C Exploits

3,550 exploits tracked across all sources.

Sort: Activity Stars
CVE-2019-9832 EXPLOITDB HIGH c
AirDrop <2.0 - DoS
The AirDrop application through 2.0 for Android allows remote attackers to cause a denial of service via a client that makes many socket connections through a configured port.
by s4vitar
CVSS 7.5
EIP-2026-100021 EXPLOITDB c VERIFIED
Android Kernel < 4.8 - ptrace seccomp Filter Bypass
by Google Security Research
CVE-2019-6205 EXPLOITDB HIGH c VERIFIED
Apple Iphone OS < 12.1.3 - Out-of-Bounds Write
A memory corruption issue was addressed with improved lock state checking. This issue is fixed in iOS 12.1.3, macOS Mojave 10.14.3, tvOS 12.1.2. A malicious application may cause unexpected changes in memory shared between processes.
by Google Security Research
CVSS 7.8
CVE-2019-6214 EXPLOITDB HIGH c VERIFIED
Apple Iphone OS < 12.1.3 - Type Confusion
A type confusion issue was addressed with improved memory handling. This issue is fixed in iOS 12.1.3, macOS Mojave 10.14.3, tvOS 12.1.2, watchOS 5.1.3. A malicious application may be able to break out of its sandbox.
by Google Security Research
CVSS 8.6
CVE-2019-6213 EXPLOITDB HIGH c VERIFIED
Apple Iphone OS < 12.1.3 - Memory Corruption
A buffer overflow was addressed with improved bounds checking. This issue is fixed in iOS 12.1.3, macOS Mojave 10.14.3, tvOS 12.1.2, watchOS 5.1.3. An application may be able to execute arbitrary code with kernel privileges.
by Google Security Research
CVSS 7.8
CVE-2019-6218 EXPLOITDB HIGH c VERIFIED
Apple Iphone OS < 12.1.3 - Out-of-Bounds Write
A memory corruption issue was addressed with improved input validation. This issue is fixed in iOS 12.1.3, macOS Mojave 10.14.3, tvOS 12.1.2. A malicious application may be able to execute arbitrary code with kernel privileges.
by Google Security Research
CVSS 7.8
CVE-2019-6208 EXPLOITDB MEDIUM c VERIFIED
iOS <12.1.3 - Memory Corruption
A memory initialization issue was addressed with improved memory handling. This issue is fixed in iOS 12.1.3, macOS Mojave 10.14.3, tvOS 12.1.2. A malicious application may cause unexpected changes in memory shared between processes.
by Google Security Research
CVSS 5.5
CVE-2019-6209 EXPLOITDB MEDIUM c VERIFIED
Apple Iphone OS < 12.1.3 - Out-of-Bounds Read
An out-of-bounds read issue existed that led to the disclosure of kernel memory. This was addressed with improved input validation. This issue is fixed in iOS 12.1.3, macOS Mojave 10.14.3, tvOS 12.1.2, watchOS 5.1.3. A malicious application may be able to determine kernel memory layout.
by Google Security Research
CVSS 5.5
CVE-2019-6225 EXPLOITDB HIGH c VERIFIED
Apple Iphone OS < 12.1.3 - Out-of-Bounds Write
A memory corruption issue was addressed with improved validation. This issue is fixed in iOS 12.1.3, macOS Mojave 10.14.3, tvOS 12.1.2. A malicious application may be able to elevate privileges.
by Google Security Research
CVSS 7.8
CVE-2018-11508 EXPLOITDB MEDIUM c
Linux Kernel < 4.16.9 - Information Disclosure
The compat_get_timex function in kernel/compat.c in the Linux kernel before 4.16.9 allows local users to obtain sensitive information from kernel memory via adjtimex.
by wally0813
CVSS 5.5
CVE-2018-5410 EXPLOITDB HIGH c VERIFIED
Dokan <1.2.0.1000 - Buffer Overflow
Dokan, versions between 1.0.0.5000 and 1.2.0.1000, are vulnerable to a stack-based buffer overflow in the dokan1.sys driver. An attacker can create a device handle to the system driver and send arbitrary input that will trigger the vulnerability. This vulnerability was introduced in the 1.0.0.5000 version update.
by Parvez Anwar
CVSS 7.8
EIP-2026-102716 EXPLOITDB c VERIFIED
polkit - Temporary auth Hijacking via PID Reuse and Non-atomic Fork
by Google Security Research
CVE-2016-8655 EXPLOITDB HIGH c
AF_PACKET chocobo_root Privilege Escalation
Race condition in net/packet/af_packet.c in the Linux kernel through 4.8.12 allows local users to gain privileges or cause a denial of service (use-after-free) by leveraging the CAP_NET_RAW capability to change a socket version, related to the packet_set_ring and packet_setsockopt functions.
by bcoles
CVSS 7.8
CVE-2017-1000112 EXPLOITDB HIGH c
Linux Kernel UDP Fragmentation Offset (UFO) Privilege Escalation
Linux kernel: Exploitable memory corruption due to UFO to non-UFO path switch. When building a UFO packet with MSG_MORE __ip_append_data() calls ip_ufo_append_data() to append. However in between two send() calls, the append path can be switched from UFO to non-UFO one, which leads to a memory corruption. In case UFO packet lengths exceeds MTU, copy = maxfraglen - skb->len becomes negative on the non-UFO path and the branch to allocate new skb is taken. This triggers fragmentation and computation of fraggap = skb_prev->len - maxfraglen. Fraggap can exceed MTU, causing copy = datalen - transhdrlen - fraggap to become negative. Subsequently skb_copy_and_csum_bits() writes out-of-bounds. A similar issue is present in IPv6 code. The bug was introduced in e89e9cf539a2 ("[IPv4/IPv6]: UFO Scatter-gather approach") on Oct 18 2005.
by bcoles
CVSS 7.0
CVE-2017-7308 EXPLOITDB HIGH c
AF_PACKET packet_set_ring Privilege Escalation
The packet_set_ring function in net/packet/af_packet.c in the Linux kernel through 4.10.6 does not properly validate certain block-size data, which allows local users to cause a denial of service (integer signedness error and out-of-bounds write), or gain privileges (if the CAP_NET_RAW capability is held), via crafted system calls.
by bcoles
CVSS 7.8
CVE-2016-4486 EXPLOITDB LOW c
Novell Suse Linux Enterprise Software... - Information Disclosure
The rtnl_fill_link_ifmap function in net/core/rtnetlink.c in the Linux kernel before 4.5.5 does not initialize a certain data structure, which allows local users to obtain sensitive information from kernel stack memory by reading a Netlink message.
by Jinbum Park
CVSS 3.3
EIP-2026-102659 EXPLOITDB c
Linux Kernel 4.8 (Ubuntu 16.04) - Leak sctp Kernel Pointer
by Jinbum Park
EIP-2026-103362 EXPLOITDB c
Apple macOS 10.13 - 'workq_kernreturn' Denial of Service (PoC)
by Fabiano Anemone
CVE-2018-15437 EXPLOITDB MEDIUM c VERIFIED
Cisco Advanced Malware Protection For Endpoints - Denial of Service
A vulnerability in the system scanning component of Cisco Immunet and Cisco Advanced Malware Protection (AMP) for Endpoints running on Microsoft Windows could allow a local attacker to disable the scanning functionality of the product. This could allow executable files to be launched on the system without being analyzed for threats. The vulnerability is due to improper process resource handling. An attacker could exploit this vulnerability by gaining local access to a system running Microsoft Windows and protected by Cisco Immunet or Cisco AMP for Endpoints and executing a malicious file. A successful exploit could allow the attacker to prevent the scanning services from functioning properly and ultimately prevent the system from being protected from further intrusion.
by hyp3rlinx
CVSS 5.5
CVE-2018-18858 EXPLOITDB HIGH c
Liquidvpn < 1.37 - OS Command Injection
Multiple local privilege escalation vulnerabilities have been identified in the LiquidVPN client through 1.37 for macOS. An attacker can communicate with an unprotected XPC service and directly execute arbitrary OS commands as root or load a potentially malicious kernel extension because com.smr.liquidvpn.OVPNHelper uses the system function to execute the "tun_path" or "tap_path" pathname within a shell command.
by Bernd Leitner
CVSS 7.8
CVE-2018-18857 EXPLOITDB HIGH c
Liquidvpn < 1.37 - OS Command Injection
Multiple local privilege escalation vulnerabilities have been identified in the LiquidVPN client through 1.37 for macOS. An attacker can communicate with an unprotected XPC service and directly execute arbitrary OS commands as root or load a potentially malicious kernel extension because com.smr.liquidvpn.OVPNHelper uses the system function to execute the "command_line" parameter as a shell command.
by Bernd Leitner
CVSS 7.8
CVE-2018-18856 EXPLOITDB HIGH c
Liquidvpn < 1.37 - OS Command Injection
Multiple local privilege escalation vulnerabilities have been identified in the LiquidVPN client through 1.37 for macOS. An attacker can communicate with an unprotected XPC service and directly execute arbitrary OS commands as root or load a potentially malicious kernel extension because com.smr.liquidvpn.OVPNHelper uses the system function to execute the "openvpncmd" parameter as a shell command.
by Bernd Leitner
CVSS 7.8
CVE-2018-18859 EXPLOITDB HIGH c
Liquidvpn < 1.37 - OS Command Injection
Multiple local privilege escalation vulnerabilities have been identified in the LiquidVPN client through 1.37 for macOS. An attacker can communicate with an unprotected XPC service and directly execute arbitrary OS commands as root or load a potentially malicious kernel extension because com.smr.liquidvpn.OVPNHelper uses the value of the "tun_path" or "tap_path" pathname in a kextload() call.
by Bernd Leitner
CVSS 7.8
CVE-2018-15686 EXPLOITDB HIGH c VERIFIED
Canonical Ubuntu Linux < 239 - Insecure Deserialization
A vulnerability in unit_deserialize of systemd allows an attacker to supply arbitrary state across systemd re-execution via NotifyAccess. This can be used to improperly influence systemd execution and possibly lead to root privilege escalation. Affected releases are systemd versions up to and including 239.
by Google Security Research
CVSS 7.8
CVE-2018-18557 EXPLOITDB HIGH c VERIFIED
Libtiff - Out-of-Bounds Write
LibTIFF 3.9.3, 3.9.4, 3.9.5, 3.9.6, 3.9.7, 4.0.0alpha4, 4.0.0alpha5, 4.0.0alpha6, 4.0.0beta7, 4.0.0, 4.0.1, 4.0.2, 4.0.3, 4.0.4, 4.0.4beta, 4.0.5, 4.0.6, 4.0.7, 4.0.8 and 4.0.9 (with JBIG enabled) decodes arbitrarily-sized JBIG into a buffer, ignoring the buffer size, which leads to a tif_jbig.c JBIGDecode out-of-bounds write.
by Google Security Research
CVSS 8.8