |
|
Offensive Security
|
63aa7610b4
|
Updated 10_17_2014
|
2014-10-17 04:45:02 +00:00 |
|
Offensive Security
|
478ee155fa
|
Updated 10_16_2014
|
2014-10-16 04:44:33 +00:00 |
|
Offensive Security
|
501c894288
|
Updated 10_01_2014
|
2014-10-01 04:44:03 +00:00 |
|
Offensive Security
|
fa2af94205
|
Updated 09_19_2014
|
2014-09-19 04:44:37 +00:00 |
|
Offensive Security
|
d2e6d5e899
|
Updated 09_18_2014
|
2014-09-18 04:43:58 +00:00 |
|
Offensive Security
|
58cf70abfb
|
Updated 09_13_2014
|
2014-09-13 04:43:42 +00:00 |
|
Offensive Security
|
b737a287b1
|
Updated 08_25_2014
|
2014-08-25 04:41:28 +00:00 |
|
Offensive Security
|
b3b8cbd244
|
Updated 08_11_2014
|
2014-08-11 04:39:21 +00:00 |
|
Offensive Security
|
545c6bdf18
|
Updated 08_06_2014
|
2014-08-06 04:39:53 +00:00 |
|
Offensive Security
|
9d2bfdf51e
|
Updated 08_04_2014
|
2014-08-04 04:39:56 +00:00 |
|
Offensive Security
|
3782948984
|
Updated 07_31_2014
|
2014-07-31 04:40:32 +00:00 |
|
Offensive Security
|
a4102ef337
|
Updated 07_09_2014
|
2014-07-09 04:38:20 +00:00 |
|
Offensive Security
|
e97b490546
|
Updated 06_05_2014
|
2014-06-05 04:36:35 +00:00 |
|
Offensive Security
|
a6e2fc1461
|
Updated 04_27_2014
|
2014-04-27 04:36:25 +00:00 |
|
Offensive Security
|
46dd79985b
|
Updated 04_18_2014
|
2014-04-18 04:35:42 +00:00 |
|
Offensive Security
|
7493f23711
|
Updated 04_10_2014
|
2014-04-10 04:33:37 +00:00 |
|