Search for hundreds of thousands of exploits

"Android 7 < 9 - Remote Code Execution"

Author

Exploit author

"Marcin Kozlowski"

Platform

Exploit platform

android

Release date

Exploit published date

2019-07-24

 1
 2
 3
 4
 5
 6
 7
 8
 9
10
11
12
# Exploit Title: Android 7-9 - Remote Code Execution
# Date: [date]
# Exploit Author: Marcin Kozlowski
# Version: 7-9
# Tested on: Android
# CVE : 2019-2107

CVE-2019-2107 - looks scary. Still remember Stagefright and PNG bugs vulns .... 
With CVE-2019-2107 the decoder/codec runs under mediacodec user and with properly "crafted" video (with tiles enabled - ps_pps->i1_tiles_enabled_flag) you can possibly do RCE. The codec affected is HVEC (a.k.a H.265 and MPEG-H Part 2)

POC:
https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/47157.zip
Release DateTitleTypePlatformAuthor
2020-07-02"WhatsApp Remote Code Execution - Paper"webappsandroid"ashu Jaiswal"
2020-02-24"Android Binder - Use-After-Free (Metasploit)"localandroidMetasploit
2020-01-14"Android - ashmem Readonly Bypasses via remap_file_pages() and ASHMEM_UNPIN"dosandroid"Google Security Research"
2020-01-14"WeChat - Memory Corruption in CAudioJBM::InputAudioFrameToJBM"dosandroid"Google Security Research"
2019-11-08"Android Janus - APK Signature Bypass (Metasploit)"localandroidMetasploit
2019-10-16"Whatsapp 2.19.216 - Remote Code Execution"remoteandroid"Valerio Brussani"
2019-10-04"Android - Binder Driver Use-After-Free"localandroid"Google Security Research"
2019-08-30"Canon PRINT 2.5.5 - Information Disclosure"localandroid0x48piraj
2019-07-24"Android 7 < 9 - Remote Code Execution"remoteandroid"Marcin Kozlowski"
2019-07-15"Android 7 - 9 VideoPlayer - 'ihevcd_parse_pps' Out-of-Bounds Write"dosandroid"Marcin Kozlowski"
Release DateTitleTypePlatformAuthor
2019-07-24"Android 7 < 9 - Remote Code Execution"remoteandroid"Marcin Kozlowski"
2019-07-15"Android 7 - 9 VideoPlayer - 'ihevcd_parse_pps' Out-of-Bounds Write"dosandroid"Marcin Kozlowski"
2018-04-06"LineageOS 14.1 Blueborne - Remote Code Execution"remoteandroid"Marcin Kozlowski"
2017-09-21"Linux Kernel < 4.13.1 - BlueTooth Buffer Overflow (PoC)"doslinux"Marcin Kozlowski"
2016-02-15"NTPd ntp-4.2.6p5 - 'ctl_putdata()' Buffer Overflow (PoC)"doslinux"Marcin Kozlowski"
2008-01-18"Microsoft Windows Message Queuing Service - RPC Buffer Overflow (MS07-065) (2)"remotewindows"Marcin Kozlowski"
2007-12-18"3proxy 0.5.3g (Windows x86) - 'logurl()' Remote Buffer Overflow (Perl)"remotewindows_x86"Marcin Kozlowski"
import requests
response = requests.get('https://www.nmmapper.com/api/exploitdetails/47157/?format=json')

For full documentation follow the link above

Cipherscan. A very simple way to find out which SSL ciphersuites are supported by a target.

Identify and fingerprint Web Application Firewall (WAF) products protecting a website.