Windows – UAC Protection Bypass (Via Slui File Handler Hijack) (Metasploit)
>> TAG: #0day
Windows – UAC Protection Bypass (Via Slui File Handler Hijack) (Metasploit)
Smartshop 1 – ‘id’ SQL Injection
GreenCMS 2.3.0603 – Cross-Site Request Forgery / Remote Code Execution
GreenCMS 2.3.0603 – Cross-Site Request Forgery (Add Admin)
Smartshop 1 – Cross-Site Request Forgery
Git < 2.17.1 – Remote Code Execution
Epiphany 3.28.2.1 – Denial of Service
Linux/x86 – Bind (4444/TCP) Shell Shellcode (105 bytes)
Linux/x86 – EggHunter + access() Shellcode (38 bytes)
TAC Xenta 511/911 – Directory Traversal