mirror of
https://github.com/0xMarcio/cve.git
synced 2025-05-08 11:36:33 +00:00
83 lines
3.9 KiB
Markdown
83 lines
3.9 KiB
Markdown
![]() |
### [CVE-2020-0041](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0041)
|
||
|

|
||
|

|
||
|

|
||
|
|
||
|
### Description
|
||
|
|
||
|
In binder_transaction of binder.c, there is a possible out of bounds write due to an incorrect bounds check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-145988638References: Upstream kernel
|
||
|
|
||
|
### POC
|
||
|
|
||
|
#### Reference
|
||
|
No PoCs from references.
|
||
|
|
||
|
#### Github
|
||
|
- https://github.com/0xT11/CVE-POC
|
||
|
- https://github.com/0xZipp0/BIBLE
|
||
|
- https://github.com/ARPSyndicate/cvemon
|
||
|
- https://github.com/Ashadowkhan/PENTESTINGBIBLE
|
||
|
- https://github.com/CVEDB/PoC-List
|
||
|
- https://github.com/CVEDB/awesome-cve-repo
|
||
|
- https://github.com/CVEDB/top
|
||
|
- https://github.com/De4dCr0w/Browser-pwn
|
||
|
- https://github.com/Escapingbug/awesome-browser-exploit
|
||
|
- https://github.com/GhostTroops/TOP
|
||
|
- https://github.com/JERRY123S/all-poc
|
||
|
- https://github.com/KotenAngered/ZTE-Blade-A5-2019-Nae-Nae-List
|
||
|
- https://github.com/Mathankumar2701/ALL-PENTESTING-BIBLE
|
||
|
- https://github.com/MedoX71T/PENTESTING-BIBLE
|
||
|
- https://github.com/Mr-Anonymous002/awesome-browser-exploit
|
||
|
- https://github.com/NaInSec/CVE-PoC-in-GitHub
|
||
|
- https://github.com/NetKingJ/android-security-awesome
|
||
|
- https://github.com/NetKingJ/awesome-android-security
|
||
|
- https://github.com/NetW0rK1le3r/PENTESTING-BIBLE
|
||
|
- https://github.com/OCEANOFANYTHING/PENTESTING-BIBLE
|
||
|
- https://github.com/OpposedDeception/ZTE-Blade-A5-2019-Nae-Nae-List
|
||
|
- https://github.com/Ostorlab/KEV
|
||
|
- https://github.com/Ostorlab/known_exploited_vulnerbilities_detectors
|
||
|
- https://github.com/Rayyan-appsec/ALL-PENTESTING-BIBLE
|
||
|
- https://github.com/Saidul-M-Khan/PENTESTING-BIBLE
|
||
|
- https://github.com/allpaca/chrome-sbx-db
|
||
|
- https://github.com/blaCCkHatHacEEkr/PENTESTING-BIBLE
|
||
|
- https://github.com/blank156/memek
|
||
|
- https://github.com/bluefrostsecurity/CVE-2020-0041
|
||
|
- https://github.com/cwannett/Docs-resources
|
||
|
- https://github.com/developer3000S/PoC-in-GitHub
|
||
|
- https://github.com/dli408097/pentesting-bible
|
||
|
- https://github.com/gmh5225/awesome-game-security
|
||
|
- https://github.com/guzzisec/PENTESTING-BIBLE
|
||
|
- https://github.com/hacker-insider/Hacking
|
||
|
- https://github.com/hectorgie/PoC-in-GitHub
|
||
|
- https://github.com/hktalent/TOP
|
||
|
- https://github.com/j4nn/CVE-2020-0041
|
||
|
- https://github.com/jbmihoub/all-poc
|
||
|
- https://github.com/jcalabres/Simple-Keyboard-Keylogger
|
||
|
- https://github.com/jcalabres/root-exploit-pixel3
|
||
|
- https://github.com/kdn111/linux-kernel-exploitation
|
||
|
- https://github.com/khanhdn111/linux-kernel-exploitation
|
||
|
- https://github.com/khanhdz-06/linux-kernel-exploitation
|
||
|
- https://github.com/khanhdz191/linux-kernel-exploitation
|
||
|
- https://github.com/khanhhdz/linux-kernel-exploitation
|
||
|
- https://github.com/khanhhdz06/linux-kernel-exploitation
|
||
|
- https://github.com/khanhnd123/linux-kernel-exploitation
|
||
|
- https://github.com/knd06/linux-kernel-exploitation
|
||
|
- https://github.com/koharin/CVE-2020-0041
|
||
|
- https://github.com/ndk191/linux-kernel-exploitation
|
||
|
- https://github.com/nitishbadole/PENTESTING-BIBLE
|
||
|
- https://github.com/nomi-sec/PoC-in-GitHub
|
||
|
- https://github.com/paulveillard/cybersecurity-windows-exploitation
|
||
|
- https://github.com/phant0n/PENTESTING-BIBLE
|
||
|
- https://github.com/polygraphene/DirtyPipe-Android
|
||
|
- https://github.com/readloud/Pentesting-Bible
|
||
|
- https://github.com/soosmile/POC
|
||
|
- https://github.com/souvik666/chrome0day
|
||
|
- https://github.com/ssr-111/linux-kernel-exploitation
|
||
|
- https://github.com/trhacknon/Pocingit
|
||
|
- https://github.com/vaginessa/CVE-2020-0041-Pixel-3a
|
||
|
- https://github.com/weeka10/-hktalent-TOP
|
||
|
- https://github.com/xairy/linux-kernel-exploitation
|
||
|
- https://github.com/yeyintminthuhtut/Awesome-Advanced-Windows-Exploitation-References
|
||
|
- https://github.com/yusufazizmustofa/BIBLE
|
||
|
|