macOS – Reverse (::1:4444/TCP) Shell (/bin/sh) +IPv6 Shellcode (119 bytes)
>> TAG: #remote exploit
macOS – Reverse (::1:4444/TCP) Shell (/bin/sh) +IPv6 Shellcode (119 bytes)
macOS – Bind (4444/TCP) Shell (/bin/sh) + IPv6 Shellcode (129 bytes)
macOS – Reverse (127.0.0.1:4444/TCP) Shell (/bin/sh) + Null-Free Shellcode (103 bytes)
macOS – Bind (4444/TCP) Shell (/bin/sh) + Null-Free Shellcode (123 bytes)
Zoho ManageEngine ServiceDesk Plus (SDP) < 10.0 build 10012 – Arbitrary File Upload
WordPress Plugin WooCommerce – GloBee (cryptocurrency) Payment Gateway 1.1.1 – Payment Bypass / Unauthorized Order Status Spoofing
MyBB Trash Bin Plugin 1.1.3 – Cross-Site Scripting / Cross-Site Request Forgery
Navicat for Oracle 12.1.15 – “Password” Denial of Service (PoC)
VSCO 1.1.1.0 – Denial of Service (PoC)
Jinja2 2.10 – ‘from_string’ Server Side Template Injection