[
•
]
NeoSense
E
X
P L O I T S
title
author
type
platform
port
cve
id
search results for » platform: linux
Metasploit
Hashicorp Consul - Remote Command Execution via Services API (Metasploit)
remote
linux
Metasploit
Hashicorp Consul - Remote Command Execution via Services API (Metasploit)
remote
linux
Metasploit
Hashicorp Consul - Remote Command Execution via Rexec (Metasploit)
remote
linux
Metasploit
Hashicorp Consul - Remote Command Execution via Rexec (Metasploit)
remote
linux
bcoles
Linux Kernel < 4.4.0/ < 4.8.0 (Ubuntu 14.04/16.04 / Linux Mint 17/18 / Zorin) - Local Privilege Escalation (KASLR / SMEP)
local
linux
CVE-2017-1000112
bcoles
Linux Kernel 4.8.0-34 < 4.8.0-45 (Ubuntu / Linux Mint) - Packet Socket Local Privilege Escalation
local
linux
CVE-2017-7308
strider
Linux/x86 - Kill All Processes Shellcode (14 bytes)
linux_x86
Sam
Angry IP Scanner for Linux 3.5.3 - Denial of Service (PoC)
dos
linux
Sam
Angry IP Scanner for Linux 3.5.3 - Denial of Service (PoC)
dos
linux
Kağan Çapar
Linux/x64 - Disable ASLR Security Shellcode (93 Bytes)
linux_x86-64
93.0
Jinbum Park
Linux Kernel 4.4 - 'rtnetlink' Stack Memory Disclosure
local
linux
CVE-2016-4486
Google Security Research
Linux - 'userfaultfd' Bypasses tmpfs File Permissions
dos
linux
Hacker Fantastic
GNU inetutils < 1.9.4 - 'telnet.c' Multiple Overflows (PoC)
dos
linux
T3jv1l
Linux/x86 - Bind (1337/TCP) Ncat (/usr/bin/ncat) Shell (/bin/bash) + Null-Free Shellcode (95 bytes)
linux_x86
95.0
Kağan Çapar
Linux/x64 - Reverse (0.0.0.0:1907/TCP) Shell Shellcode (119 Bytes)
linux_x86-64
119.0
Nelis
Linux/x86 - execve(/usr/bin/head -n99 cat etc/passwd) Shellcode (61 Bytes)
linux_x86
61.0
«
...
18
19
20
21
22
23
24
25
26
27
28
...
»
page: 23/240 [exploits: 3828]