This repository has been archived by the owner on Nov 28, 2022. It is now read-only.
-
Notifications
You must be signed in to change notification settings - Fork 1.9k
files.csv missing #2
Comments
Resolved but forgot to close this issue. Thanks for the report. |
offensive-security
pushed a commit
that referenced
this issue
May 10, 2016
11 new exploits JITed egg-hunter stage-0 shellcode Adjusted universal for xp/vista/win7 JITed egg-hunter stage-0 shellcode Adjusted universal for XP/Vista/Windows 7 BlazeDVD 5.1- (.plf) Stack Buffer Overflow PoC Exploit - ALSR/DEP Bypass on Win7 BlazeDVD 5.1 - (.plf) Stack Buffer Overflow PoC Exploit (Windows 7 ALSR/DEP Bypass) Winamp 5.572 - Local BoF Exploit (Win7 ASLR and DEP Bypass) Winamp 5.572 - Local BoF Exploit (Windows 7 ASLR and DEP Bypass) RM Downloader 3.1.3 - Local SEH Exploit (Win7 ASLR and DEP Bypass) RM Downloader 3.1.3 - Local SEH Exploit (Windows 7 ASLR and DEP Bypass) UFO: Alien Invasion 2.2.1 - BoF Exploit (Win7 ASLR and DEP Bypass) UFO: Alien Invasion 2.2.1 - BoF Exploit (Windows 7 ASLR and DEP Bypass) The KMPlayer 3.0.0.1440 - (.mp3) Buffer Overflow Exploit (Win7 + ASLR Bypass) The KMPlayer 3.0.0.1440 - (.mp3) Buffer Overflow Exploit (Windows 7 + ASLR Bypass) Mozilla Firefox 3.6.16 mChannel Object Use After Free Exploit (Win7) Mozilla Firefox 3.6.16 - mChannel Object Use After Free Exploit (Windows 7) QQPLAYER PICT PnSize Buffer Overflow WIN7 DEP_ASLR BYPASS QQPLAYER Player 3.2 - PICT PnSize Buffer Overflow Windows DEP_ASLR BYPASS GNU Bash - Environment Variable Command Injection (ShellShock) Bash - Environment Variables Code Injection Exploit (ShellShock) GNU Bash - Environment Variable Command Injection (Shellshock) Bash - Environment Variables Code Injection Exploit (Shellshock) OpenVPN 2.2.29 - ShellShock Exploit OpenVPN 2.2.29 - Shellshock Exploit Bash - CGI RCE Shellshock Exploit (Metasploit) Bash CGI - RCE Shellshock Exploit (Metasploit) PHP 5.x (< 5.6.2) - Shellshock Exploit (Bypass disable_functions) PHP 5.x (< 5.6.2) - Bypass disable_functions (Shellshock Exploit) OSSEC 2.8 - Privilege Escalation OSSEC 2.8 - hosts.deny Privilege Escalation ShellShock dhclient Bash Environment Variable Command Injection PoC dhclient 4.1 - Bash Environment Variable Command Injection PoC (Shellshock) OSSEC 2.7 <= 2.8.1 - Local Root Escalation OSSEC 2.7 <= 2.8.1 - _diff_ Command Local Root Escalation Windows Kernel - Bitmap Handling Use-After-Free (MS15-061) #2 Windows Kernel - Bitmap Handling Use-After-Free (MS15-061) (2) BigTree CMS Cross Site Request Forgery Vulnerability Advantech Switch Bash Environment Variable Code Injection (Shellshock) Advantech Switch - Bash Environment Variable Code Injection (Shellshock) KiTTY Portable <= 0.65.0.2p Local kitty.ini Overflow (Wow64 Egghunter Win7) KiTTY Portable <= 0.65.0.2p Local kitty.ini Overflow (Win8.1/Win10) KiTTY Portable <= 0.65.0.2p - Local kitty.ini Overflow (Wow64 Egghunter Windows 7) KiTTY Portable <= 0.65.0.2p - Local kitty.ini Overflow (Windows 8.1/Windows 10) Windows Null-Free Shellcode - Primitive Keylogger to File - 431 (0x01AF) bytes Ajaxel CMS 8.0 - Multiple Vulnerabilities i.FTP 2.21 - Host Address / URL Field SEH Exploit Dell SonicWall Scrutinizer <= 11.0.1 - setUserSkin/deleteTab SQL Injection Remote Code Execution ZeewaysCMS - Multiple Vulnerabilities ASUS Memory Mapping Driver (ASMMAP/ASMMAP64): Physical Memory Read/Write Certec EDV atvise SCADA Server 2.5.9 - Privilege Escalation Microsoft Windows 7 - WebDAV Privilege Escalation Exploit (MS16-016) (2) RPCScan 2.03 - Hostname/IP Field SEH Overwrite PoC ImageMagick Delegate Arbitrary Command Execution Ruby on Rails Development Web Console (v2) Code Execution
offensive-security
pushed a commit
that referenced
this issue
Aug 18, 2017
21 new exploits Microsoft Office Products - Array Index Bounds Error (Unpatched) (PoC) Microsoft Office Products - Array Index Bounds Error (PoC) JAD java Decompiler 1.5.8g - (argument) Local Crash JAD java Decompiler 1.5.8g - 'argument' Local Crash Microsoft Edge Chakra - 'PreVisitCatch' Missing Call Microsoft Edge Chakra - 'chakra!Js::GlobalObject' Integer overflow Microsoft Edge Chakra - Buffer Overflow Microsoft Edge Chakra - NULL Pointer Dereference Microsoft Edge Chakra - Heap Buffer Overflow Microsoft Edge Chakra - 'InterpreterStackFrame::ProcessLinkFailedAsmJsModule' Incorrectly Re-parses Microsoft Edge Chakra - Incorrect Usage of 'PushPopFrameHelper' in 'InterpreterStackFrame::ProcessLinkFailedAsmJsModule' Microsoft Edge Chakra - Incorrect Usage of 'TryUndeleteProperty' Microsoft Edge Chakra - 'EmitAssignment' uses the 'this' Register Without Initializing Microsoft Edge Chakra - Incorrect JIT Optimization with TypedArray Setter #2 Microsoft Edge Chakra - 'JavascriptArray::ConcatArgs' Type Confusion Microsoft Edge Chakra - 'JavascriptFunction::EntryCall' Fails to Handle 'CallInfo' Properly Microsoft Edge Chakra - Uninitialized Arguments Microsoft Edge Chakra - Uninitialized Arguments (2) Microsoft Edge Chakra - 'EmitNew' Integer Overflow Microsoft Edge 40.15063.0.0 Chakra - Incorrect JIT Optimization with TypedArray Setter #3 Adobe Flash - Invoke Accesses Trait Out-of-Bounds Microsoft Edge - Out-of-Bounds Access when Fetching Source Audiotran 1.4.1 - Direct RET Buffer Overflow Audiotran 1.4.1 - Buffer Overflow (Direct RET) GSM SIM Utility 5.15 - Local Exploit Direct Ret ver GSM SIM Utility 5.15 - Local Exploit (Direct RET) DVD X Player 5.5.0 Pro / Standard - Universal Exploit (ASLR + DEP Bypass) DVD X Player 5.5.0 Professional / Standard - '.plf' File Universal Exploit (ASLR + DEP Bypass) CVS Kit CVS Server 1.10.8 - Checkin.prog Binary Execution CVS Kit CVS Server 1.10.8 - 'Checkin.prog' Binary Execution BlazeVideo HDTV Player 6.6 Professional - Direct Retn Exploit Aviosoft Digital TV Player Professional 1.x - Direct Retn Exploit BlazeVideo HDTV Player 6.6 Professional - Exploit (Direct Retn) Aviosoft Digital TV Player Professional 1.x - '.PLF' Exploit (Direct Retn) BlazeDVD 6.1 - PLF Exploit (DEP + ASLR Bypass) (Metasploit) BlazeDVD 6.1 - '.PLF' File Exploit (DEP + ASLR Bypass) (Metasploit) AudioCoder 0.8.22 - '.m3u' Direct Retn Buffer Overflow AudioCoder 0.8.22 - '.m3u' Buffer Overflow (Direct Retn) AudioCoder 0.8.22 - '.lst' Direct Retn Buffer Overflow AudioCoder 0.8.22 - '.lst' Buffer Overflow (Direct Retn) BlazeDVD Pro Player 6.1 - Stack Based Buffer Overflow (Direct Ret) BlazeDVD Pro Player 6.1 - Stack Based Buffer Overflow (Direct RET) BlazeDVD Pro 7.0 - '.plf' Buffer Overflow (SEH) BlazeDVD Pro Player 7.0 - '.plf' Buffer Overflow (SEH) BlazeDVD Pro 7.0 - '.plf' Stack Based Buffer Overflow (Direct RET) BlazeDVD Pro Player 7.0 - '.plf' Stack Based Buffer Overflow (Direct RET) Apple Mac OSX Install.Framework - SUID root Runner Binary Privilege Escalation Apple Mac OSX Install.Framework - SUID Root Runner Binary Privilege Escalation Xamarin Studio for Mac 6.2.1 (build 3)/6.3 (build 863) - Privilege Escalation Xamarin Studio for Mac 6.2.1 (build 3) / 6.3 (build 863) - Privilege Escalation RealVNC 4.1.0 < 4.1.1 - VNC Null Authentication Bypass (Patched EXE) RealVNC 4.1.0 < 4.1.1 - VNC Null Authentication Bypass Symphony 1.7.01 - (non-patched) Remote Code Execution Symphony 1.7.01 (non-patched) - Remote Code Execution Binary Board System 0.2.5 - reply.pl Multiple Parameter Cross-Site Scripting Binary Board System 0.2.5 - stats.pl Multiple Parameter Cross-Site Scripting Binary Board System 0.2.5 - toc.pl board Parameter Cross-Site Scripting Binary Board System 0.2.5 - 'reply.pl' Multiple Parameter Cross-Site Scripting Binary Board System 0.2.5 - 'stats.pl' Multiple Parameter Cross-Site Scripting Binary Board System 0.2.5 - 'toc.pl' 'board' Parameter Cross-Site Scripting Orchard 1.3.9 - 'ReturnUrl' Parameter URI redirection Orchard 1.3.9 - 'ReturnUrl' Parameter URI Redirection WebsitePanel - 'ReturnUrl' Parameter URI redirection WebsitePanel - 'ReturnUrl' Parameter URI Redirection Online Quiz Project 1.0 - SQL Injection Photogallery Project 1.0 - SQL Injection Doctor Patient Project 1.0 - SQL Injection
Sign up for free
to subscribe to this conversation on GitHub.
Already have an account?
Sign in.
Currently the essential files.csv file for this repo is missing. We can't tell which exploit is which with out it.
The text was updated successfully, but these errors were encountered: