[] NeoSense
search results for » platform: linux
Metasploit blueman - set_dhcp_handler D-Bus Privilege Escalation (Metasploit)
local linux CVE-2015-8612
Magnus Klaaborg Stubman NTPsec 1.1.2 - 'config' (Authenticated) Out-of-Bounds Write Denial of Service (PoC)
dos linux 123.0 CVE-2019-6442
Magnus Klaaborg Stubman NTPsec 1.1.2 - 'ntp_control' (Authenticated) NULL Pointer Dereference (PoC)
dos linux 123.0 CVE-2019-6445
Magnus Klaaborg Stubman NTPsec 1.1.2 - 'ntp_control' (Authenticated) NULL Pointer Dereference (PoC)
dos linux 123.0 CVE-2019-6445
Magnus Klaaborg Stubman NTPsec 1.1.2 - 'ntp_control' Out-of-Bounds Read (PoC)
dos linux 123.0 CVE-2019-6444
Magnus Klaaborg Stubman NTPsec 1.1.2 - 'ctl_getitem' Out-of-Bounds Read (PoC)
dos linux 123.0 CVE-2019-6443
Joao Batista Linux/x86 - Bind (4444/TCP) Shell (/bin/sh) Shellcode (100 bytes)
linux_x86 100.0
Google Security Research polkit - Temporary auth Hijacking via PID Reuse and Non-atomic Fork
dos linux
strider Linux/x86 - execve(/bin/sh -c) + wget (http://127.0.0.1:8080/evilfile) + chmod 777 + Execute Shellcode (119 bytes)
linux_x86 119.0
bcoles Linux Kernel 4.15.x < 4.19.2 - 'map_write() CAP_SYS_ADMIN' Local Privilege Escalation (polkit Method)
local linux CVE-2018-18955
bcoles Linux Kernel 4.15.x < 4.19.2 - 'map_write() CAP_SYS_ADMIN' Local Privilege Escalation (dbus Method)
local linux CVE-2018-18955
Metasploit Hashicorp Consul - Remote Command Execution via Services API (Metasploit)
remote linux
Metasploit Hashicorp Consul - Remote Command Execution via Services API (Metasploit)
remote linux
Metasploit Hashicorp Consul - Remote Command Execution via Rexec (Metasploit)
remote linux
Metasploit Hashicorp Consul - Remote Command Execution via Rexec (Metasploit)
remote linux
bcoles Linux Kernel < 4.4.0/ < 4.8.0 (Ubuntu 14.04/16.04 / Linux Mint 17/18 / Zorin) - Local Privilege Escalation (KASLR / SMEP)
local linux CVE-2017-1000112
page: 22/239 [exploits: 3823]