[
•
]
NeoSense
E
X
P L O I T S
title
author
type
platform
port
cve
id
search results for » platform: linux
Metasploit
Riverbed SteelCentral NetProfiler/NetExpress - Remote Code Execution (Metasploit)
remote
linux
443.0
Kyzer
Linux/x64 - Reverse (10.1.1.4/TCP) Shell + Continuously Probing Via Socket + Port-Range (391-399) + Password (la crips) + Null-Free Shellcode (172 bytes)
linux_x86-64
172.0
sajith
Linux/x86 - Reverse (192.168.227.129:4444/TCP) Shell (/bin/sh) Shellcode (75 bytes)
linux_x86
75.0
Metasploit
Nagios XI Chained - Remote Code Execution (Metasploit)
remote
linux
80.0
Dawid Golunski
GNU Wget < 1.18 - Arbitrary File Upload / Remote Code Execution
remote
linux
CVE-2016-4971
Kyzer
Linux/x64 - Bind (4442/TCP) Ncat Shell + SSL + Multi-Channel (4444-4447/TCP) + Persistant + fork() + IPv4/6 + Password + Null-Free Shellcode (176 bytes)
linux_x86-64
176.0
Vitaly Nikolenko
Linux Kernel < 4.4.0-21 (Ubuntu 16.04 x64) - 'netfilter target_offset' Local Privilege Escalation
local
linux_x86-64
sajith
Linux/x86 - Bind (4444/TCP) Shell (/bin/sh) Shellcode (98 bytes)
linux_x86
98.0
halfdog
Exim 4 (Debian 8 / Ubuntu 16.04) - Spool Privilege Escalation
local
linux
Kyzer
Linux/x64 - Bind (/TCP) Netcat Shell + Null-Free Shellcode (64 bytes)
linux_x86-64
64.0
vnik
Linux Kernel 4.4.0-21 (Ubuntu 16.04 x64) - Netfilter 'target_offset' Out-of-Bounds Privilege Escalation
local
linux_x86-64
Roziul Hasan Khan Shifat
Linux/x64 - Reverse (192.168.86.128:1472/TCP) cat /etc/passwd Shellcode (164 bytes)
linux_x86-64
164.0
Pawan Lal
Linux/x86 - execve(/bin/sh) + ASLR Bruteforce Shellcode
linux_x86
Juan Sacco
HNB 1.9.18-10 - Local Buffer Overflow
local
linux
Juan Sacco
PInfo 0.6.9-5.1 - Local Buffer Overflow
local
linux
Google Security Research
Linux Kernel - 'ecryptfs' '/proc/$pid/environ' Local Privilege Escalation
local
linux
CVE-2016-1583
«
...
56
57
58
59
60
61
62
63
64
65
66
...
»
page: 61/240 [exploits: 3828]