c3r34lk1ll3r

5 exploits Active since Jul 2017
CVE-2017-5123 NOMISEC HIGH WORKING POC
Linux Kernel 4.13 through 4.13.7 - Sandbox Escape via waitid
Insufficient data validation in waitid allowed an user to escape sandboxes on Linux.
32 stars
CVSS 8.8
CVE-2019-2215 NOMISEC HIGH WORKING POC
Android Binder Use-After-Free Exploit
A use-after-free in binder.c allows an elevation of privilege from an application to the Linux Kernel. No user interaction is required to exploit this vulnerability, however exploitation does require either the installation of a malicious local application or a separate vulnerability in a network facing application.Product: AndroidAndroid ID: A-141720095
12 stars
CVSS 7.8
CVE-2017-11176 NOMISEC HIGH WORKING POC
Linux Kernel < 3.2.92 - Use After Free
The mq_notify function in the Linux kernel through 4.11.9 does not set the sock pointer to NULL upon entry into the retry logic. During a user-space close of a Netlink socket, it allows attackers to cause a denial of service (use-after-free) or possibly have unspecified other impact.
1 stars
CVSS 7.8
CVE-2018-7211 NOMISEC HIGH WORKING POC
Idashboards < 9.6b - Broken Cryptographic Algorithm
An issue was discovered in iDashboards 9.6b. The SSO implementation is affected by a weak obfuscation library, allowing man-in-the-middle attackers to discover credentials.
CVSS 8.1
CVE-2020-25493 WRITEUP HIGH WORKING POC
Oclean - Broken Cryptographic Algorithm
Oclean Mobile Application 2.1.2 communicates with an external website using HTTP so it is possible to eavesdrop the network traffic. The content of HTTP payload is encrypted using XOR with a hardcoded key, which allows for the possibility to decode the traffic.
CVSS 7.5