[
•
]
NeoSense
E
X
P L O I T S
title
author
type
platform
port
cve
id
search results for » platform: linux_x86
Jean Pascal Pereira
Linux/x86 - Disable ASLR Security Shellcode (83 bytes)
linux_x86
83.0
X-h4ck
Linux/x86 - execve(/bin/dash) Shellcode (42 bytes)
linux_x86
42.0
0_o
Linux/x64 - Add Root User (t0r/Winner) To /etc/passwd Shellcode (189 bytes)
linux_x86-64
189.0
rigan
Linux/x86 - Search For '.PHP'/'.HTML' Writable Files + Add Code Shellcode (380+ bytes)
linux_x86
380.0
pentesters.ir
Linux/x86 - setuid(0) + setgid(0) + Add Root User (iph) To /etc/passwd + No Password + Polymorphic Shellcode
linux_x86
X-h4ck
Linux/x64 - execve(/bin/sh) Shellcode (52 bytes)
linux_x86-64
52.0
Ali Raheem
Linux/x86 - Egghunter + Null-Free Shellcode (29 bytes)
linux_x86
29.0
Jonathan Salwan
Linux/x86 - Reverse (localhost:8080/TCP) Shell + SSL Shellcode (422 bytes)
linux_x86
422.0
Jonathan Salwan
Linux/x86 - Bind (6666/TCP) Netcat (/usr/bin/netcat) Shell (/bin/sh) + Polymorphic + XOR Encoded Shellcode (69/93 bytes)
linux_x86
69.0
Dan Rosenberg
Linux Kernel < 2.6.34 (Ubuntu 10.10 x86) - 'CAP_SYS_ADMIN' Local Privilege Escalation (1)
local
linux_x86
Ac1dB1tCh3z
Linux Kernel 2.6.27 < 2.6.36 (RedHat x86-64) - 'compat' Local Privilege Escalation
local
linux_x86-64
CVE-2010-3081;OSVDB-68213
ben hawkes
Linux Kernel < 2.6.36-rc4-git2 (x86-64) - 'ia32syscall' Emulation Privilege Escalation
local
linux_x86-64
CVE-2010-3301;OSVDB-68192
Metasploit
Samba 3.3.12 (Linux x86) - 'chain_reply' Memory Corruption (Metasploit)
remote
linux_x86
CVE-2010-2063;OSVDB-65518
Aodrulez
Linux/x86 - execve(/bin/sh) + Polymorphic + Null-Free Shellcode (46 bytes)
linux_x86
46.0
Metasploit
Samba 2.2.8 (Linux x86) - 'trans2open' Remote Overflow (Metasploit)
remote
linux_x86
CVE-2003-0201;OSVDB-4469
blake
Linux/x86 - Reverse (8080/TCP) Netcat Shell Shellcode (76 bytes)
linux_x86
76.0
«
...
17
18
19
20
21
22
23
24
25
26
27
...
»
page: 22/42 [exploits: 672]