2024-05-25 21:48:12 +02:00
### [CVE-2022-25636](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25636)



### Description
net/netfilter/nf_dup_netdev.c in the Linux kernel 5.4 through 5.6.10 allows local users to gain privileges because of a heap out-of-bounds write. This is related to nf_tables_offload.
### POC
#### Reference
- http://packetstormsecurity.com/files/166444/Kernel-Live-Patch-Security-Notice-LSN-0085-1.html
- https://github.com/Bonfee/CVE-2022-25636
- https://nickgregory.me/linux/security/2022/03/12/cve-2022-25636/
- https://www.oracle.com/security-alerts/cpujul2022.html
#### Github
2024-06-10 18:01:06 +00:00
- https://github.com/0xMarcio/cve
2024-05-25 21:48:12 +02:00
- https://github.com/20142995/sectool
- https://github.com/ARPSyndicate/cvemon
- https://github.com/B0nfee/CVE-2022-25636
2024-06-22 09:37:59 +00:00
- https://github.com/Bonfee/CVE-2022-25636
2024-05-25 21:48:12 +02:00
- https://github.com/CVEDB/PoC-List
- https://github.com/CVEDB/awesome-cve-repo
- https://github.com/CVEDB/top
- https://github.com/Ch4nc3n/PublicExploitation
- https://github.com/EGI-Federation/SVG-advisories
- https://github.com/GhostTroops/TOP
2024-06-22 09:37:59 +00:00
- https://github.com/HaxorSecInfec/autoroot.sh
2024-05-25 21:48:12 +02:00
- https://github.com/JERRY123S/all-poc
- https://github.com/JlSakuya/Linux-Privilege-Escalation-Exploits
- https://github.com/Meowmycks/OSCPprep-Cute
- https://github.com/Meowmycks/OSCPprep-Sar
- https://github.com/Meowmycks/OSCPprep-hackme1
- https://github.com/Metarget/metarget
- https://github.com/Mr-xn/Penetration_Testing_POC
- https://github.com/NaInSec/CVE-PoC-in-GitHub
- https://github.com/SYRTI/POC_to_review
- https://github.com/SnailDev/github-hot-hub
- https://github.com/WhooAmii/POC_to_review
2024-07-25 21:25:12 +00:00
- https://github.com/a-roshbaik/Linux-Privilege-Escalation-Exploits
2024-05-25 21:48:12 +02:00
- https://github.com/boustrophedon/extrasafe
- https://github.com/bsauce/kernel-exploit-factory
- https://github.com/bsauce/kernel-security-learning
- https://github.com/carmilea/carmilea
- https://github.com/chenaotian/CVE-2022-25636
- https://github.com/cyberanand1337x/bug-bounty-2022
- https://github.com/hancp2016/news
- https://github.com/hardenedvault/ved
- https://github.com/hktalent/TOP
- https://github.com/hktalent/bug-bounty
- https://github.com/jakescheetz/OWASP-JuiceShop
- https://github.com/jbmihoub/all-poc
- https://github.com/jpacg/awesome-stars
- https://github.com/k0mi-tg/CVE-POC
- https://github.com/kdn111/linux-kernel-exploitation
- https://github.com/khanhdn111/linux-kernel-exploitation
- https://github.com/khanhdz-06/linux-kernel-exploitation
- https://github.com/khanhdz191/linux-kernel-exploitation
- https://github.com/khanhhdz/linux-kernel-exploitation
- https://github.com/khanhhdz06/linux-kernel-exploitation
- https://github.com/khanhnd123/linux-kernel-exploitation
- https://github.com/knd06/linux-kernel-exploitation
- https://github.com/lions2012/Penetration_Testing_POC
- https://github.com/lonnyzhang423/github-hot-hub
- https://github.com/manas3c/CVE-POC
- https://github.com/ndk191/linux-kernel-exploitation
- https://github.com/nomi-sec/PoC-in-GitHub
- https://github.com/pipiscrew/timeline
- https://github.com/soosmile/POC
- https://github.com/ssr-111/linux-kernel-exploitation
- https://github.com/taielab/awesome-hacking-lists
- https://github.com/trhacknon/Pocingit
- https://github.com/veritas501/CVE-2022-25636-PipeVersion
- https://github.com/veritas501/pipe-primitive
- https://github.com/weeka10/-hktalent-TOP
- https://github.com/whoforget/CVE-POC
2024-06-22 09:37:59 +00:00
- https://github.com/wkhnh06/linux-kernel-exploitation
2024-05-25 21:48:12 +02:00
- https://github.com/xairy/linux-kernel-exploitation
- https://github.com/xuetusummer/Penetration_Testing_POC
- https://github.com/yaobinwen/robin_on_rails
- https://github.com/youwizard/CVE-POC
- https://github.com/zecool/cve
- https://github.com/zhaoolee/garss
- https://github.com/zzcentury/PublicExploitation