![]() 10 changes to exploits/shellcodes Microsoft Compiled HTML Help / Uncompiled .chm File - XML External Entity Injection R 3.4.4 (Windows 10 x64) - Buffer Overflow SEH (DEP/ASLR Bypass) DameWare Remote Support 12.0.0.509 - 'Host' Buffer Overflow (SEH) Microsoft Windows 10 < build 17763 - AppXSvc Hard Link Privilege Escalation (Metasploit) PHP Laravel Framework 5.5.40 / 5.6.x < 5.6.30 - token Unserialize Remote Command Execution (Metasploit) CentOS Control Web Panel 0.9.8.836 - Authentication Bypass CentOS Control Web Panel 0.9.8.836 - Privilege Escalation CentOS Control Web Panel 0.9.8.838 - User Enumeration |
||
---|---|---|
.. | ||
dos | ||
local | ||
remote | ||
webapps |