UCOPIA Wireless Appliance versions 5.1 and below suffer from a captive portal remote root code execution vulnerability.
ae7e8abc8f16b10dadca2659c059cf8776f3ea99ee39848e71339f94e098c220
Logpoint versions prior to 5.6.4 suffer from an unauthenticated root remote code execution vulnerability.
7a9ca395b189220707a13b3823847f2abd4666d65adf5b079232a3594ae2e6f9
This Metasploit module exploits a PHP object injection vulnerability in Magento 2.0.6 or prior.
0f4a54fd7327964f36b2aa61027c88bb06c66470231cb05fee46900549f0def5
Magento versions prior to 2.0.6 suffer from an unauthenticated arbitrary unserialize to arbitrary write file vulnerability.
aabdfe5b303d6f19ce1fc498c50679f141c6beebfcd6c15c192c8f28b94a86a8
HP System Management Homepage versions 7.1.2 and below include a setuid root smhstart which is vulnerable to a local buffer overflow in the SSL_SHARE_BASE_DIR env variable.
357a44bede2c2741756ca4862ede64872c7d755406c54c4a9748b5b8c68b77ef
This Metasploit module exploits the nativeHelper feature from spiderMonkey which allows control over execution by calling it with specially crafted arguments. This Metasploit module has been tested successfully on MongoDB 2.2.3 on Ubuntu 10.04 and Debian Squeeze.
b6eb069e8c2cd7a54405a167b66ff710e28f82ed3b1979ede3aca6f9223c3ab8
This Metasploit module exploits an anonymous remote code execution on HP System Management 7.1.1 and earlier. The vulnerability exists when handling the iprange parameter on a request against /proxy/DataValidation. In order to work HP System Management must be configured with Anonymous access enabled.
4de4f77423b06dccacf83fd32f5fcf5e7397ce23516f9f320983cc32b12d3691
61 bytes small Windows 7 x64 cmd.exe shellcode.
df8d657040e51b5cb8fa86b3eb4ccfef05106cd4921e1b6ef6e3af77316d39c6
39 bytes small Windows Seven pro SP1 64 Fr beep shellcode.
24307bb3c3c728366360f1218ac97d687929e2b512e6f659bb8b5915797fecd3
83 bytes small Linux/x86 pwrite("/etc/shadow",hash, 32, 8) shellcode.
4d9b6d30ad6ec80b3b290a56e9c56a56825b0de7c84468ecf3d5909268e511da
117 bytes small Linux/x86 alphanumeric forkbomb shellcode.
024cb07eb9e1bcaee643d9b04ba5990764a345a2c9ce9eea56aa473260db70dd