[
•
]
NeoSense
E
X
P L O I T S
title
author
type
platform
port
cve
id
search results for » platform: linux
Metasploit
blueman - set_dhcp_handler D-Bus Privilege Escalation (Metasploit)
local
linux
CVE-2015-8612
Magnus Klaaborg Stubman
NTPsec 1.1.2 - 'config' (Authenticated) Out-of-Bounds Write Denial of Service (PoC)
dos
linux
123.0
CVE-2019-6442
Magnus Klaaborg Stubman
NTPsec 1.1.2 - 'ntp_control' (Authenticated) NULL Pointer Dereference (PoC)
dos
linux
123.0
CVE-2019-6445
Magnus Klaaborg Stubman
NTPsec 1.1.2 - 'ntp_control' (Authenticated) NULL Pointer Dereference (PoC)
dos
linux
123.0
CVE-2019-6445
Magnus Klaaborg Stubman
NTPsec 1.1.2 - 'ntp_control' Out-of-Bounds Read (PoC)
dos
linux
123.0
CVE-2019-6444
Magnus Klaaborg Stubman
NTPsec 1.1.2 - 'ctl_getitem' Out-of-Bounds Read (PoC)
dos
linux
123.0
CVE-2019-6443
Joao Batista
Linux/x86 - Bind (4444/TCP) Shell (/bin/sh) Shellcode (100 bytes)
linux_x86
100.0
Google Security Research
polkit - Temporary auth Hijacking via PID Reuse and Non-atomic Fork
dos
linux
strider
Linux/x86 - execve(/bin/sh -c) + wget (http://127.0.0.1:8080/evilfile) + chmod 777 + Execute Shellcode (119 bytes)
linux_x86
119.0
bcoles
Linux Kernel 4.15.x < 4.19.2 - 'map_write() CAP_SYS_ADMIN' Local Privilege Escalation (polkit Method)
local
linux
CVE-2018-18955
bcoles
Linux Kernel 4.15.x < 4.19.2 - 'map_write() CAP_SYS_ADMIN' Local Privilege Escalation (dbus Method)
local
linux
CVE-2018-18955
Metasploit
Hashicorp Consul - Remote Command Execution via Services API (Metasploit)
remote
linux
Metasploit
Hashicorp Consul - Remote Command Execution via Services API (Metasploit)
remote
linux
Metasploit
Hashicorp Consul - Remote Command Execution via Rexec (Metasploit)
remote
linux
Metasploit
Hashicorp Consul - Remote Command Execution via Rexec (Metasploit)
remote
linux
bcoles
Linux Kernel < 4.4.0/ < 4.8.0 (Ubuntu 14.04/16.04 / Linux Mint 17/18 / Zorin) - Local Privilege Escalation (KASLR / SMEP)
local
linux
CVE-2017-1000112
«
...
17
18
19
20
21
22
23
24
25
26
27
...
»
page: 22/239 [exploits: 3823]