[
•
]
NeoSense
E
X
P L O I T S
title
author
type
platform
port
cve
id
Metasploit
Mac OS X TimeMachine - 'tmdiagnose' Command Injection Privilege Escalation (Metasploit)
local
macos
CVE-2019-8513
Askar
Centreon 19.04 - Remote Code Execution
webapps
php
CVE-2019-13024
Kirill Nikolaev
Linux/x86 - execve(/bin/sh) Using JMP-CALL-POP Shellcode (21 bytes)
linux_x86
21.0
LiquidWorm
FaceSentry Access Control System 6.4.8 - Remote SSH Root
remote
hardware
LiquidWorm
FaceSentry Access Control System 6.4.8 - Remote Root Exploit
webapps
hardware
LiquidWorm
FaceSentry Access Control System 6.4.8 - Cross-Site Request Forgery
webapps
hardware
LiquidWorm
FaceSentry Access Control System 6.4.8 - Remote Command Injection
webapps
hardware
Bilgi Birikim Sistemleri
CyberPanel 1.8.4 - Cross-Site Request Forgery
webapps
multiple
Operat0r
Sahi pro 8.x - Directory Traversal
webapps
multiple
CVE-2019-13063
Mohamed M.Fouad
SAP Crystal Reports - Information Disclosure
webapps
multiple
CVE-2019-0285
Joey Lane
ZoneMinder 1.32.3 - Cross-Site Scripting
webapps
php
Joey Lane
PowerPanel Business Edition - Cross-Site Scripting
webapps
linux
Mehmet EMIROGLU
Varient 1.6.1 - SQL Injection
webapps
multiple
80.0
Ken Kitahara
Linux/ARM64 - execve(_/bin/sh__ [_/bin/sh_]_ NULL) Shellcode (48 Bytes)
arm
48.0
Ken Kitahara
Linux/ARM64 - execve(_/bin/sh__ NULL_ NULL) + Jump Back Shellcode (8 Bytes)
arm
8.0
Ken Kitahara
Linux/ARM64 - execve(_/bin/sh__ NULL_ NULL) + mmap() + read() Stager Shellcode (60 Bytes)
arm
60.0
«
...
322
323
324
325
326
327
328
329
330
331
332
...
»
page: 327/3006 [exploits: 48090]