cenobyte

8 exploits Active since Mar 2014
CVE-2014-2533 METASPLOIT ruby WORKING POC
BlackBerry QNX Neutrino RTOS <6.5.x - Privilege Escalation
/sbin/ifwatchd in BlackBerry QNX Neutrino RTOS 6.4.x and 6.5.x allows local users to gain privileges by providing an arbitrary program name as a command-line argument.
CVE-2014-2534 EXPLOITDB text WORKING POC
BlackBerry QNX Neutrino RTOS <6.5.x - Info Disclosure
/sbin/pppoectl in BlackBerry QNX Neutrino RTOS 6.4.x and 6.5.x allows local users to obtain sensitive information by reading "bad parameter" lines in error messages, as demonstrated by reading the root password hash in /etc/shadow.
CVE-2014-2533 EXPLOITDB bash WORKING POC
BlackBerry QNX Neutrino RTOS <6.5.x - Privilege Escalation
/sbin/ifwatchd in BlackBerry QNX Neutrino RTOS 6.4.x and 6.5.x allows local users to gain privileges by providing an arbitrary program name as a command-line argument.
EIP-2026-114688 EXPLOITDB c WORKING POC
QNX 6.5.0 x86 io-graphics - Local Privilege Escalation
EIP-2026-114689 EXPLOITDB c WORKING POC
QNX 6.5.0 x86 phfont - Local Privilege Escalation
EIP-2026-104596 EXPLOITDB bash WORKING POC
Dropbox < 3.3.x - OSX FinderLoadBundle Privilege Escalation
EIP-2026-102964 EXPLOITDB text WORKING POC
QNX - '.Phgrafx' File Enumeration
CVE-2014-2533 EXPLOITDB ruby WORKING POC
BlackBerry QNX Neutrino RTOS <6.5.x - Privilege Escalation
/sbin/ifwatchd in BlackBerry QNX Neutrino RTOS 6.4.x and 6.5.x allows local users to gain privileges by providing an arbitrary program name as a command-line argument.