[] NeoSense
LockedByte Linux/x86 - chmod + execute(/usr/bin/wget http://192.168.1.93//x) + Hide Output Shellcode (129 bytes)
linux_x86 129.0
Joseph McDonagh Windows/x86 - Start iexplore.exe (http://192.168.10.10/) Shellcode (191 Bytes)
windows_x86 191.0
Joseph McDonagh Windows/x86 - Download File (http://192.168.10.10/evil.exe _c:\evil.exe_) Via bitsadmin + Execute Shellcode (210 Bytes)
windows_x86 210.0
Petr Javorik Linux/x86 - ASCII AND_ SUB_ PUSH_ POPAD Encoder Shellcode
linux_x86
Metasploit Nagios XI 5.5.6 - Magpie_debug.php Root Remote Code Execution (Metasploit)
remote linux CVE-2018-15710;CVE-2018-15708
Google Security Research Mozilla Spidermonkey - IonMonkey 'Array.prototype.pop' Type Confusion
dos multiple CVE-2019-11707
m0ze WordPress Plugin Live Chat Unlimited 2.8.3 - Cross-Site Scripting
webapps php 80.0
m0ze WordPress Plugin iLive 1.0.4 - Cross-Site Scripting
webapps php 80.0
Aaron Bishop BlogEngine.NET 3.3.6/3.3.7 - 'path' Directory Traversal
webapps aspx
felipe andrian AZADMIN CMS 1.0 - SQL Injection
webapps php 80.0
XORcat Fortinet FCM-MB40 - Cross-Site Request Forgery / Remote Command Execution
webapps hardware
k1nm3n.aotoi SAPIDO RB-1732 - Remote Command Execution
remote hardware
Simon Gurney SuperDoctor5 - 'NRPE' Remote Code Execution
remote multiple
Google Security Research Microsoft Windows Font Cache Service - Insecure Sections Privilege Escalation
dos windows CVE-2019-0943
Google Security Research Microsoft Windows - 'CmpAddRemoveContainerToCLFSLog' Arbitrary File/Directory Creation
dos windows CVE-2019-0959
Corey Robinson GrandNode 4.40 - Path Traversal / Arbitrary File Download
webapps multiple CVE-2019-12276
page: 324/3001 [exploits: 48015]