WorkSuite PRM 2.4 – ‘password’ SQL Injection
>> TAG: #remote exploit
WorkSuite PRM 2.4 – ‘password’ SQL Injection
Windows/x86 – Start iexplore.exe (http://192.168.10.10/) Shellcode (191 Bytes)
Linux/x86 – Chmod + Execute (/usr/bin/wget http://192.168.1.93//x) + Hide Output Shellcode (129 bytes)
LibreNMS 1.46 – ‘addhost’ Remote Code Execution
Windows/x86 – bitsadmin Download and Execute (http://192.168.10.10/evil.exe “c:evil.exe”) Shellcode (210 Bytes)
Linux/x86 – ASCII AND, SUB, PUSH, POPAD Encoder Shellcode
Mozilla Spidermonkey – IonMonkey ‘Array.prototype.pop’ Type Confusion
Nagios XI 5.5.6 – Magpie_debug.php Root Remote Code Execution (Metasploit)
Buffer Overflows, C Programming, NSA GHIDRA and More
Fortinet FCM-MB40 – Cross-Site Request Forgery / Remote Command Execution