Update CVE sources 2024-06-22 09:37

This commit is contained in:
0xMarcio 2024-06-22 09:37:59 +00:00
parent 8e70e07fb0
commit 6100550298
1723 changed files with 7114 additions and 624 deletions

View File

@ -16,6 +16,7 @@ No PoCs from references.
- https://github.com/0xPugal/One-Liners
- https://github.com/0xPugazh/One-Liners
- https://github.com/ARPSyndicate/kenzer-templates
- https://github.com/CVEDB/awesome-cve-repo
- https://github.com/Cappricio-Securities/CVE-2000-0114
- https://github.com/Live-Hack-CVE/CVE-2000-0114
- https://github.com/POORVAJA-195/Nuclei-Analysis-main

View File

@ -15,5 +15,6 @@ No PoCs from references.
#### Github
- https://github.com/ARPSyndicate/cvemon
- https://github.com/CVEDB/PoC-List
- https://github.com/CVEDB/awesome-cve-repo
- https://github.com/mike182/exploit

View File

@ -16,6 +16,8 @@ No PoCs from references.
- https://github.com/0xNVAN/win-iisadmin
- https://github.com/ARPSyndicate/cvemon
- https://github.com/CVEDB/PoC-List
- https://github.com/CVEDB/awesome-cve-repo
- https://github.com/Downgraderz/PoC-CVE-2000-0649
- https://github.com/JimboJimbabwe/HackGPTV2
- https://github.com/amtzespinosa/lord-of-the-root-walkthrough
- https://github.com/hanmin0512/Web-hacking-LAB

View File

@ -16,6 +16,7 @@ File and Print Sharing service in Windows 95, Windows 98, and Windows Me does no
- https://github.com/ARPSyndicate/cvemon
- https://github.com/Ascotbe/Kernelhub
- https://github.com/CVEDB/PoC-List
- https://github.com/CVEDB/awesome-cve-repo
- https://github.com/Cruxer8Mech/Idk
- https://github.com/Z6543/CVE-2000-0979
- https://github.com/ycdxsb/WindowsPrivilegeEscalation

View File

@ -18,6 +18,7 @@ wu-ftpd 2.6.1 allows remote attackers to execute arbitrary commands via a "~{" a
- https://github.com/Badbug6/EQGRP
- https://github.com/CKmaenn/EQGRP
- https://github.com/CVEDB/PoC-List
- https://github.com/CVEDB/awesome-cve-repo
- https://github.com/CybernetiX-S3C/EQGRP_Linux
- https://github.com/Drift-Security/Shadow_Brokers-Vs-NSA
- https://github.com/IHA114/EQGRP

View File

@ -15,4 +15,5 @@ No PoCs from references.
#### Github
- https://github.com/ARPSyndicate/cvemon
- https://github.com/CVEDB/PoC-List
- https://github.com/CVEDB/awesome-cve-repo

View File

@ -15,4 +15,5 @@ No PoCs from references.
#### Github
- https://github.com/ARPSyndicate/cvemon
- https://github.com/CVEDB/PoC-List
- https://github.com/CVEDB/awesome-cve-repo

View File

@ -15,4 +15,5 @@ Directory traversal vulnerability in Cooolsoft PowerFTP Server 2.03 allows attac
#### Github
- https://github.com/ARPSyndicate/cvemon
- https://github.com/CVEDB/PoC-List
- https://github.com/CVEDB/awesome-cve-repo

View File

@ -15,4 +15,5 @@ Buffer overflow in Cooolsoft PowerFTP Server 2.03 allows remote attackers to cau
#### Github
- https://github.com/ARPSyndicate/cvemon
- https://github.com/CVEDB/PoC-List
- https://github.com/CVEDB/awesome-cve-repo

View File

@ -15,4 +15,5 @@ Cooolsoft PowerFTP Server 2.03 allows remote attackers to list the contents of a
#### Github
- https://github.com/ARPSyndicate/cvemon
- https://github.com/CVEDB/PoC-List
- https://github.com/CVEDB/awesome-cve-repo

View File

@ -15,4 +15,5 @@ Cooolsoft PowerFTP Server 2.03 allows remote attackers to obtain the physical pa
#### Github
- https://github.com/ARPSyndicate/cvemon
- https://github.com/CVEDB/PoC-List
- https://github.com/CVEDB/awesome-cve-repo

View File

@ -15,4 +15,5 @@ No PoCs from references.
#### Github
- https://github.com/ARPSyndicate/cvemon
- https://github.com/CVEDB/PoC-List
- https://github.com/CVEDB/awesome-cve-repo

View File

@ -15,6 +15,7 @@ No PoCs from references.
#### Github
- https://github.com/0xget/cve-2001-1473
- https://github.com/ARPSyndicate/kenzer-templates
- https://github.com/CVEDB/awesome-cve-repo
- https://github.com/codine7/Hacking_Automated
- https://github.com/codine7/fox
- https://github.com/codine7/jungle

View File

@ -15,4 +15,5 @@ Cyberstop Web Server for Windows 0.1 allows remote attackers to cause a denial o
#### Github
- https://github.com/ARPSyndicate/cvemon
- https://github.com/CVEDB/PoC-List
- https://github.com/CVEDB/awesome-cve-repo

View File

@ -15,4 +15,5 @@ Cyberstop Web Server for Windows 0.1 allows remote attackers to cause a denial o
#### Github
- https://github.com/ARPSyndicate/cvemon
- https://github.com/CVEDB/PoC-List
- https://github.com/CVEDB/awesome-cve-repo

View File

@ -15,4 +15,5 @@ Directory traversal vulnerability in Phusion web server 1.0 allows remote attack
#### Github
- https://github.com/ARPSyndicate/cvemon
- https://github.com/CVEDB/PoC-List
- https://github.com/CVEDB/awesome-cve-repo

View File

@ -15,4 +15,5 @@ Buffer overflow in Phusion web server 1.0 allows remote attackers to cause a den
#### Github
- https://github.com/ARPSyndicate/cvemon
- https://github.com/CVEDB/PoC-List
- https://github.com/CVEDB/awesome-cve-repo

View File

@ -15,4 +15,5 @@ Cross-site scripting vulnerability in Cobalt RAQ 4 allows remote attackers to ex
#### Github
- https://github.com/ARPSyndicate/cvemon
- https://github.com/CVEDB/PoC-List
- https://github.com/CVEDB/awesome-cve-repo

View File

@ -15,4 +15,5 @@ Directory traversal vulnerability in Cobalt RAQ 4 allows remote attackers to rea
#### Github
- https://github.com/ARPSyndicate/cvemon
- https://github.com/CVEDB/PoC-List
- https://github.com/CVEDB/awesome-cve-repo

View File

@ -15,4 +15,5 @@ service.cgi in Cobalt RAQ 4 allows remote attackers to cause a denial of service
#### Github
- https://github.com/ARPSyndicate/cvemon
- https://github.com/CVEDB/PoC-List
- https://github.com/CVEDB/awesome-cve-repo

View File

@ -15,4 +15,5 @@ No PoCs from references.
#### Github
- https://github.com/ARPSyndicate/cvemon
- https://github.com/CVEDB/PoC-List
- https://github.com/CVEDB/awesome-cve-repo

View File

@ -15,4 +15,5 @@ No PoCs from references.
#### Github
- https://github.com/ARPSyndicate/cvemon
- https://github.com/CVEDB/PoC-List
- https://github.com/CVEDB/awesome-cve-repo

View File

@ -13,5 +13,6 @@ LabVIEW Web Server 5.1.1 through 6.1 allows remote attackers to cause a denial o
No PoCs from references.
#### Github
- https://github.com/CVEDB/awesome-cve-repo
- https://github.com/fauzanwijaya/CVE-2002-0748

View File

@ -15,4 +15,5 @@ No PoCs from references.
#### Github
- https://github.com/ARPSyndicate/cvemon
- https://github.com/CVEDB/PoC-List
- https://github.com/CVEDB/awesome-cve-repo

View File

@ -15,6 +15,7 @@ No PoCs from references.
#### Github
- https://github.com/ARPSyndicate/cvemon
- https://github.com/CVEDB/PoC-List
- https://github.com/CVEDB/awesome-cve-repo
- https://github.com/DrewSC13/Linpeas
- https://github.com/cedelasen/htb-laboratory
- https://github.com/chorankates/Irked

View File

@ -20,7 +20,9 @@ The Diffie-Hellman Key Agreement Protocol allows remote attackers (from the clie
#### Github
- https://github.com/ARPSyndicate/cvemon
- https://github.com/Balasys/dheater
- https://github.com/CVEDB/PoC-List
- https://github.com/CVEDB/awesome-cve-repo
- https://github.com/Live-Hack-CVE/CVE-2002-20001
- https://github.com/Live-Hack-CVE/CVE-2022-40735
- https://github.com/anquanscan/sec-tools

View File

@ -15,5 +15,6 @@ No PoCs from references.
#### Github
- https://github.com/ARPSyndicate/cvemon
- https://github.com/CVEDB/PoC-List
- https://github.com/CVEDB/awesome-cve-repo
- https://github.com/krdsploit/CVE-2002-2420

View File

@ -21,6 +21,7 @@ The do_mremap function for the mremap system call in Linux 2.2 to 2.2.25, 2.4 to
- https://github.com/C0dak/local-root-exploit-
- https://github.com/De4dCr0w/Linux-kernel-EoP-exp
- https://github.com/Feng4/linux-kernel-exploits
- https://github.com/HaxorSecInfec/autoroot.sh
- https://github.com/JlSakuya/Linux-Privilege-Escalation-Exploits
- https://github.com/Micr067/linux-kernel-exploits
- https://github.com/QChiLan/linux-exp
@ -59,6 +60,7 @@ The do_mremap function for the mremap system call in Linux 2.2 to 2.2.25, 2.4 to
- https://github.com/rakjong/LinuxElevation
- https://github.com/skbasava/Linux-Kernel-exploit
- https://github.com/ssr-111/linux-kernel-exploitation
- https://github.com/wkhnh06/linux-kernel-exploitation
- https://github.com/xairy/linux-kernel-exploitation
- https://github.com/xfinest/linux-kernel-exploits
- https://github.com/xssfile/linux-kernel-exploits

View File

@ -16,4 +16,5 @@ The Internet Printing Protocol (IPP) implementation in CUPS before 1.1.21 allows
- https://github.com/ARPSyndicate/cvemon
- https://github.com/CVEDB/PoC-List
- https://github.com/CVEDB/awesome-cve-repo
- https://github.com/fibonascii/CVE-2004-0558

View File

@ -20,6 +20,7 @@ Race condition in the (1) load_elf_library and (2) binfmt_aout function calls fo
- https://github.com/C0dak/local-root-exploit-
- https://github.com/De4dCr0w/Linux-kernel-EoP-exp
- https://github.com/Feng4/linux-kernel-exploits
- https://github.com/HaxorSecInfec/autoroot.sh
- https://github.com/JlSakuya/Linux-Privilege-Escalation-Exploits
- https://github.com/Micr067/linux-kernel-exploits
- https://github.com/QChiLan/linux-exp

View File

@ -20,6 +20,7 @@ Integer overflow in sys_epoll_wait in eventpoll.c for Linux kernel 2.6 to 2.6.11
- https://github.com/C0dak/local-root-exploit-
- https://github.com/De4dCr0w/Linux-kernel-EoP-exp
- https://github.com/Feng4/linux-kernel-exploits
- https://github.com/HaxorSecInfec/autoroot.sh
- https://github.com/JlSakuya/Linux-Privilege-Escalation-Exploits
- https://github.com/Micr067/linux-kernel-exploits
- https://github.com/QChiLan/linux-exp

View File

@ -19,6 +19,7 @@ The elf_core_dump function in binfmt_elf.c for Linux kernel 2.x.x to 2.2.27-rc2,
- https://github.com/C0dak/local-root-exploit-
- https://github.com/De4dCr0w/Linux-kernel-EoP-exp
- https://github.com/Feng4/linux-kernel-exploits
- https://github.com/HaxorSecInfec/autoroot.sh
- https://github.com/JlSakuya/Linux-Privilege-Escalation-Exploits
- https://github.com/Micr067/linux-kernel-exploits
- https://github.com/QChiLan/linux-exp

View File

@ -18,4 +18,5 @@ No PoCs from references.
- https://github.com/CVEDB/awesome-cve-repo
- https://github.com/InitRoot/CVE-2005-1794Scanner
- https://github.com/Ressurect0/fluffyLogic
- https://github.com/anvithalolla/Tesla_PenTest

View File

@ -22,6 +22,7 @@ Lotus Domino R5 and R6 WebMail, with "Generate HTML for all fields" enabled, sto
- https://github.com/POORVAJA-195/Nuclei-Analysis-main
- https://github.com/d4n-sec/d4n-sec.github.io
- https://github.com/gojhonny/Pentesting-Scripts
- https://github.com/jobroche/Pentesting-Scripts
- https://github.com/merlinepedra/nuclei-templates
- https://github.com/merlinepedra25/nuclei-templates
- https://github.com/schwankner/CVE-2005-2428-IBM-Lotus-Domino-R8-Password-Hash-Extraction-Exploit

View File

@ -10,6 +10,7 @@ Stack-based buffer overflow in Microsoft Publisher 2000 through 2003 allows user
### POC
#### Reference
- http://www.computerterrorism.com/research/ct12-09-2006-2.htm
- https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-054
#### Github

View File

@ -18,6 +18,7 @@ No PoCs from references.
- https://github.com/ByteXenon/IP-Security-Database
- https://github.com/CVEDB/PoC-List
- https://github.com/CVEDB/awesome-cve-repo
- https://github.com/EzeTauil/Maquina-Upload
- https://github.com/Live-Hack-CVE/CVE-2006-20001
- https://github.com/Saksham2002/CVE-2006-20001
- https://github.com/bioly230/THM_Skynet

View File

@ -20,6 +20,7 @@ No PoCs from references.
- https://github.com/C0dak/local-root-exploit-
- https://github.com/De4dCr0w/Linux-kernel-EoP-exp
- https://github.com/Feng4/linux-kernel-exploits
- https://github.com/HaxorSecInfec/autoroot.sh
- https://github.com/Jasut1n/CVE
- https://github.com/Jasut1n/c-exploits
- https://github.com/JlSakuya/Linux-Privilege-Escalation-Exploits

View File

@ -11,6 +11,7 @@ Buffer overflow in Adobe Flash Player 8.0.24.0 and earlier, Flash Professional 8
#### Reference
- http://securityreason.com/securityalert/1546
- http://www.computerterrorism.com/research/ct12-09-2006.htm
#### Github
No PoCs found on GitHub currently.

View File

@ -19,6 +19,7 @@ Race condition in Linux kernel 2.6.17.4 and earlier allows local users to gain r
- https://github.com/C0dak/local-root-exploit-
- https://github.com/De4dCr0w/Linux-kernel-EoP-exp
- https://github.com/Feng4/linux-kernel-exploits
- https://github.com/HaxorSecInfec/autoroot.sh
- https://github.com/JlSakuya/Linux-Privilege-Escalation-Exploits
- https://github.com/Micr067/linux-kernel-exploits
- https://github.com/QChiLan/linux-exp

View File

@ -10,6 +10,7 @@ Buffer overflow in the Advanced Search (Finder.exe) feature of Microsoft Outlook
### POC
#### Reference
- http://www.computerterrorism.com/research/ct09-01-2007.htm
- https://docs.microsoft.com/en-us/security-updates/securitybulletins/2007/ms07-003
#### Github

View File

@ -27,5 +27,6 @@ The IA32 system call emulation functionality in Linux kernel 2.4.x and 2.6.x bef
- https://github.com/ndk191/linux-kernel-exploitation
- https://github.com/skbasava/Linux-Kernel-exploit
- https://github.com/ssr-111/linux-kernel-exploitation
- https://github.com/wkhnh06/linux-kernel-exploitation
- https://github.com/xairy/linux-kernel-exploitation

View File

@ -27,5 +27,6 @@ No PoCs from references.
- https://github.com/ndk191/linux-kernel-exploitation
- https://github.com/skbasava/Linux-Kernel-exploit
- https://github.com/ssr-111/linux-kernel-exploitation
- https://github.com/wkhnh06/linux-kernel-exploitation
- https://github.com/xairy/linux-kernel-exploitation

View File

@ -27,5 +27,6 @@ The copy_from_user_mmap_sem function in fs/splice.c in the Linux kernel 2.6.22 t
- https://github.com/ndk191/linux-kernel-exploitation
- https://github.com/skbasava/Linux-Kernel-exploit
- https://github.com/ssr-111/linux-kernel-exploitation
- https://github.com/wkhnh06/linux-kernel-exploitation
- https://github.com/xairy/linux-kernel-exploitation

View File

@ -19,6 +19,7 @@ The vmsplice_to_pipe function in Linux kernel 2.6.17 through 2.6.24.1 does not v
- https://github.com/C0dak/local-root-exploit-
- https://github.com/De4dCr0w/Linux-kernel-EoP-exp
- https://github.com/Feng4/linux-kernel-exploits
- https://github.com/HaxorSecInfec/autoroot.sh
- https://github.com/JlSakuya/Linux-Privilege-Escalation-Exploits
- https://github.com/Micr067/linux-kernel-exploits
- https://github.com/QChiLan/linux-exp
@ -57,6 +58,7 @@ The vmsplice_to_pipe function in Linux kernel 2.6.17 through 2.6.24.1 does not v
- https://github.com/rakjong/LinuxElevation
- https://github.com/skbasava/Linux-Kernel-exploit
- https://github.com/ssr-111/linux-kernel-exploitation
- https://github.com/wkhnh06/linux-kernel-exploitation
- https://github.com/xairy/linux-kernel-exploitation
- https://github.com/xfinest/linux-kernel-exploits
- https://github.com/xssfile/linux-kernel-exploits

View File

@ -14,6 +14,7 @@ No PoCs from references.
#### Github
- https://github.com/Al1ex/LinuxEelvation
- https://github.com/HaxorSecInfec/autoroot.sh
- https://github.com/JlSakuya/Linux-Privilege-Escalation-Exploits
- https://github.com/Snoopy-Sec/Localroot-ALL-CVE
- https://github.com/fei9747/LinuxEelvation

View File

@ -19,6 +19,7 @@ fs/open.c in the Linux kernel before 2.6.22 does not properly strip setuid and s
- https://github.com/C0dak/local-root-exploit-
- https://github.com/De4dCr0w/Linux-kernel-EoP-exp
- https://github.com/Feng4/linux-kernel-exploits
- https://github.com/HaxorSecInfec/autoroot.sh
- https://github.com/JlSakuya/Linux-Privilege-Escalation-Exploits
- https://github.com/Micr067/linux-kernel-exploits
- https://github.com/QChiLan/linux-exp

View File

@ -27,5 +27,6 @@ No PoCs from references.
- https://github.com/ndk191/linux-kernel-exploitation
- https://github.com/skbasava/Linux-Kernel-exploit
- https://github.com/ssr-111/linux-kernel-exploitation
- https://github.com/wkhnh06/linux-kernel-exploitation
- https://github.com/xairy/linux-kernel-exploitation

View File

@ -27,5 +27,6 @@ No PoCs from references.
- https://github.com/ndk191/linux-kernel-exploitation
- https://github.com/skbasava/Linux-Kernel-exploit
- https://github.com/ssr-111/linux-kernel-exploitation
- https://github.com/wkhnh06/linux-kernel-exploitation
- https://github.com/xairy/linux-kernel-exploitation

View File

@ -20,6 +20,7 @@ udev before 1.4.1 does not verify whether a NETLINK message originates from kern
- https://github.com/C0dak/local-root-exploit-
- https://github.com/De4dCr0w/Linux-kernel-EoP-exp
- https://github.com/Feng4/linux-kernel-exploits
- https://github.com/HaxorSecInfec/autoroot.sh
- https://github.com/InteliSecureLabs/Linux_Exploit_Suggester
- https://github.com/JlSakuya/Linux-Privilege-Escalation-Exploits
- https://github.com/Micr067/linux-kernel-exploits

View File

@ -20,6 +20,7 @@ The exit_notify function in kernel/exit.c in the Linux kernel before 2.6.30-rc1
- https://github.com/C0dak/local-root-exploit-
- https://github.com/De4dCr0w/Linux-kernel-EoP-exp
- https://github.com/Feng4/linux-kernel-exploits
- https://github.com/HaxorSecInfec/autoroot.sh
- https://github.com/JlSakuya/Linux-Privilege-Escalation-Exploits
- https://github.com/Micr067/linux-kernel-exploits
- https://github.com/QChiLan/linux-exp

View File

@ -21,6 +21,7 @@ The Linux kernel 2.6.0 through 2.6.30.4, and 2.4.4 through 2.4.37.4, does not in
- https://github.com/CVEDB/awesome-cve-repo
- https://github.com/De4dCr0w/Linux-kernel-EoP-exp
- https://github.com/Feng4/linux-kernel-exploits
- https://github.com/HaxorSecInfec/autoroot.sh
- https://github.com/InteliSecureLabs/Linux_Exploit_Suggester
- https://github.com/JlSakuya/Linux-Privilege-Escalation-Exploits
- https://github.com/Micr067/linux-kernel-exploits
@ -71,6 +72,7 @@ The Linux kernel 2.6.0 through 2.6.30.4, and 2.4.4 through 2.4.37.4, does not in
- https://github.com/talent-x90c/cve_list
- https://github.com/tangsilian/android-vuln
- https://github.com/taviso/iknowthis
- https://github.com/wkhnh06/linux-kernel-exploitation
- https://github.com/x90hack/vulnerabilty_lab
- https://github.com/xairy/linux-kernel-exploitation
- https://github.com/xfinest/linux-kernel-exploits

View File

@ -23,6 +23,7 @@ The udp_sendmsg function in the UDP implementation in (1) net/ipv4/udp.c and (2)
- https://github.com/CVEDB/awesome-cve-repo
- https://github.com/De4dCr0w/Linux-kernel-EoP-exp
- https://github.com/Feng4/linux-kernel-exploits
- https://github.com/HaxorSecInfec/autoroot.sh
- https://github.com/JlSakuya/Linux-Privilege-Escalation-Exploits
- https://github.com/Micr067/linux-kernel-exploits
- https://github.com/QChiLan/linux-exp

View File

@ -27,5 +27,6 @@ No PoCs from references.
- https://github.com/ndk191/linux-kernel-exploitation
- https://github.com/skbasava/Linux-Kernel-exploit
- https://github.com/ssr-111/linux-kernel-exploitation
- https://github.com/wkhnh06/linux-kernel-exploitation
- https://github.com/xairy/linux-kernel-exploitation

View File

@ -27,5 +27,6 @@ No PoCs from references.
- https://github.com/ndk191/linux-kernel-exploitation
- https://github.com/skbasava/Linux-Kernel-exploit
- https://github.com/ssr-111/linux-kernel-exploitation
- https://github.com/wkhnh06/linux-kernel-exploitation
- https://github.com/xairy/linux-kernel-exploitation

View File

@ -19,6 +19,7 @@ Multiple race conditions in fs/pipe.c in the Linux kernel before 2.6.32-rc6 allo
- https://github.com/C0dak/local-root-exploit-
- https://github.com/De4dCr0w/Linux-kernel-EoP-exp
- https://github.com/Feng4/linux-kernel-exploits
- https://github.com/HaxorSecInfec/autoroot.sh
- https://github.com/InteliSecureLabs/Linux_Exploit_Suggester
- https://github.com/JlSakuya/Linux-Privilege-Escalation-Exploits
- https://github.com/Micr067/linux-kernel-exploits

17
2009/CVE-2009-3895.md Normal file
View File

@ -0,0 +1,17 @@
### [CVE-2009-3895](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3895)
![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=%3D%20n%2Fa%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen)
### Description
Heap-based buffer overflow in the exif_entry_fix function (aka the tag fixup routine) in libexif/exif-entry.c in libexif 0.6.18 allows remote attackers to cause a denial of service or possibly execute arbitrary code via an invalid EXIF image. NOTE: some of these details are obtained from third party information.
### POC
#### Reference
No PoCs from references.
#### Github
- https://github.com/ch1hyun/fuzzing-class

View File

@ -19,6 +19,7 @@ No PoCs from references.
- https://github.com/C0dak/local-root-exploit-
- https://github.com/De4dCr0w/Linux-kernel-EoP-exp
- https://github.com/Feng4/linux-kernel-exploits
- https://github.com/HaxorSecInfec/autoroot.sh
- https://github.com/InteliSecureLabs/Linux_Exploit_Suggester
- https://github.com/JlSakuya/Linux-Privilege-Escalation-Exploits
- https://github.com/Micr067/linux-kernel-exploits

View File

@ -26,5 +26,6 @@ The do_anonymous_page function in mm/memory.c in the Linux kernel before 2.6.27.
- https://github.com/knd06/linux-kernel-exploitation
- https://github.com/ndk191/linux-kernel-exploitation
- https://github.com/ssr-111/linux-kernel-exploitation
- https://github.com/wkhnh06/linux-kernel-exploitation
- https://github.com/xairy/linux-kernel-exploitation

View File

@ -16,6 +16,7 @@ Windows Shell in Microsoft Windows XP SP3, Server 2003 SP2, Vista SP1 and SP2, S
#### Github
- https://github.com/ARPSyndicate/cvemon
- https://github.com/Kuromesi/Py4CSKG
- https://github.com/MN439/bingduziyuan
- https://github.com/Ostorlab/KEV
- https://github.com/Ostorlab/known_exploited_vulnerbilities_detectors
- https://github.com/jisosomppi/pentesting

View File

@ -18,6 +18,7 @@ No PoCs from references.
- https://github.com/ThunderJie/CVE
- https://github.com/Zhouyi827/myblog
- https://github.com/amliaW4/amliaW4.github.io
- https://github.com/fangdada/ctf
- https://github.com/int0/pdfexplorer
- https://github.com/season-lab/rop-collection
- https://github.com/xinali/articles

View File

@ -27,6 +27,7 @@ No PoCs from references.
- https://github.com/DhivaKD/OSCP-Notes
- https://github.com/Elinpf/OSCP-survival-guide
- https://github.com/Feng4/linux-kernel-exploits
- https://github.com/HaxorSecInfec/autoroot.sh
- https://github.com/InteliSecureLabs/Linux_Exploit_Suggester
- https://github.com/JlSakuya/Linux-Privilege-Escalation-Exploits
- https://github.com/MLGBSec/os-survival
@ -102,6 +103,7 @@ No PoCs from references.
- https://github.com/spencerdodd/kernelpop
- https://github.com/ssr-111/linux-kernel-exploitation
- https://github.com/whackmanic/OSCP_Found
- https://github.com/wkhnh06/linux-kernel-exploitation
- https://github.com/xairy/linux-kernel-exploitation
- https://github.com/xfinest/linux-kernel-exploits
- https://github.com/xssfile/linux-kernel-exploits

View File

@ -27,5 +27,6 @@ No PoCs from references.
- https://github.com/ndk191/linux-kernel-exploitation
- https://github.com/skbasava/Linux-Kernel-exploit
- https://github.com/ssr-111/linux-kernel-exploitation
- https://github.com/wkhnh06/linux-kernel-exploitation
- https://github.com/xairy/linux-kernel-exploitation

View File

@ -20,6 +20,7 @@ The compat_alloc_user_space functions in include/asm/compat.h files in the Linux
- https://github.com/C0dak/local-root-exploit-
- https://github.com/De4dCr0w/Linux-kernel-EoP-exp
- https://github.com/Feng4/linux-kernel-exploits
- https://github.com/HaxorSecInfec/autoroot.sh
- https://github.com/InteliSecureLabs/Linux_Exploit_Suggester
- https://github.com/JlSakuya/Linux-Privilege-Escalation-Exploits
- https://github.com/Micr067/linux-kernel-exploits
@ -63,6 +64,7 @@ The compat_alloc_user_space functions in include/asm/compat.h files in the Linux
- https://github.com/ram4u/Linux_Exploit_Suggester
- https://github.com/skbasava/Linux-Kernel-exploit
- https://github.com/ssr-111/linux-kernel-exploitation
- https://github.com/wkhnh06/linux-kernel-exploitation
- https://github.com/xairy/linux-kernel-exploitation
- https://github.com/xfinest/linux-kernel-exploits
- https://github.com/xssfile/linux-kernel-exploits

View File

@ -20,6 +20,7 @@ The IA32 system call emulation functionality in arch/x86/ia32/ia32entry.S in the
- https://github.com/C0dak/local-root-exploit-
- https://github.com/De4dCr0w/Linux-kernel-EoP-exp
- https://github.com/Feng4/linux-kernel-exploits
- https://github.com/HaxorSecInfec/autoroot.sh
- https://github.com/InteliSecureLabs/Linux_Exploit_Suggester
- https://github.com/JlSakuya/Linux-Privilege-Escalation-Exploits
- https://github.com/Micr067/linux-kernel-exploits
@ -62,6 +63,7 @@ The IA32 system call emulation functionality in arch/x86/ia32/ia32entry.S in the
- https://github.com/ram4u/Linux_Exploit_Suggester
- https://github.com/skbasava/Linux-Kernel-exploit
- https://github.com/ssr-111/linux-kernel-exploitation
- https://github.com/wkhnh06/linux-kernel-exploitation
- https://github.com/xairy/linux-kernel-exploitation
- https://github.com/xfinest/linux-kernel-exploits
- https://github.com/xssfile/linux-kernel-exploits

View File

@ -30,6 +30,7 @@ No PoCs from references.
- https://github.com/doshyt/cve-monitor
- https://github.com/enthought/cve-search
- https://github.com/extremenetworks/cve-search-src
- https://github.com/fangdada/ctf
- https://github.com/jerfinj/cve-search
- https://github.com/miradam/cve-search
- https://github.com/pandazheng/Threat-Intelligence-Analyst

View File

@ -62,6 +62,7 @@ No PoCs from references.
- https://github.com/ram4u/Linux_Exploit_Suggester
- https://github.com/skbasava/Linux-Kernel-exploit
- https://github.com/ssr-111/linux-kernel-exploitation
- https://github.com/wkhnh06/linux-kernel-exploitation
- https://github.com/xairy/linux-kernel-exploitation
- https://github.com/xfinest/linux-kernel-exploits
- https://github.com/xssfile/linux-kernel-exploits

View File

@ -35,6 +35,7 @@ The rds_page_copy_user function in net/rds/page.c in the Reliable Datagram Socke
- https://github.com/Elinpf/OSCP-survival-guide
- https://github.com/Feng4/linux-kernel-exploits
- https://github.com/Gajasurve/The-Security-Handbook
- https://github.com/HaxorSecInfec/autoroot.sh
- https://github.com/JlSakuya/Linux-Privilege-Escalation-Exploits
- https://github.com/MLGBSec/os-survival
- https://github.com/Micr067/linux-kernel-exploits

View File

@ -21,6 +21,7 @@ The ipc subsystem in the Linux kernel before 2.6.37-rc1 does not initialize cert
- https://github.com/C0dak/local-root-exploit-
- https://github.com/De4dCr0w/Linux-kernel-EoP-exp
- https://github.com/Feng4/linux-kernel-exploits
- https://github.com/HaxorSecInfec/autoroot.sh
- https://github.com/InteliSecureLabs/Linux_Exploit_Suggester
- https://github.com/JlSakuya/Linux-Privilege-Escalation-Exploits
- https://github.com/Micr067/linux-kernel-exploits

View File

@ -21,6 +21,7 @@ The do_exit function in kernel/exit.c in the Linux kernel before 2.6.36.2 does n
- https://github.com/De4dCr0w/Linux-kernel-EoP-exp
- https://github.com/Feng4/linux-kernel-exploits
- https://github.com/HUSTSeclab/Kernel-Exploits
- https://github.com/HaxorSecInfec/autoroot.sh
- https://github.com/JlSakuya/Linux-Privilege-Escalation-Exploits
- https://github.com/Micr067/linux-kernel-exploits
- https://github.com/QChiLan/linux-exp
@ -65,6 +66,7 @@ The do_exit function in kernel/exit.c in the Linux kernel before 2.6.36.2 does n
- https://github.com/ssr-111/linux-kernel-exploitation
- https://github.com/tranquac/Linux-Privilege-Escalation
- https://github.com/usamaelshazly/Linux-Privilege-Escalation
- https://github.com/wkhnh06/linux-kernel-exploitation
- https://github.com/xairy/linux-kernel-exploitation
- https://github.com/xfinest/linux-kernel-exploits
- https://github.com/xssfile/linux-kernel-exploits

View File

@ -19,6 +19,7 @@ No PoCs from references.
- https://github.com/C0dak/local-root-exploit-
- https://github.com/De4dCr0w/Linux-kernel-EoP-exp
- https://github.com/Feng4/linux-kernel-exploits
- https://github.com/HaxorSecInfec/autoroot.sh
- https://github.com/InteliSecureLabs/Linux_Exploit_Suggester
- https://github.com/JlSakuya/Linux-Privilege-Escalation-Exploits
- https://github.com/Micr067/linux-kernel-exploits

View File

@ -14,6 +14,7 @@ No PoCs from references.
#### Github
- https://github.com/ARPSyndicate/cvemon
- https://github.com/cryptoquick/ossification
- https://github.com/uvhw/conchimgiangnang
- https://github.com/uvhw/wallet.cpp

View File

@ -15,5 +15,5 @@ The client in HP Data Protector does not properly validate EXEC_CMD arguments, w
- http://securityreason.com/securityalert/8329
#### Github
No PoCs found on GitHub currently.
- https://github.com/marcocarolasec/CVE-2016-2004-Exploit

View File

@ -27,5 +27,6 @@ No PoCs from references.
- https://github.com/ndk191/linux-kernel-exploitation
- https://github.com/skbasava/Linux-Kernel-exploit
- https://github.com/ssr-111/linux-kernel-exploitation
- https://github.com/wkhnh06/linux-kernel-exploitation
- https://github.com/xairy/linux-kernel-exploitation

View File

@ -71,6 +71,7 @@ vsftpd 2.3.4 downloaded between 20110630 and 20110703 contains a backdoor which
- https://github.com/shamsulchowdhury/Unit-16-Homework-Penetration-Testing1
- https://github.com/slxwzk/slxwzkBotnet
- https://github.com/sponkmonk/Ladon_english_update
- https://github.com/sug4r-wr41th/CVE-2011-2523
- https://github.com/sunzu94/vsftpd_2.3.4_Exploit
- https://github.com/tarikemal/exploit-ftp-samba
- https://github.com/thanawut2903/Port-21-tcp-vsftpd-2.3.4-exploit

View File

@ -36,6 +36,7 @@ No PoCs from references.
- https://github.com/garethr/snykout
- https://github.com/goharbor/pluggable-scanner-spec
- https://github.com/jnsgruk/trivy-cvss-tools
- https://github.com/m-pasima/CI-CD-Security-image-scan
- https://github.com/mauraneh/WIK-DPS-TP02
- https://github.com/sharmapravin1001/Kubernetes-cks
- https://github.com/siddharthraopotukuchi/trivy

View File

@ -40,6 +40,7 @@ The SSL protocol, as used in certain configurations in Microsoft Windows and Mic
- https://github.com/alexandrburyakov/Rep2
- https://github.com/alexgro1982/devops-netology
- https://github.com/bysart/devops-netology
- https://github.com/catsploit/catsploit
- https://github.com/cdupuis/image-api
- https://github.com/daniel1302/litecoin
- https://github.com/dmitrii1312/03-sysadmin-09

View File

@ -16,6 +16,7 @@ Unspecified vulnerability in the Java Runtime Environment component in Oracle Ja
#### Github
- https://github.com/20142995/Goby
- https://github.com/ARPSyndicate/cvemon
- https://github.com/CVEDB/awesome-cve-repo
- https://github.com/HimmelAward/Goby_POC
- https://github.com/MelanyRoob/Goby
- https://github.com/Z0fhack/Goby_POC

17
2011/CVE-2011-3730.md Normal file
View File

@ -0,0 +1,17 @@
### [CVE-2011-3730](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3730)
![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen)
### Description
Drupal 7.0 allows remote attackers to obtain sensitive information via a direct request to a .php file, which reveals the installation path in an error message, as demonstrated by modules/simpletest/tests/upgrade/drupal-6.upload.database.php and certain other files.
### POC
#### Reference
No PoCs from references.
#### Github
- https://github.com/catsploit/catsploit

View File

@ -18,5 +18,6 @@ Jetty 8.1.0.RC2 and earlier computes hash values for form parameters without res
#### Github
- https://github.com/Anonymous-Phunter/PHunter
- https://github.com/CGCL-codes/PHunter
- https://github.com/LibHunter/LibHunter
- https://github.com/javirodriguezzz/Shodan-Browser

View File

@ -14,6 +14,7 @@ Cross-site scripting (XSS) vulnerability in jQuery before 1.6.3, when using loca
#### Github
- https://github.com/FallibleInc/retirejslib
- https://github.com/catsploit/catsploit
- https://github.com/ctcpip/jquery-security
- https://github.com/eliasgranderubio/4depcheck

View File

@ -35,6 +35,7 @@ No PoCs from references.
- https://github.com/Elinpf/OSCP-survival-guide
- https://github.com/Feng4/linux-kernel-exploits
- https://github.com/Gajasurve/The-Security-Handbook
- https://github.com/HaxorSecInfec/autoroot.sh
- https://github.com/InteliSecureLabs/Linux_Exploit_Suggester
- https://github.com/JlSakuya/Linux-Privilege-Escalation-Exploits
- https://github.com/MLGBSec/os-survival
@ -141,6 +142,7 @@ No PoCs from references.
- https://github.com/tranquac/Linux-Privilege-Escalation
- https://github.com/usamaelshazly/Linux-Privilege-Escalation
- https://github.com/whackmanic/OSCP_Found
- https://github.com/wkhnh06/linux-kernel-exploitation
- https://github.com/xairy/linux-kernel-exploitation
- https://github.com/xcsrf/OSCP-PWK-Notes-Public
- https://github.com/xfinest/linux-kernel-exploits

View File

@ -28,6 +28,7 @@ The (1) ListView, (2) ListView2, (3) TreeView, and (4) TreeView2 ActiveX control
- https://github.com/amliaW4/amliaW4.github.io
- https://github.com/cnhouzi/APTNotes
- https://github.com/czq945659538/-study
- https://github.com/fangdada/ctf
- https://github.com/havocykp/Vulnerability-analysis
- https://github.com/helloandrewpaul/Mandiant---APT
- https://github.com/houjingyi233/office-exploit-case-study

View File

@ -38,9 +38,11 @@ No PoCs from references.
- https://github.com/Soundaryakambhampati/test-6
- https://github.com/Unix13/metasploitable2
- https://github.com/Vibragence/Dockersploit
- https://github.com/XiangDongCJC/CVE-2024-4577-PHP-CGI-RCE
- https://github.com/ajread4/cve_pull
- https://github.com/alex14324/Eagel
- https://github.com/beched/libpywebhack
- https://github.com/bl4cksku11/CVE-2024-4577
- https://github.com/cyberdeception/deepdig
- https://github.com/cyberharsh/PHP_CVE-2012-1823
- https://github.com/daai1/CVE-2012-1823

View File

@ -18,5 +18,6 @@ Algorithmic complexity vulnerability in the sorting algorithms in bzip2 compress
- https://github.com/Anonymous-Phunter/PHunter
- https://github.com/BrunoBonacci/lein-binplus
- https://github.com/CGCL-codes/PHunter
- https://github.com/LibHunter/LibHunter
- https://github.com/markus-wa/clj-bin

View File

@ -15,5 +15,6 @@ No PoCs from references.
#### Github
- https://github.com/ARPSyndicate/cvemon
- https://github.com/asur4s/fuzzing
- https://github.com/ch1hyun/fuzzing-class
- https://github.com/chiehw/fuzzing

View File

@ -28,6 +28,7 @@ file/show.cgi in Webmin 1.590 and earlier allows remote authenticated users to e
- https://github.com/Mithlonde/Mithlonde
- https://github.com/OstojaOfficial/CVE-2012-2982
- https://github.com/R00tendo/CVE-2012-2982
- https://github.com/Shadow-Spinner/CVE-2012-2982_python
- https://github.com/SlizBinksman/CVE_2012-2982
- https://github.com/Will-Banksy/My-Exploits
- https://github.com/alien-keric/webmin-v1.580-exploit

View File

@ -15,4 +15,5 @@ No PoCs from references.
#### Github
- https://github.com/ARPSyndicate/cvemon
- https://github.com/ferdinandmudjialim/metasploit-cve-search
- https://github.com/tunnelcat/metasploit-cve-search

View File

@ -62,6 +62,7 @@ The TLS protocol 1.2 and earlier, as used in Mozilla Firefox, Google Chrome, Qt,
- https://github.com/ilya-starchikov/devops-netology
- https://github.com/jselvi/docker-crime
- https://github.com/mohitrex7/Wap-Recon
- https://github.com/mpgn/CRIME-poc
- https://github.com/nikolay480/devops-netology
- https://github.com/nkiselyov/devops-netology
- https://github.com/paroteen/SecurEagle

View File

@ -13,5 +13,5 @@ tiki-featured_link.php in TikiWiki CMS/Groupware 8.3 allows remote attackers to
- http://st2tea.blogspot.com/2012/02/tiki-wiki-cms-groupware-frame-injection.html
#### Github
No PoCs found on GitHub currently.
- https://github.com/Cappricio-Securities/CVE-2012-5321

17
2012/CVE-2012-6664.md Normal file
View File

@ -0,0 +1,17 @@
### [CVE-2012-6664](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-6664)
![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen)
### Description
Multiple directory traversal vulnerabilities in the TFTP Server in Distinct Intranet Servers 3.10 and earlier allow remote attackers to read or write arbitrary files via a .. (dot dot) in the (1) get or (2) put commands.
### POC
#### Reference
- https://www.exploit-db.com/exploits/41714
#### Github
No PoCs found on GitHub currently.

View File

@ -17,6 +17,7 @@ jQuery before 1.9.0 is vulnerable to Cross-site Scripting (XSS) attacks. The jQu
#### Github
- https://github.com/ARPSyndicate/cvemon
- https://github.com/catdever/watchdog
- https://github.com/catsploit/catsploit
- https://github.com/ctcpip/jquery-security
- https://github.com/flipkart-incubator/watchdog
- https://github.com/rohankumardubey/watchdog

View File

@ -19,6 +19,7 @@ No PoCs from references.
- https://github.com/C0dak/local-root-exploit-
- https://github.com/De4dCr0w/Linux-kernel-EoP-exp
- https://github.com/Feng4/linux-kernel-exploits
- https://github.com/HaxorSecInfec/autoroot.sh
- https://github.com/JlSakuya/Linux-Privilege-Escalation-Exploits
- https://github.com/Micr067/linux-kernel-exploits
- https://github.com/QChiLan/linux-exp

View File

@ -21,6 +21,7 @@ Array index error in the __sock_diag_rcv_msg function in net/core/sock_diag.c in
- https://github.com/C0dak/local-root-exploit-
- https://github.com/De4dCr0w/Linux-kernel-EoP-exp
- https://github.com/Feng4/linux-kernel-exploits
- https://github.com/HaxorSecInfec/autoroot.sh
- https://github.com/JlSakuya/Linux-Privilege-Escalation-Exploits
- https://github.com/Micr067/linux-kernel-exploits
- https://github.com/QChiLan/linux-exp
@ -61,6 +62,7 @@ Array index error in the __sock_diag_rcv_msg function in net/core/sock_diag.c in
- https://github.com/rakjong/LinuxElevation
- https://github.com/skbasava/Linux-Kernel-exploit
- https://github.com/ssr-111/linux-kernel-exploitation
- https://github.com/wkhnh06/linux-kernel-exploitation
- https://github.com/xairy/linux-kernel-exploitation
- https://github.com/xfinest/linux-kernel-exploits
- https://github.com/xssfile/linux-kernel-exploits

View File

@ -18,6 +18,7 @@ The BrokerFactory functionality in Apache OpenJPA 1.x before 1.2.3 and 2.x befor
- https://github.com/BrittanyKuhn/javascript-tutorial
- https://github.com/CGCL-codes/PHunter
- https://github.com/GrrrDog/Java-Deserialization-Cheat-Sheet
- https://github.com/LibHunter/LibHunter
- https://github.com/PalindromeLabs/Java-Deserialization-CVEs
- https://github.com/klausware/Java-Deserialization-Cheat-Sheet
- https://github.com/mishmashclone/GrrrDog-Java-Deserialization-Cheat-Sheet

View File

@ -19,6 +19,7 @@ The clone system-call implementation in the Linux kernel before 3.8.3 does not p
- https://github.com/C0dak/local-root-exploit-
- https://github.com/De4dCr0w/Linux-kernel-EoP-exp
- https://github.com/Feng4/linux-kernel-exploits
- https://github.com/HaxorSecInfec/autoroot.sh
- https://github.com/JlSakuya/Linux-Privilege-Escalation-Exploits
- https://github.com/Micr067/linux-kernel-exploits
- https://github.com/QChiLan/linux-exp

View File

@ -13,5 +13,6 @@ kernel/user_namespace.c in the Linux kernel before 3.8.9 does not have appropria
- http://www.openwall.com/lists/oss-security/2013/04/29/1
#### Github
- https://github.com/HaxorSecInfec/autoroot.sh
- https://github.com/JlSakuya/Linux-Privilege-Escalation-Exploits

View File

@ -25,6 +25,7 @@ The perf_swevent_init function in kernel/events/core.c in the Linux kernel befor
- https://github.com/CVEDB/awesome-cve-repo
- https://github.com/De4dCr0w/Linux-kernel-EoP-exp
- https://github.com/Feng4/linux-kernel-exploits
- https://github.com/HaxorSecInfec/autoroot.sh
- https://github.com/I-Prashanth-S/CybersecurityTIFAC
- https://github.com/IMCG/awesome-c
- https://github.com/InteliSecureLabs/Linux_Exploit_Suggester
@ -96,6 +97,7 @@ The perf_swevent_init function in kernel/events/core.c in the Linux kernel befor
- https://github.com/timhsutw/cve-2013-2094
- https://github.com/vnik5287/CVE-2013-2094
- https://github.com/weeka10/-hktalent-TOP
- https://github.com/wkhnh06/linux-kernel-exploitation
- https://github.com/xairy/linux-kernel-exploitation
- https://github.com/xfinest/linux-kernel-exploits
- https://github.com/xssfile/linux-kernel-exploits

View File

@ -13,4 +13,5 @@ OpenText Exceed OnDemand (EoD) 8 uses weak encryption for passwords, which makes
- https://github.com/koto/exceed-mitm
#### Github
- https://github.com/koto/exceed-mitm

View File

@ -13,4 +13,5 @@ OpenText Exceed OnDemand (EoD) 8 allows man-in-the-middle attackers to disable b
- https://github.com/koto/exceed-mitm
#### Github
- https://github.com/koto/exceed-mitm

View File

@ -13,4 +13,5 @@ The client in OpenText Exceed OnDemand (EoD) 8 supports anonymous ciphers by def
- https://github.com/koto/exceed-mitm
#### Github
- https://github.com/koto/exceed-mitm

Some files were not shown because too many files have changed in this diff Show More