FaceSentry Access Control System 6.4.8 – Remote Root Exploit
[webapps] FaceSentry Access Control System 6.4.8 – Cross-Site Request Forgery
FaceSentry Access Control System 6.4.8 – Cross-Site Request Forgery
[webapps] FaceSentry Access Control System 6.4.8 – Remote Command Injection
FaceSentry Access Control System 6.4.8 – Remote Command Injection
[webapps] CyberPanel 1.8.4 – Cross-Site Request Forgery
CyberPanel 1.8.4 – Cross-Site Request Forgery
[shellcode] Linux/ARM64 – Read /etc/passwd Shellcode (120 Bytes)
Linux/ARM64 – Read /etc/passwd Shellcode (120 Bytes)
[shellcode] Linux/ARM64 – Bind (4444/TCP) Shell (/bin/sh) + IPv6 Shellcode (176 bytes)
Linux/ARM64 – Bind (4444/TCP) Shell (/bin/sh) + IPv6 Shellcode (176 bytes)
[shellcode] Linux/ARM64 – Bind (4444/TCP) Shell (/bin/sh) + Null-Free Shellcode (164 bytes)
Linux/ARM64 – Bind (4444/TCP) Shell (/bin/sh) + Null-Free Shellcode (164 bytes)
[remote] Linux Mint 18.3-19.1 – 'yelp' Command Injection (Metasploit)
Linux Mint 18.3-19.1 – ‘yelp’ Command Injection (Metasploit)
[shellcode] Linux/ARM64 – execve("/bin/sh", ["/bin/sh"], NULL) Shellcode (48 Bytes)
Linux/ARM64 – execve(“/bin/sh”, [“/bin/sh”], NULL) Shellcode (48 Bytes)
[shellcode] Linux/ARM64 – Jump Back Shellcode + execve("/bin/sh", NULL, NULL) Shellcode (8 Bytes)
Linux/ARM64 – Jump Back Shellcode + execve(“/bin/sh”, NULL, NULL) Shellcode (8 Bytes)