C Exploits

3,550 exploits tracked across all sources.

Sort: Activity Stars
EIP-2026-103406 EXPLOITDB c VERIFIED
Apple iOS/macOS - Kernel Memory Corruption due to Integer Overflow in IOHIDResourceQueue::enqueueReport
by Google Security Research
EIP-2026-103405 EXPLOITDB c VERIFIED
Apple iOS/macOS - Kernel Memory Corruption due to Integer Overflow in IOHIDResourceQueue::enqueueReport
by Google Security Research
EIP-2026-103360 EXPLOITDB c VERIFIED
Apple Intel GPU Driver - Use-After-Free/Double-Delete due to bad Locking
by Google Security Research
EIP-2026-102157 EXPLOITDB c VERIFIED
Apple iOS Kernel - Use-After-Free due to bad Error Handling in Personas
by Google Security Research
EIP-2026-102156 EXPLOITDB c VERIFIED
Apple iOS Kernel - Use-After-Free due to bad Error Handling in Personas
by Google Security Research
CVE-2018-17980 EXPLOITDB HIGH c
Nomachine < 5.3.27 - Untrusted Search Path
NoMachine before 5.3.27 and 6.x before 6.3.6 allows attackers to gain privileges via a Trojan horse wintab32.dll file located in the same directory as a .nxs file, as demonstrated by a scenario where the .nxs file and the DLL are in the current working directory, and the Trojan horse code is executed. (The directory could, in general, be on a local filesystem or a network share.).
by hyp3rlinx
CVSS 7.8
EIP-2026-102637 EXPLOITDB c VERIFIED
Linux - Kernel Pointer Leak via BPF
by Google Security Research
CVE-2017-11176 EXPLOITDB HIGH c
Linux Kernel < 3.2.92 - Use After Free
The mq_notify function in the Linux kernel through 4.11.9 does not set the sock pointer to NULL upon entry into the retry logic. During a user-space close of a Netlink socket, it allows attackers to cause a denial of service (use-after-free) or possibly have unspecified other impact.
by Lexfo
CVSS 7.8
CVE-2018-14634 EXPLOITDB HIGH c
Linux kernel <4.14 - Privilege Escalation
An integer overflow flaw was found in the Linux kernel's create_elf_tables() function. An unprivileged local user with access to SUID (or otherwise privileged) binary could use this flaw to escalate their privileges on the system. Kernel versions 2.6.x, 3.10.x and 4.14.x are believed to be vulnerable.
by Qualys Corporation
CVSS 7.8
EIP-2026-117965 EXPLOITDB c
STOPzilla AntiMalware 6.5.2.59 - Privilege Escalation (2)
by Ivan Ivanovic
EIP-2026-117964 EXPLOITDB c VERIFIED
STOPzilla AntiMalware 6.5.2.59 - Privilege Escalation (1)
by Parvez Anwar
CVE-2018-0437 EXPLOITDB HIGH c
Cisco Umbrella Enterprise Roaming Client < 2.1.118 - Improper Privilege Management
A vulnerability in the Cisco Umbrella Enterprise Roaming Client (ERC) could allow an authenticated, local attacker to elevate privileges to Administrator. To exploit the vulnerability, the attacker must authenticate with valid local user credentials. This vulnerability is due to improper implementation of file system permissions, which could allow non-administrative users to place files within restricted directories. An attacker could exploit this vulnerability by placing an executable file within the restricted directory, which when executed by the ERC client, would run with Administrator privileges.
by ParagonSec
CVSS 7.8
CVE-2018-0438 EXPLOITDB HIGH c
Cisco Umbrella Enterprise Roaming Client - Improper Input Validation
A vulnerability in the Cisco Umbrella Enterprise Roaming Client (ERC) could allow an authenticated, local attacker to elevate privileges to Administrator. To exploit the vulnerability, the attacker must authenticate with valid local user credentials. This vulnerability is due to improper implementation of file system permissions, which could allow non-administrative users to place files within restricted directories. An attacker could exploit this vulnerability by placing an executable file within the restricted directory, which when executed by the ERC client, would run with Administrator privileges.
by ParagonSec
CVSS 7.8
EIP-2026-119513 EXPLOITDB c
Argus Surveillance DVR 4.0.0.0 - Privilege Escalation
by hyp3rlinx
CVE-2017-18344 EXPLOITDB MEDIUM c
Linux Kernel < 4.14.8 - Out-of-Bounds Read
The timer_create syscall implementation in kernel/time/posix-timers.c in the Linux kernel before 4.14.8 doesn't properly validate the sigevent->sigev_notify field, which leads to out-of-bounds access in the show_timer function (called when /proc/$PID/timers is read). This allows userspace applications to read arbitrary kernel memory (on a kernel built with CONFIG_POSIX_TIMERS and CONFIG_CHECKPOINT_RESTORE).
by Andrey Konovalov
CVSS 5.5
CVE-2018-2892 EXPLOITDB HIGH c
Oracle Solaris <11 - Privilege Escalation
Vulnerability in the Solaris component of Oracle Sun Systems Products Suite (subcomponent: Availability Suite Service). Supported versions that are affected are 10 and 11.3. Easily exploitable vulnerability allows low privileged attacker with logon to the infrastructure where Solaris executes to compromise Solaris. Successful attacks of this vulnerability can result in takeover of Solaris. CVSS 3.0 Base Score 7.8 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H).
by mu-b
CVSS 7.8
EIP-2026-115800 EXPLOITDB c
Microsoft Windows Kernel - 'win32k!NtUserConsoleControl' Denial of Service (PoC)
by vportal
CVE-2018-10906 EXPLOITDB MEDIUM c VERIFIED
Debian Linux < 2.9.8 - Improper Authorization
In fuse before versions 2.9.8 and 3.x before 3.2.5, fusermount is vulnerable to a restriction bypass when SELinux is active. This allows non-root users to mount a FUSE file system with the 'allow_other' mount option regardless of whether 'user_allow_other' is set in the fuse configuration. An attacker may use this flaw to mount a FUSE file system, accessible by other users, and trick them into accessing files on that file system, possibly causing Denial of Service or other unspecified effects.
by Google Security Research
CVSS 5.3
CVE-2018-13405 EXPLOITDB HIGH c VERIFIED
Linux Kernel < 3.16 - Improper Privilege Management
The inode_init_owner function in fs/inode.c in the Linux kernel through 3.16 allows local users to create files with an unintended group ownership, in a scenario where a directory is SGID to a certain group and is writable by a user who is not a member of that group. Here, the non-member can trigger creation of a plain file whose group ownership is that group. The intended behavior was that the non-member can trigger creation of a directory (but not a plain file) whose group ownership is that group. The non-member can escalate privileges by making the plain file executable and SGID.
by Google Security Research
CVSS 7.8
CVE-2017-16995 EXPLOITDB HIGH c VERIFIED
Linux BPF Sign Extension Local Privilege Escalation
The check_alu_op function in kernel/bpf/verifier.c in the Linux kernel through 4.4 allows local users to cause a denial of service (memory corruption) or possibly have unspecified other impact by leveraging incorrect sign extension.
by rlarabee
CVSS 7.8
CVE-2018-12589 EXPLOITDB HIGH c
Polaris Office 2017 8.1 - RCE
Polaris Office 2017 8.1 allows attackers to execute arbitrary code via a Trojan horse puiframeworkproresenu.dll file in the current working directory.
by hyp3rlinx
CVSS 7.8
CVE-2018-4243 EXPLOITDB HIGH c VERIFIED
Apple Iphone OS < 11.4 - Memory Corruption
An issue was discovered in certain Apple products. iOS before 11.4 is affected. macOS before 10.13.5 is affected. tvOS before 11.4 is affected. watchOS before 4.3.1 is affected. The issue involves the "Kernel" component. A buffer overflow in getvolattrlist allows attackers to execute arbitrary code in a privileged context via a crafted app.
by Google Security Research
CVSS 7.8
CVE-2018-4230 EXPLOITDB HIGH c VERIFIED
Apple Mac OS X < 10.13.5 - Race Condition
An issue was discovered in certain Apple products. macOS before 10.13.5 is affected. The issue involves the "NVIDIA Graphics Drivers" component. It allows attackers to execute arbitrary code in a privileged context via a crafted app that triggers a SetAppSupportBits use-after-free because of a race condition.
by Google Security Research
CVSS 7.0
CVE-2018-3639 EXPLOITDB MEDIUM c VERIFIED
Intel Atom C < 3.1 - Information Disclosure
Systems with microprocessors utilizing speculative execution and speculative execution of memory reads before the addresses of all prior memory writes are known may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis, aka Speculative Store Bypass (SSB), Variant 4.
by Google Security Research
CVSS 5.5
EIP-2026-102642 EXPLOITDB c VERIFIED
Linux < 4.16.9 / < 4.14.41 - 4-byte Infoleak via Uninitialized Struct Field in compat adjtimex Syscall
by Google Security Research