Dirty COW Logo

Dirty COW

0
Free
Visit Website

Dirty COW (CVE-2016-5195) is a local privilege escalation vulnerability in the Linux kernel discovered by researcher Phil Oester, allowing an attacker to modify memory mapped files even if not permitted, through a race condition between write(2) and madvise(MADV_DONTNEED) calls.

FEATURES

ALTERNATIVES

Crt.sh is a website that allows users to search for SSL/TLS certificates of a targeted domain, providing transparency into certificate logs.

A tool for detecting and exploiting vulnerabilities in web applications

An extensible, heuristic-based vulnerability scanning tool for installed npm packages.

Automate the search for Exploits and Vulnerabilities in important databases.

A tool for scanning Adobe Experience Manager instances for potential security vulnerabilities

A vulnerability management tool for macOS that monitors and detects vulnerabilities in over 100 apps.

Scans Alpine base images for vulnerabilities using Multi Stage builds in Docker 17.05

A comprehensive database of exploits and vulnerabilities for researchers and professionals