Exploit-DB
2.41K subscribers
9.31K links
Offensive Security Exploit Database
Download Telegram
[remote] LabF nfsAxe 3.7 FTP Client - Stack Buffer Overflow (Metasploit)
LabF nfsAxe 3.7 FTP Client - Stack Buffer Overflow (Metasploit)
https://www.exploit-db.com/exploits/43518/?rss
[shellcode] Linux/ARM - execve("/bin/sh", NULL, 0) Shellcode (34 bytes)
Linux/ARM - execve("/bin/sh", NULL, 0) Shellcode (34 bytes)
https://www.exploit-db.com/exploits/43520/?rss
[dos] Microsoft Edge Chakra - 'AppendLeftOverItemsFromEndSegment' Out-of-Bounds Read
Microsoft Edge Chakra - 'AppendLeftOverItemsFromEndSegment' Out-of-Bounds Read
https://www.exploit-db.com/exploits/43522/?rss
[dos] macOS - 'process_policy' Stack Leak Through Uninitialized Field
macOS - 'process_policy' Stack Leak Through Uninitialized Field
https://www.exploit-db.com/exploits/43521/?rss
[remote] ALLMediaServer 0.95 - Buffer Overflow
ALLMediaServer 0.95 - Buffer Overflow
https://www.exploit-db.com/exploits/43523/?rss
[papers] Phrack: .NET Instrumentation via MSIL bytecode injection (Antonio "s4tan" Parata)
Phrack: .NET Instrumentation via MSIL bytecode injection (Antonio "s4tan" Parata)
https://www.exploit-db.com/papers/43524/?rss
[shellcode] Linux/ARM - chmod("/etc/passwd", 0777) Shellcode (39 bytes)
Linux/ARM - chmod("/etc/passwd", 0777) Shellcode (39 bytes)
https://www.exploit-db.com/exploits/43531/?rss
[shellcode] Linux/ARM - Add Map (127.1.1.1 google.lk) In /etc/hosts Shellcode (79 bytes)
Linux/ARM - Add Map (127.1.1.1 google.lk) In /etc/hosts Shellcode (79 bytes)
https://www.exploit-db.com/exploits/43530/?rss
[papers] Windows Kernel Exploitation Tutorial Part 5: NULL Pointer Dereference
Windows Kernel Exploitation Tutorial Part 5: NULL Pointer Dereference
http://www.exploit-db.com/docs/43529.pdf?rss
[papers] Windows Kernel Exploitation Tutorial Part 4: Pool Feng-Shui –> Pool Overflow
Windows Kernel Exploitation Tutorial Part 4: Pool Feng-Shui –> Pool Overflow
http://www.exploit-db.com/docs/43528.pdf?rss
[papers] Windows Kernel Exploitation Tutorial Part 3: Arbitrary Memory Overwrite (Write-What-Where)
Windows Kernel Exploitation Tutorial Part 3: Arbitrary Memory Overwrite (Write-What-Where)
http://www.exploit-db.com/docs/43527.pdf?rss
[papers] Windows Kernel Exploitation Tutorial Part 2: Stack Overflow
Windows Kernel Exploitation Tutorial Part 2: Stack Overflow
http://www.exploit-db.com/docs/43526.pdf?rss
[papers] Windows Kernel Exploitation Tutorial Part 1: Setting up the Environment
Windows Kernel Exploitation Tutorial Part 1: Setting up the Environment
http://www.exploit-db.com/docs/43525.pdf?rss
[shellcode] Linux/ARM - execve("/bin/sh",NULL,0) Shellcode (31 bytes)
Linux/ARM - execve("/bin/sh",NULL,0) Shellcode (31 bytes)
https://www.exploit-db.com/exploits/43534/?rss
[shellcode] Linux/ARM - execve("/bin/sh", [], [0 vars]) Shellcode (35 bytes)
Linux/ARM - execve("/bin/sh", [], [0 vars]) Shellcode (35 bytes)
https://www.exploit-db.com/exploits/43533/?rss
[shellcode] Linux/ARM - creat("/root/pwned", 0777) Shellcode (39 bytes)
Linux/ARM - creat("/root/pwned", 0777) Shellcode (39 bytes)
https://www.exploit-db.com/exploits/43532/?rss
[shellcode] Linux/SuperH (sh4) - setuid(0) + execve("/bin/sh", NULL, NULL) Shellcode (27 bytes)
Linux/SuperH (sh4) - setuid(0) + execve("/bin/sh", NULL, NULL) Shellcode (27 bytes)
https://www.exploit-db.com/exploits/43540/?rss
[shellcode] Linux/StrongARM - Bind TCP /bin/sh Shell Shellcode (203 bytes)
Linux/StrongARM - Bind TCP /bin/sh Shell Shellcode (203 bytes)
https://www.exploit-db.com/exploits/43539/?rss
[shellcode] Linux/StrongARM - execve(/bin/sh) Shellcode (47 bytes)
Linux/StrongARM - execve(/bin/sh) Shellcode (47 bytes)
https://www.exploit-db.com/exploits/43538/?rss
[shellcode] Linux/StrongARM - setuid() Shellcode (20 bytes)
Linux/StrongARM - setuid() Shellcode (20 bytes)
https://www.exploit-db.com/exploits/43537/?rss