[shellcode] FreeBSD/x86 - execv(/bin/sh) Shellcode (23 bytes)
FreeBSD/x86 - execv(/bin/sh) Shellcode (23 bytes)
https://www.exploit-db.com/exploits/43504/?rss
FreeBSD/x86 - execv(/bin/sh) Shellcode (23 bytes)
https://www.exploit-db.com/exploits/43504/?rss
[shellcode] IRIX - execve(/bin/sh) Shellcode (43 bytes)
IRIX - execve(/bin/sh) Shellcode (43 bytes)
https://www.exploit-db.com/exploits/43509/?rss
IRIX - execve(/bin/sh) Shellcode (43 bytes)
https://www.exploit-db.com/exploits/43509/?rss
[shellcode] IRIX - execve(/bin/sh -c) Shellcode (72 bytes)
IRIX - execve(/bin/sh -c) Shellcode (72 bytes)
https://www.exploit-db.com/exploits/43508/?rss
IRIX - execve(/bin/sh -c) Shellcode (72 bytes)
https://www.exploit-db.com/exploits/43508/?rss
[shellcode] FreeBSD - reboot() Shellcode (15 Bytes)
FreeBSD - reboot() Shellcode (15 Bytes)
https://www.exploit-db.com/exploits/43507/?rss
FreeBSD - reboot() Shellcode (15 Bytes)
https://www.exploit-db.com/exploits/43507/?rss
[shellcode] FreeBSD/x86 - Bind TCP /bin/sh Shell (41254/TCP) Shellcode (115 bytes)
FreeBSD/x86 - Bind TCP /bin/sh Shell (41254/TCP) Shellcode (115 bytes)
https://www.exploit-db.com/exploits/43506/?rss
FreeBSD/x86 - Bind TCP /bin/sh Shell (41254/TCP) Shellcode (115 bytes)
https://www.exploit-db.com/exploits/43506/?rss
[shellcode] IRIX - stdin-read Shellcode (40 bytes)
IRIX - stdin-read Shellcode (40 bytes)
https://www.exploit-db.com/exploits/43512/?rss
IRIX - stdin-read Shellcode (40 bytes)
https://www.exploit-db.com/exploits/43512/?rss
[shellcode] IRIX - execve(/bin/sh) Shellcode (68 bytes)
IRIX - execve(/bin/sh) Shellcode (68 bytes)
https://www.exploit-db.com/exploits/43511/?rss
IRIX - execve(/bin/sh) Shellcode (68 bytes)
https://www.exploit-db.com/exploits/43511/?rss
[shellcode] IRIX - Bind TCP /bin/sh Shell Shellcode (364 bytes)
IRIX - Bind TCP /bin/sh Shell Shellcode (364 bytes)
https://www.exploit-db.com/exploits/43510/?rss
IRIX - Bind TCP /bin/sh Shell Shellcode (364 bytes)
https://www.exploit-db.com/exploits/43510/?rss
[dos] Microsoft Windows - NTFS Owner/Mandatory Label Privilege Bypass
Microsoft Windows - NTFS Owner/Mandatory Label Privilege Bypass
https://www.exploit-db.com/exploits/43514/?rss
Microsoft Windows - NTFS Owner/Mandatory Label Privilege Bypass
https://www.exploit-db.com/exploits/43514/?rss
[dos] Microsoft Windows SMB Server (v1 and v2) - Mount Point Arbitrary Device Open Privilege Escalation
Microsoft Windows SMB Server (v1 and v2) - Mount Point Arbitrary Device Open Privilege Escalation
https://www.exploit-db.com/exploits/43517/?rss
Microsoft Windows SMB Server (v1 and v2) - Mount Point Arbitrary Device Open Privilege Escalation
https://www.exploit-db.com/exploits/43517/?rss
[dos] Microsoft Windows - NtImpersonateAnonymousToken LPAC to Non-LPAC Privilege Escalation
Microsoft Windows - NtImpersonateAnonymousToken LPAC to Non-LPAC Privilege Escalation
https://www.exploit-db.com/exploits/43516/?rss
Microsoft Windows - NtImpersonateAnonymousToken LPAC to Non-LPAC Privilege Escalation
https://www.exploit-db.com/exploits/43516/?rss
[dos] Microsoft Windows - NtImpersonateAnonymousToken AC to Non-AC Privilege Escalation
Microsoft Windows - NtImpersonateAnonymousToken AC to Non-AC Privilege Escalation
https://www.exploit-db.com/exploits/43515/?rss
Microsoft Windows - NtImpersonateAnonymousToken AC to Non-AC Privilege Escalation
https://www.exploit-db.com/exploits/43515/?rss
[dos] Android - Hardware Service Manager Arbitrary Service Replacement due to getpidcon
Android - Hardware Service Manager Arbitrary Service Replacement due to getpidcon
https://www.exploit-db.com/exploits/43513/?rss
Android - Hardware Service Manager Arbitrary Service Replacement due to getpidcon
https://www.exploit-db.com/exploits/43513/?rss
[remote] phpCollab 2.5.1 - Unauthenticated File Upload (Metasploit)
phpCollab 2.5.1 - Unauthenticated File Upload (Metasploit)
https://www.exploit-db.com/exploits/43519/?rss
phpCollab 2.5.1 - Unauthenticated File Upload (Metasploit)
https://www.exploit-db.com/exploits/43519/?rss
[remote] LabF nfsAxe 3.7 FTP Client - Stack Buffer Overflow (Metasploit)
LabF nfsAxe 3.7 FTP Client - Stack Buffer Overflow (Metasploit)
https://www.exploit-db.com/exploits/43518/?rss
LabF nfsAxe 3.7 FTP Client - Stack Buffer Overflow (Metasploit)
https://www.exploit-db.com/exploits/43518/?rss
[shellcode] Linux/ARM - execve("/bin/sh", NULL, 0) Shellcode (34 bytes)
Linux/ARM - execve("/bin/sh", NULL, 0) Shellcode (34 bytes)
https://www.exploit-db.com/exploits/43520/?rss
Linux/ARM - execve("/bin/sh", NULL, 0) Shellcode (34 bytes)
https://www.exploit-db.com/exploits/43520/?rss
[dos] Microsoft Edge Chakra - 'AppendLeftOverItemsFromEndSegment' Out-of-Bounds Read
Microsoft Edge Chakra - 'AppendLeftOverItemsFromEndSegment' Out-of-Bounds Read
https://www.exploit-db.com/exploits/43522/?rss
Microsoft Edge Chakra - 'AppendLeftOverItemsFromEndSegment' Out-of-Bounds Read
https://www.exploit-db.com/exploits/43522/?rss
[dos] macOS - 'process_policy' Stack Leak Through Uninitialized Field
macOS - 'process_policy' Stack Leak Through Uninitialized Field
https://www.exploit-db.com/exploits/43521/?rss
macOS - 'process_policy' Stack Leak Through Uninitialized Field
https://www.exploit-db.com/exploits/43521/?rss
[remote] ALLMediaServer 0.95 - Buffer Overflow
ALLMediaServer 0.95 - Buffer Overflow
https://www.exploit-db.com/exploits/43523/?rss
ALLMediaServer 0.95 - Buffer Overflow
https://www.exploit-db.com/exploits/43523/?rss
[papers] Phrack: .NET Instrumentation via MSIL bytecode injection (Antonio "s4tan" Parata)
Phrack: .NET Instrumentation via MSIL bytecode injection (Antonio "s4tan" Parata)
https://www.exploit-db.com/papers/43524/?rss
Phrack: .NET Instrumentation via MSIL bytecode injection (Antonio "s4tan" Parata)
https://www.exploit-db.com/papers/43524/?rss
Exploit-Db
Papers
Phrack: .NET Instrumentation via MSIL bytecode injection (Antonio "s4tan" Parata)