[
•
]
NeoSense
E
X
P L O I T S
title
author
type
platform
port
cve
id
search results for » platform: linux
Phil Oester
Linux Kernel 2.6.22 < 3.9 - 'Dirty COW PTRACE_POKEDATA' Race Condition (Write Access Method)
local
linux
CVE-2016-5195
Robin Verton
Linux Kernel 2.6.22 < 3.9 (x86/x64) - 'Dirty COW /proc/self/mem' Race Condition Privilege Escalation (SUID Method)
local
linux
CVE-2016-5195
Metasploit
OpenNMS - Java Object Unserialization Remote Code Execution (Metasploit)
remote
linux
1099.0
Metasploit
Hak5 WiFi Pineapple 2.4 - Preconfiguration Command Injection (Metasploit)
remote
linux
1471.0
CVE-2015-4624
Phil Oester
Linux Kernel 2.6.22 < 3.9 - 'Dirty COW' /proc/self/mem Race Condition (Write Access Method)
local
linux
CVE-2016-5195
Vitaly Nikolenko
Linux Kernel < 4.5.1 - Off-By-One (PoC)
dos
linux
CVE-2016-6187
GlacierZ0ne
Subversion 1.6.6/1.6.12 - Code Execution
remote
linux
CVE-2013-2088
Metasploit
Linux Kernel 3.13.1 - 'Recvmmsg' Local Privilege Escalation (Metasploit)
local
linux
CVE-2014-0038
Qian Zhang
Linux Kernel 4.6.2 (Ubuntu 16.04.1) - 'IP6T_SO_SET_REPLACE' Local Privilege Escalation
local
linux
CVE-2016-4997;DSA-3607-1
Dawid Golunski
Apache Tomcat 8/7/6 (RedHat Based Distros) - Local Privilege Escalation
local
linux
CVE-2016-5425
KoreLogic
Cisco Firepower Threat Management Console 6.0.1 - Hard-Coded MySQL Credentials
local
linux
CVE-2016-6434
Dawid Golunski
Apache Tomcat 8/7/6 (Debian-Based Distros) - Local Privilege Escalation
local
linux
CVE-2016-1240
Metasploit
Linux Kernel 4.6.3 (x86) - 'Netfilter' Local Privilege Escalation (Metasploit)
local
linux_x86
CVE-2016-4997;DSA-3607-1
Google Security Research
Linux SELinux - W+X Protection Bypass via AIO
dos
linux
Metasploit
Docker Daemon - Local Privilege Escalation (Metasploit)
local
linux
Juan Sacco
EKG Gadu 1.9~pre+r2855-3+b1 - Local Buffer Overflow
local
linux
«
...
53
54
55
56
57
58
59
60
61
62
63
...
»
page: 58/240 [exploits: 3828]