[
•
]
NeoSense
E
X
P L O I T S
title
author
type
platform
port
cve
id
LockedByte
Linux/x86 - chmod + execute(/usr/bin/wget http://192.168.1.93//x) + Hide Output Shellcode (129 bytes)
linux_x86
129.0
Joseph McDonagh
Windows/x86 - Start iexplore.exe (http://192.168.10.10/) Shellcode (191 Bytes)
windows_x86
191.0
Joseph McDonagh
Windows/x86 - Download File (http://192.168.10.10/evil.exe _c:\evil.exe_) Via bitsadmin + Execute Shellcode (210 Bytes)
windows_x86
210.0
Petr Javorik
Linux/x86 - ASCII AND_ SUB_ PUSH_ POPAD Encoder Shellcode
linux_x86
Metasploit
Nagios XI 5.5.6 - Magpie_debug.php Root Remote Code Execution (Metasploit)
remote
linux
CVE-2018-15710;CVE-2018-15708
Google Security Research
Mozilla Spidermonkey - IonMonkey 'Array.prototype.pop' Type Confusion
dos
multiple
CVE-2019-11707
m0ze
WordPress Plugin Live Chat Unlimited 2.8.3 - Cross-Site Scripting
webapps
php
80.0
m0ze
WordPress Plugin iLive 1.0.4 - Cross-Site Scripting
webapps
php
80.0
Aaron Bishop
BlogEngine.NET 3.3.6/3.3.7 - 'path' Directory Traversal
webapps
aspx
felipe andrian
AZADMIN CMS 1.0 - SQL Injection
webapps
php
80.0
XORcat
Fortinet FCM-MB40 - Cross-Site Request Forgery / Remote Command Execution
webapps
hardware
k1nm3n.aotoi
SAPIDO RB-1732 - Remote Command Execution
remote
hardware
Simon Gurney
SuperDoctor5 - 'NRPE' Remote Code Execution
remote
multiple
Google Security Research
Microsoft Windows Font Cache Service - Insecure Sections Privilege Escalation
dos
windows
CVE-2019-0943
Google Security Research
Microsoft Windows - 'CmpAddRemoveContainerToCLFSLog' Arbitrary File/Directory Creation
dos
windows
CVE-2019-0959
Corey Robinson
GrandNode 4.40 - Path Traversal / Arbitrary File Download
webapps
multiple
CVE-2019-12276
«
...
319
320
321
322
323
324
325
326
327
328
329
...
»
page: 324/3001 [exploits: 48015]