[
•
]
NeoSense
E
X
P L O I T S
title
author
type
platform
port
cve
id
Ken Kitahara
Linux/ARM64 - Egghunter (PWN!PWN!) + execve(_/bin/sh__ NULL_ NULL) + mprotect() Shellcode (88 Bytes)
arm
88.0
Ken Kitahara
Linux/ARM64 - Read /etc/passwd Shellcode (120 Bytes)
arm
120.0
Ken Kitahara
Linux/ARM64 - Reverse (::1:4444/TCP) Shell (/bin/sh) + IPv6 Shellcode (140 bytes)
arm
140.0
Ken Kitahara
Linux/ARM64 - Bind (4444/TCP) Shell (/bin/sh) + IPv6 Shellcode (176 bytes)
arm
176.0
Ken Kitahara
Linux/ARM64 - Reverse (127.0.0.1:4444/TCP) Shell (/bin/sh) + Null-Free Shellcode (128 bytes)
arm
128.0
Ken Kitahara
Linux/ARM64 - Bind (4444/TCP) Shell (/bin/sh) + Null-Free Shellcode (164 bytes)
arm
164.0
Ken Kitahara
Linux/ARM64 - execve(_/bin/sh__ NULL_ NULL) Shellcode (40 Bytes)
arm
40.0
b1ack0wl
Linux Mint 18.3-19.1 - 'yelp' Command Injection (Metasploit)
remote
linux
Mehmet EMIROGLU
CiuisCRM 1.6 - 'eventType' SQL Injection
webapps
php
80.0
Mehmet EMIROGLU
WorkSuite PRM 2.4 - 'password' SQL Injection
webapps
php
80.0
Askar
LibreNMS 1.46 - 'addhost' Remote Code Execution
webapps
php
80.0
CVE-2018-20434
LockedByte
Linux/x86 - chmod + execute(/usr/bin/wget http://192.168.1.93//x) + Hide Output Shellcode (129 bytes)
linux_x86
129.0
Joseph McDonagh
Windows/x86 - Start iexplore.exe (http://192.168.10.10/) Shellcode (191 Bytes)
windows_x86
191.0
Joseph McDonagh
Windows/x86 - Download File (http://192.168.10.10/evil.exe _c:\evil.exe_) Via bitsadmin + Execute Shellcode (210 Bytes)
windows_x86
210.0
Petr Javorik
Linux/x86 - ASCII AND_ SUB_ PUSH_ POPAD Encoder Shellcode
linux_x86
Metasploit
Nagios XI 5.5.6 - Magpie_debug.php Root Remote Code Execution (Metasploit)
remote
linux
CVE-2018-15710;CVE-2018-15708
«
...
323
324
325
326
327
328
329
330
331
332
333
...
»
page: 328/3006 [exploits: 48090]