[
•
]
NeoSense
E
X
P L O I T S
title
author
type
platform
port
cve
id
search results for » platform: linux
Roziul Hasan Khan Shifat
Linux/x64 - execve() + XOR Encoded Shellcode (84 bytes)
linux_x86-64
84.0
Brandon Dennis
Linux/x86 - Bind (4444/TCP) Shell (/bin/bash) Shellcode (656 bytes)
linux_x86
656.0
Roziul Hasan Khan Shifat
Linux/x64 - Download File (http://192.168.30.129/pri.sh) + Execute Used To Steal Information Shellcode (399 bytes)
linux_x86-64
399.0
N_A
4digits 1.1.4 - Local Buffer Overflow (PoC)
dos
linux
R-73eN
runAV mod_security - Arbitrary Command Execution
local
linux
Juan Sacco
NRSS Reader 0.3.9 - Local Stack Overflow
local
linux
Security-Assessment.com
Nfdump Nfcapd 1.6.14 - Multiple Vulnerabilities
dos
linux
Google Security Research
Linux Kernel (Ubuntu 16.04) - Reference Count Overflow Using BPF Maps
dos
linux
CVE-2016-4558
Google Security Research
Linux Kernel 4.4.x (Ubuntu 16.04) - 'double-fdput()' bpf(BPF_PROG_LOAD) Privilege Escalation
local
linux
CVE-2016-4557;823603
Google Security Research
Linux Kernel (Ubuntu 14.04.3) - 'perf_event_open()' Can Race with execve() (Access /etc/shadow)
local
linux
Timo Lindfors
Zabbix Agent 3.0.1 - 'mysql.size' Shell Command Injection
local
linux
CVE-2016-4338
Juan Sacco
TRN Threaded USENET News Reader 3.6-23 - Local Stack Overflow
local
linux
Roziul Hasan Khan Shifat
Linux/x64 - Reverse (192.168.209.131:1472/TCP) Shell (/bin/sh) + IPv6 Shellcode (203 bytes)
linux_x86-64
203.0
Roziul Hasan Khan Shifat
Linux/x64 - Bind (1472/TCP) Shell (/bin/sh) + IPv6 Shellcode (199 bytes)
linux_x86-64
199.0
Metasploit
Apache Struts - Dynamic Method Invocation Remote Code Execution (Metasploit)
remote
linux
8080.0
CVE-2016-3081
David Silveiro
Rough Auditing Tool for Security (RATS) 2.3 - Array Out of Block Crash
dos
linux
«
...
58
59
60
61
62
63
64
65
66
67
68
...
»
page: 63/240 [exploits: 3828]