[] NeoSense
search results for » platform: linux
Metasploit AddressSanitizer (ASan) - SUID Executable Privilege Escalation (Metasploit)
local linux
Chris Lyne Nagios XI 5.5.6 - Remote Code Execution / Privilege Escalation
webapps linux CVE-2018-15710;CVE-2018-15708
Dhiraj Mishra GattLib 0.2 - Stack Buffer Overflow
remote linux CVE-2019-6498
wally0813 Linux Kernel 4.13 - 'compat_get_timex()' Leak Kernel Pointer
dos linux CVE-2018-11508
Metasploit blueman - set_dhcp_handler D-Bus Privilege Escalation (Metasploit)
local linux CVE-2015-8612
Metasploit blueman - set_dhcp_handler D-Bus Privilege Escalation (Metasploit)
local linux CVE-2015-8612
Magnus Klaaborg Stubman NTPsec 1.1.2 - 'config' (Authenticated) Out-of-Bounds Write Denial of Service (PoC)
dos linux 123.0 CVE-2019-6442
Magnus Klaaborg Stubman NTPsec 1.1.2 - 'ntp_control' (Authenticated) NULL Pointer Dereference (PoC)
dos linux 123.0 CVE-2019-6445
Magnus Klaaborg Stubman NTPsec 1.1.2 - 'ntp_control' (Authenticated) NULL Pointer Dereference (PoC)
dos linux 123.0 CVE-2019-6445
Magnus Klaaborg Stubman NTPsec 1.1.2 - 'ntp_control' Out-of-Bounds Read (PoC)
dos linux 123.0 CVE-2019-6444
Magnus Klaaborg Stubman NTPsec 1.1.2 - 'ctl_getitem' Out-of-Bounds Read (PoC)
dos linux 123.0 CVE-2019-6443
Joao Batista Linux/x86 - Bind (4444/TCP) Shell (/bin/sh) Shellcode (100 bytes)
linux_x86 100.0
Google Security Research polkit - Temporary auth Hijacking via PID Reuse and Non-atomic Fork
dos linux
strider Linux/x86 - execve(/bin/sh -c) + wget (http://127.0.0.1:8080/evilfile) + chmod 777 + Execute Shellcode (119 bytes)
linux_x86 119.0
bcoles Linux Kernel 4.15.x < 4.19.2 - 'map_write() CAP_SYS_ADMIN' Local Privilege Escalation (polkit Method)
local linux CVE-2018-18955
bcoles Linux Kernel 4.15.x < 4.19.2 - 'map_write() CAP_SYS_ADMIN' Local Privilege Escalation (dbus Method)
local linux CVE-2018-18955
page: 22/240 [exploits: 3828]