[
•
]
NeoSense
E
X
P L O I T S
title
author
type
platform
port
cve
id
search results for » platform: linux_x86-64
ben hawkes
Linux Kernel < 2.6.36-rc4-git2 (x86-64) - 'ia32syscall' Emulation Privilege Escalation
local
linux_x86-64
CVE-2010-3301;OSVDB-68192
Ac1dB1tCh3z
Linux Kernel 2.6.27 < 2.6.36 (RedHat x86-64) - 'compat' Local Privilege Escalation
local
linux_x86-64
CVE-2010-3081;OSVDB-68213
10n1z3d
Linux/x64 - Flush IPTables Rules (execve(_/sbin/iptables__ [_/sbin/iptables__ _-F_]_ NULL)) Shellcode (49 bytes)
linux_x86-64
49.0
Jonathan Salwan
Linux/x64 - Add Root User (shell-storm/leet) To /etc/{passwd_shadow} Shellcode (390 bytes)
linux_x86-64
390.0
Jonathan Salwan
Linux/x64 - Disable ASLR Security Shellcode (143 bytes)
linux_x86-64
143.0
Jonathan Salwan
Linux/x64 - setuid(0) + chmod (/etc/passwd 0777) + exit(0) Shellcode (63 bytes)
linux_x86-64
63.0
zbt
Linux/x64 - reboot(POWER_OFF) Shellcode (19 bytes)
linux_x86-64
19.0
zbt
Linux/x64 - execve(/bin/sh) Shellcode (30 bytes)
linux_x86-64
30.0
Mathias Krause
Linux Kernel 2.6.x (x64) - Personality Handling Local Denial of Service
dos
linux_x86-64
CVE-2010-0307;OSVDB-62045
spender
Linux Kernel 2.6.32-rc1 (x86-64) - Register Leak
local
linux_x86-64
sgrakkyu
Linux Kernel 2.6.24_16-23/2.6.27_7-10/2.6.28.3 (Ubuntu 8.04/8.10 / Fedora Core 10 x86-64) - 'set_selection()' UTF-8 Off-by-One Privilege Escalation
local
linux_x86-64
CVE-2009-1046
evil.xi4oyu
Linux/x64 - Bind (4444/TCP) Shell Shellcode (132 bytes)
linux_x86-64
132.0
evil.xi4oyu
Linux/x64 - setuid(0) + execve(/bin/sh) Shellcode (49 bytes)
linux_x86-64
49.0
Chris Evans
Systrace 1.x (Linux Kernel x64) - Aware Local Privilege Escalation
local
linux_x86-64
CVE-2009-0343;OSVDB-53535
Dad_
Linux/x64 - execve(/bin/sh) Shellcode (27 bytes)
linux_x86-64
27.0
Doreth.Z10
Linux/x64 - Bind (1337/TCP) Shell + Password (pAzzW0rd) + Egghunter Using sys_access() Shellcode (49 bytes)
linux_x86-64
49.0
«
1
2
3
4
5
6
7
8
9
10
11
»
page: 9/11 [exploits: 162]