
5 new exploits WordPress Ghost Plugin 0.5.5 - Unrestricted Export Download .Net Framework Execute Native x86 Shellcode Acunetix WVS 10 - Remote Command Execution (System) Apache Struts Dynamic Method Invocation Remote Code Execution QSEE - PRDiag* Commands Privilege Escalation Exploit
10 lines
384 B
Text
Executable file
10 lines
384 B
Text
Executable file
Sources:
|
|
https://bits-please.blogspot.ca/2016/05/qsee-privilege-escalation-vulnerability.html
|
|
https://github.com/laginimaineb/cve-2015-6639
|
|
|
|
Qualcomm's Secure Execution Environment (QSEE) Privilege Escalation Exploit using PRDiag* commands (CVE-2015-6639)
|
|
|
|
|
|
Proof of Concept:
|
|
https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/39757.zip
|
|
|