mirror of
https://github.com/0xMarcio/cve.git
synced 2025-05-05 10:17:57 +00:00
Update CVE sources 2024-06-22 09:37
This commit is contained in:
parent
8e70e07fb0
commit
6100550298
@ -16,6 +16,7 @@ No PoCs from references.
|
||||
- https://github.com/0xPugal/One-Liners
|
||||
- https://github.com/0xPugazh/One-Liners
|
||||
- https://github.com/ARPSyndicate/kenzer-templates
|
||||
- https://github.com/CVEDB/awesome-cve-repo
|
||||
- https://github.com/Cappricio-Securities/CVE-2000-0114
|
||||
- https://github.com/Live-Hack-CVE/CVE-2000-0114
|
||||
- https://github.com/POORVAJA-195/Nuclei-Analysis-main
|
||||
|
@ -15,5 +15,6 @@ No PoCs from references.
|
||||
#### Github
|
||||
- https://github.com/ARPSyndicate/cvemon
|
||||
- https://github.com/CVEDB/PoC-List
|
||||
- https://github.com/CVEDB/awesome-cve-repo
|
||||
- https://github.com/mike182/exploit
|
||||
|
||||
|
@ -16,6 +16,8 @@ No PoCs from references.
|
||||
- https://github.com/0xNVAN/win-iisadmin
|
||||
- https://github.com/ARPSyndicate/cvemon
|
||||
- https://github.com/CVEDB/PoC-List
|
||||
- https://github.com/CVEDB/awesome-cve-repo
|
||||
- https://github.com/Downgraderz/PoC-CVE-2000-0649
|
||||
- https://github.com/JimboJimbabwe/HackGPTV2
|
||||
- https://github.com/amtzespinosa/lord-of-the-root-walkthrough
|
||||
- https://github.com/hanmin0512/Web-hacking-LAB
|
||||
|
@ -16,6 +16,7 @@ File and Print Sharing service in Windows 95, Windows 98, and Windows Me does no
|
||||
- https://github.com/ARPSyndicate/cvemon
|
||||
- https://github.com/Ascotbe/Kernelhub
|
||||
- https://github.com/CVEDB/PoC-List
|
||||
- https://github.com/CVEDB/awesome-cve-repo
|
||||
- https://github.com/Cruxer8Mech/Idk
|
||||
- https://github.com/Z6543/CVE-2000-0979
|
||||
- https://github.com/ycdxsb/WindowsPrivilegeEscalation
|
||||
|
@ -18,6 +18,7 @@ wu-ftpd 2.6.1 allows remote attackers to execute arbitrary commands via a "~{" a
|
||||
- https://github.com/Badbug6/EQGRP
|
||||
- https://github.com/CKmaenn/EQGRP
|
||||
- https://github.com/CVEDB/PoC-List
|
||||
- https://github.com/CVEDB/awesome-cve-repo
|
||||
- https://github.com/CybernetiX-S3C/EQGRP_Linux
|
||||
- https://github.com/Drift-Security/Shadow_Brokers-Vs-NSA
|
||||
- https://github.com/IHA114/EQGRP
|
||||
|
@ -15,4 +15,5 @@ No PoCs from references.
|
||||
#### Github
|
||||
- https://github.com/ARPSyndicate/cvemon
|
||||
- https://github.com/CVEDB/PoC-List
|
||||
- https://github.com/CVEDB/awesome-cve-repo
|
||||
|
||||
|
@ -15,4 +15,5 @@ No PoCs from references.
|
||||
#### Github
|
||||
- https://github.com/ARPSyndicate/cvemon
|
||||
- https://github.com/CVEDB/PoC-List
|
||||
- https://github.com/CVEDB/awesome-cve-repo
|
||||
|
||||
|
@ -15,4 +15,5 @@ Directory traversal vulnerability in Cooolsoft PowerFTP Server 2.03 allows attac
|
||||
#### Github
|
||||
- https://github.com/ARPSyndicate/cvemon
|
||||
- https://github.com/CVEDB/PoC-List
|
||||
- https://github.com/CVEDB/awesome-cve-repo
|
||||
|
||||
|
@ -15,4 +15,5 @@ Buffer overflow in Cooolsoft PowerFTP Server 2.03 allows remote attackers to cau
|
||||
#### Github
|
||||
- https://github.com/ARPSyndicate/cvemon
|
||||
- https://github.com/CVEDB/PoC-List
|
||||
- https://github.com/CVEDB/awesome-cve-repo
|
||||
|
||||
|
@ -15,4 +15,5 @@ Cooolsoft PowerFTP Server 2.03 allows remote attackers to list the contents of a
|
||||
#### Github
|
||||
- https://github.com/ARPSyndicate/cvemon
|
||||
- https://github.com/CVEDB/PoC-List
|
||||
- https://github.com/CVEDB/awesome-cve-repo
|
||||
|
||||
|
@ -15,4 +15,5 @@ Cooolsoft PowerFTP Server 2.03 allows remote attackers to obtain the physical pa
|
||||
#### Github
|
||||
- https://github.com/ARPSyndicate/cvemon
|
||||
- https://github.com/CVEDB/PoC-List
|
||||
- https://github.com/CVEDB/awesome-cve-repo
|
||||
|
||||
|
@ -15,4 +15,5 @@ No PoCs from references.
|
||||
#### Github
|
||||
- https://github.com/ARPSyndicate/cvemon
|
||||
- https://github.com/CVEDB/PoC-List
|
||||
- https://github.com/CVEDB/awesome-cve-repo
|
||||
|
||||
|
@ -15,6 +15,7 @@ No PoCs from references.
|
||||
#### Github
|
||||
- https://github.com/0xget/cve-2001-1473
|
||||
- https://github.com/ARPSyndicate/kenzer-templates
|
||||
- https://github.com/CVEDB/awesome-cve-repo
|
||||
- https://github.com/codine7/Hacking_Automated
|
||||
- https://github.com/codine7/fox
|
||||
- https://github.com/codine7/jungle
|
||||
|
@ -15,4 +15,5 @@ Cyberstop Web Server for Windows 0.1 allows remote attackers to cause a denial o
|
||||
#### Github
|
||||
- https://github.com/ARPSyndicate/cvemon
|
||||
- https://github.com/CVEDB/PoC-List
|
||||
- https://github.com/CVEDB/awesome-cve-repo
|
||||
|
||||
|
@ -15,4 +15,5 @@ Cyberstop Web Server for Windows 0.1 allows remote attackers to cause a denial o
|
||||
#### Github
|
||||
- https://github.com/ARPSyndicate/cvemon
|
||||
- https://github.com/CVEDB/PoC-List
|
||||
- https://github.com/CVEDB/awesome-cve-repo
|
||||
|
||||
|
@ -15,4 +15,5 @@ Directory traversal vulnerability in Phusion web server 1.0 allows remote attack
|
||||
#### Github
|
||||
- https://github.com/ARPSyndicate/cvemon
|
||||
- https://github.com/CVEDB/PoC-List
|
||||
- https://github.com/CVEDB/awesome-cve-repo
|
||||
|
||||
|
@ -15,4 +15,5 @@ Buffer overflow in Phusion web server 1.0 allows remote attackers to cause a den
|
||||
#### Github
|
||||
- https://github.com/ARPSyndicate/cvemon
|
||||
- https://github.com/CVEDB/PoC-List
|
||||
- https://github.com/CVEDB/awesome-cve-repo
|
||||
|
||||
|
@ -15,4 +15,5 @@ Cross-site scripting vulnerability in Cobalt RAQ 4 allows remote attackers to ex
|
||||
#### Github
|
||||
- https://github.com/ARPSyndicate/cvemon
|
||||
- https://github.com/CVEDB/PoC-List
|
||||
- https://github.com/CVEDB/awesome-cve-repo
|
||||
|
||||
|
@ -15,4 +15,5 @@ Directory traversal vulnerability in Cobalt RAQ 4 allows remote attackers to rea
|
||||
#### Github
|
||||
- https://github.com/ARPSyndicate/cvemon
|
||||
- https://github.com/CVEDB/PoC-List
|
||||
- https://github.com/CVEDB/awesome-cve-repo
|
||||
|
||||
|
@ -15,4 +15,5 @@ service.cgi in Cobalt RAQ 4 allows remote attackers to cause a denial of service
|
||||
#### Github
|
||||
- https://github.com/ARPSyndicate/cvemon
|
||||
- https://github.com/CVEDB/PoC-List
|
||||
- https://github.com/CVEDB/awesome-cve-repo
|
||||
|
||||
|
@ -15,4 +15,5 @@ No PoCs from references.
|
||||
#### Github
|
||||
- https://github.com/ARPSyndicate/cvemon
|
||||
- https://github.com/CVEDB/PoC-List
|
||||
- https://github.com/CVEDB/awesome-cve-repo
|
||||
|
||||
|
@ -15,4 +15,5 @@ No PoCs from references.
|
||||
#### Github
|
||||
- https://github.com/ARPSyndicate/cvemon
|
||||
- https://github.com/CVEDB/PoC-List
|
||||
- https://github.com/CVEDB/awesome-cve-repo
|
||||
|
||||
|
@ -13,5 +13,6 @@ LabVIEW Web Server 5.1.1 through 6.1 allows remote attackers to cause a denial o
|
||||
No PoCs from references.
|
||||
|
||||
#### Github
|
||||
- https://github.com/CVEDB/awesome-cve-repo
|
||||
- https://github.com/fauzanwijaya/CVE-2002-0748
|
||||
|
||||
|
@ -15,4 +15,5 @@ No PoCs from references.
|
||||
#### Github
|
||||
- https://github.com/ARPSyndicate/cvemon
|
||||
- https://github.com/CVEDB/PoC-List
|
||||
- https://github.com/CVEDB/awesome-cve-repo
|
||||
|
||||
|
@ -15,6 +15,7 @@ No PoCs from references.
|
||||
#### Github
|
||||
- https://github.com/ARPSyndicate/cvemon
|
||||
- https://github.com/CVEDB/PoC-List
|
||||
- https://github.com/CVEDB/awesome-cve-repo
|
||||
- https://github.com/DrewSC13/Linpeas
|
||||
- https://github.com/cedelasen/htb-laboratory
|
||||
- https://github.com/chorankates/Irked
|
||||
|
@ -20,7 +20,9 @@ The Diffie-Hellman Key Agreement Protocol allows remote attackers (from the clie
|
||||
|
||||
#### Github
|
||||
- https://github.com/ARPSyndicate/cvemon
|
||||
- https://github.com/Balasys/dheater
|
||||
- https://github.com/CVEDB/PoC-List
|
||||
- https://github.com/CVEDB/awesome-cve-repo
|
||||
- https://github.com/Live-Hack-CVE/CVE-2002-20001
|
||||
- https://github.com/Live-Hack-CVE/CVE-2022-40735
|
||||
- https://github.com/anquanscan/sec-tools
|
||||
|
@ -15,5 +15,6 @@ No PoCs from references.
|
||||
#### Github
|
||||
- https://github.com/ARPSyndicate/cvemon
|
||||
- https://github.com/CVEDB/PoC-List
|
||||
- https://github.com/CVEDB/awesome-cve-repo
|
||||
- https://github.com/krdsploit/CVE-2002-2420
|
||||
|
||||
|
@ -21,6 +21,7 @@ The do_mremap function for the mremap system call in Linux 2.2 to 2.2.25, 2.4 to
|
||||
- https://github.com/C0dak/local-root-exploit-
|
||||
- https://github.com/De4dCr0w/Linux-kernel-EoP-exp
|
||||
- https://github.com/Feng4/linux-kernel-exploits
|
||||
- https://github.com/HaxorSecInfec/autoroot.sh
|
||||
- https://github.com/JlSakuya/Linux-Privilege-Escalation-Exploits
|
||||
- https://github.com/Micr067/linux-kernel-exploits
|
||||
- https://github.com/QChiLan/linux-exp
|
||||
@ -59,6 +60,7 @@ The do_mremap function for the mremap system call in Linux 2.2 to 2.2.25, 2.4 to
|
||||
- https://github.com/rakjong/LinuxElevation
|
||||
- https://github.com/skbasava/Linux-Kernel-exploit
|
||||
- https://github.com/ssr-111/linux-kernel-exploitation
|
||||
- https://github.com/wkhnh06/linux-kernel-exploitation
|
||||
- https://github.com/xairy/linux-kernel-exploitation
|
||||
- https://github.com/xfinest/linux-kernel-exploits
|
||||
- https://github.com/xssfile/linux-kernel-exploits
|
||||
|
@ -16,4 +16,5 @@ The Internet Printing Protocol (IPP) implementation in CUPS before 1.1.21 allows
|
||||
- https://github.com/ARPSyndicate/cvemon
|
||||
- https://github.com/CVEDB/PoC-List
|
||||
- https://github.com/CVEDB/awesome-cve-repo
|
||||
- https://github.com/fibonascii/CVE-2004-0558
|
||||
|
||||
|
@ -20,6 +20,7 @@ Race condition in the (1) load_elf_library and (2) binfmt_aout function calls fo
|
||||
- https://github.com/C0dak/local-root-exploit-
|
||||
- https://github.com/De4dCr0w/Linux-kernel-EoP-exp
|
||||
- https://github.com/Feng4/linux-kernel-exploits
|
||||
- https://github.com/HaxorSecInfec/autoroot.sh
|
||||
- https://github.com/JlSakuya/Linux-Privilege-Escalation-Exploits
|
||||
- https://github.com/Micr067/linux-kernel-exploits
|
||||
- https://github.com/QChiLan/linux-exp
|
||||
|
@ -20,6 +20,7 @@ Integer overflow in sys_epoll_wait in eventpoll.c for Linux kernel 2.6 to 2.6.11
|
||||
- https://github.com/C0dak/local-root-exploit-
|
||||
- https://github.com/De4dCr0w/Linux-kernel-EoP-exp
|
||||
- https://github.com/Feng4/linux-kernel-exploits
|
||||
- https://github.com/HaxorSecInfec/autoroot.sh
|
||||
- https://github.com/JlSakuya/Linux-Privilege-Escalation-Exploits
|
||||
- https://github.com/Micr067/linux-kernel-exploits
|
||||
- https://github.com/QChiLan/linux-exp
|
||||
|
@ -19,6 +19,7 @@ The elf_core_dump function in binfmt_elf.c for Linux kernel 2.x.x to 2.2.27-rc2,
|
||||
- https://github.com/C0dak/local-root-exploit-
|
||||
- https://github.com/De4dCr0w/Linux-kernel-EoP-exp
|
||||
- https://github.com/Feng4/linux-kernel-exploits
|
||||
- https://github.com/HaxorSecInfec/autoroot.sh
|
||||
- https://github.com/JlSakuya/Linux-Privilege-Escalation-Exploits
|
||||
- https://github.com/Micr067/linux-kernel-exploits
|
||||
- https://github.com/QChiLan/linux-exp
|
||||
|
@ -18,4 +18,5 @@ No PoCs from references.
|
||||
- https://github.com/CVEDB/awesome-cve-repo
|
||||
- https://github.com/InitRoot/CVE-2005-1794Scanner
|
||||
- https://github.com/Ressurect0/fluffyLogic
|
||||
- https://github.com/anvithalolla/Tesla_PenTest
|
||||
|
||||
|
@ -22,6 +22,7 @@ Lotus Domino R5 and R6 WebMail, with "Generate HTML for all fields" enabled, sto
|
||||
- https://github.com/POORVAJA-195/Nuclei-Analysis-main
|
||||
- https://github.com/d4n-sec/d4n-sec.github.io
|
||||
- https://github.com/gojhonny/Pentesting-Scripts
|
||||
- https://github.com/jobroche/Pentesting-Scripts
|
||||
- https://github.com/merlinepedra/nuclei-templates
|
||||
- https://github.com/merlinepedra25/nuclei-templates
|
||||
- https://github.com/schwankner/CVE-2005-2428-IBM-Lotus-Domino-R8-Password-Hash-Extraction-Exploit
|
||||
|
@ -10,6 +10,7 @@ Stack-based buffer overflow in Microsoft Publisher 2000 through 2003 allows user
|
||||
### POC
|
||||
|
||||
#### Reference
|
||||
- http://www.computerterrorism.com/research/ct12-09-2006-2.htm
|
||||
- https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-054
|
||||
|
||||
#### Github
|
||||
|
@ -18,6 +18,7 @@ No PoCs from references.
|
||||
- https://github.com/ByteXenon/IP-Security-Database
|
||||
- https://github.com/CVEDB/PoC-List
|
||||
- https://github.com/CVEDB/awesome-cve-repo
|
||||
- https://github.com/EzeTauil/Maquina-Upload
|
||||
- https://github.com/Live-Hack-CVE/CVE-2006-20001
|
||||
- https://github.com/Saksham2002/CVE-2006-20001
|
||||
- https://github.com/bioly230/THM_Skynet
|
||||
|
@ -20,6 +20,7 @@ No PoCs from references.
|
||||
- https://github.com/C0dak/local-root-exploit-
|
||||
- https://github.com/De4dCr0w/Linux-kernel-EoP-exp
|
||||
- https://github.com/Feng4/linux-kernel-exploits
|
||||
- https://github.com/HaxorSecInfec/autoroot.sh
|
||||
- https://github.com/Jasut1n/CVE
|
||||
- https://github.com/Jasut1n/c-exploits
|
||||
- https://github.com/JlSakuya/Linux-Privilege-Escalation-Exploits
|
||||
|
@ -11,6 +11,7 @@ Buffer overflow in Adobe Flash Player 8.0.24.0 and earlier, Flash Professional 8
|
||||
|
||||
#### Reference
|
||||
- http://securityreason.com/securityalert/1546
|
||||
- http://www.computerterrorism.com/research/ct12-09-2006.htm
|
||||
|
||||
#### Github
|
||||
No PoCs found on GitHub currently.
|
||||
|
@ -19,6 +19,7 @@ Race condition in Linux kernel 2.6.17.4 and earlier allows local users to gain r
|
||||
- https://github.com/C0dak/local-root-exploit-
|
||||
- https://github.com/De4dCr0w/Linux-kernel-EoP-exp
|
||||
- https://github.com/Feng4/linux-kernel-exploits
|
||||
- https://github.com/HaxorSecInfec/autoroot.sh
|
||||
- https://github.com/JlSakuya/Linux-Privilege-Escalation-Exploits
|
||||
- https://github.com/Micr067/linux-kernel-exploits
|
||||
- https://github.com/QChiLan/linux-exp
|
||||
|
@ -10,6 +10,7 @@ Buffer overflow in the Advanced Search (Finder.exe) feature of Microsoft Outlook
|
||||
### POC
|
||||
|
||||
#### Reference
|
||||
- http://www.computerterrorism.com/research/ct09-01-2007.htm
|
||||
- https://docs.microsoft.com/en-us/security-updates/securitybulletins/2007/ms07-003
|
||||
|
||||
#### Github
|
||||
|
@ -27,5 +27,6 @@ The IA32 system call emulation functionality in Linux kernel 2.4.x and 2.6.x bef
|
||||
- https://github.com/ndk191/linux-kernel-exploitation
|
||||
- https://github.com/skbasava/Linux-Kernel-exploit
|
||||
- https://github.com/ssr-111/linux-kernel-exploitation
|
||||
- https://github.com/wkhnh06/linux-kernel-exploitation
|
||||
- https://github.com/xairy/linux-kernel-exploitation
|
||||
|
||||
|
@ -27,5 +27,6 @@ No PoCs from references.
|
||||
- https://github.com/ndk191/linux-kernel-exploitation
|
||||
- https://github.com/skbasava/Linux-Kernel-exploit
|
||||
- https://github.com/ssr-111/linux-kernel-exploitation
|
||||
- https://github.com/wkhnh06/linux-kernel-exploitation
|
||||
- https://github.com/xairy/linux-kernel-exploitation
|
||||
|
||||
|
@ -27,5 +27,6 @@ The copy_from_user_mmap_sem function in fs/splice.c in the Linux kernel 2.6.22 t
|
||||
- https://github.com/ndk191/linux-kernel-exploitation
|
||||
- https://github.com/skbasava/Linux-Kernel-exploit
|
||||
- https://github.com/ssr-111/linux-kernel-exploitation
|
||||
- https://github.com/wkhnh06/linux-kernel-exploitation
|
||||
- https://github.com/xairy/linux-kernel-exploitation
|
||||
|
||||
|
@ -19,6 +19,7 @@ The vmsplice_to_pipe function in Linux kernel 2.6.17 through 2.6.24.1 does not v
|
||||
- https://github.com/C0dak/local-root-exploit-
|
||||
- https://github.com/De4dCr0w/Linux-kernel-EoP-exp
|
||||
- https://github.com/Feng4/linux-kernel-exploits
|
||||
- https://github.com/HaxorSecInfec/autoroot.sh
|
||||
- https://github.com/JlSakuya/Linux-Privilege-Escalation-Exploits
|
||||
- https://github.com/Micr067/linux-kernel-exploits
|
||||
- https://github.com/QChiLan/linux-exp
|
||||
@ -57,6 +58,7 @@ The vmsplice_to_pipe function in Linux kernel 2.6.17 through 2.6.24.1 does not v
|
||||
- https://github.com/rakjong/LinuxElevation
|
||||
- https://github.com/skbasava/Linux-Kernel-exploit
|
||||
- https://github.com/ssr-111/linux-kernel-exploitation
|
||||
- https://github.com/wkhnh06/linux-kernel-exploitation
|
||||
- https://github.com/xairy/linux-kernel-exploitation
|
||||
- https://github.com/xfinest/linux-kernel-exploits
|
||||
- https://github.com/xssfile/linux-kernel-exploits
|
||||
|
@ -14,6 +14,7 @@ No PoCs from references.
|
||||
|
||||
#### Github
|
||||
- https://github.com/Al1ex/LinuxEelvation
|
||||
- https://github.com/HaxorSecInfec/autoroot.sh
|
||||
- https://github.com/JlSakuya/Linux-Privilege-Escalation-Exploits
|
||||
- https://github.com/Snoopy-Sec/Localroot-ALL-CVE
|
||||
- https://github.com/fei9747/LinuxEelvation
|
||||
|
@ -19,6 +19,7 @@ fs/open.c in the Linux kernel before 2.6.22 does not properly strip setuid and s
|
||||
- https://github.com/C0dak/local-root-exploit-
|
||||
- https://github.com/De4dCr0w/Linux-kernel-EoP-exp
|
||||
- https://github.com/Feng4/linux-kernel-exploits
|
||||
- https://github.com/HaxorSecInfec/autoroot.sh
|
||||
- https://github.com/JlSakuya/Linux-Privilege-Escalation-Exploits
|
||||
- https://github.com/Micr067/linux-kernel-exploits
|
||||
- https://github.com/QChiLan/linux-exp
|
||||
|
@ -27,5 +27,6 @@ No PoCs from references.
|
||||
- https://github.com/ndk191/linux-kernel-exploitation
|
||||
- https://github.com/skbasava/Linux-Kernel-exploit
|
||||
- https://github.com/ssr-111/linux-kernel-exploitation
|
||||
- https://github.com/wkhnh06/linux-kernel-exploitation
|
||||
- https://github.com/xairy/linux-kernel-exploitation
|
||||
|
||||
|
@ -27,5 +27,6 @@ No PoCs from references.
|
||||
- https://github.com/ndk191/linux-kernel-exploitation
|
||||
- https://github.com/skbasava/Linux-Kernel-exploit
|
||||
- https://github.com/ssr-111/linux-kernel-exploitation
|
||||
- https://github.com/wkhnh06/linux-kernel-exploitation
|
||||
- https://github.com/xairy/linux-kernel-exploitation
|
||||
|
||||
|
@ -20,6 +20,7 @@ udev before 1.4.1 does not verify whether a NETLINK message originates from kern
|
||||
- https://github.com/C0dak/local-root-exploit-
|
||||
- https://github.com/De4dCr0w/Linux-kernel-EoP-exp
|
||||
- https://github.com/Feng4/linux-kernel-exploits
|
||||
- https://github.com/HaxorSecInfec/autoroot.sh
|
||||
- https://github.com/InteliSecureLabs/Linux_Exploit_Suggester
|
||||
- https://github.com/JlSakuya/Linux-Privilege-Escalation-Exploits
|
||||
- https://github.com/Micr067/linux-kernel-exploits
|
||||
|
@ -20,6 +20,7 @@ The exit_notify function in kernel/exit.c in the Linux kernel before 2.6.30-rc1
|
||||
- https://github.com/C0dak/local-root-exploit-
|
||||
- https://github.com/De4dCr0w/Linux-kernel-EoP-exp
|
||||
- https://github.com/Feng4/linux-kernel-exploits
|
||||
- https://github.com/HaxorSecInfec/autoroot.sh
|
||||
- https://github.com/JlSakuya/Linux-Privilege-Escalation-Exploits
|
||||
- https://github.com/Micr067/linux-kernel-exploits
|
||||
- https://github.com/QChiLan/linux-exp
|
||||
|
@ -21,6 +21,7 @@ The Linux kernel 2.6.0 through 2.6.30.4, and 2.4.4 through 2.4.37.4, does not in
|
||||
- https://github.com/CVEDB/awesome-cve-repo
|
||||
- https://github.com/De4dCr0w/Linux-kernel-EoP-exp
|
||||
- https://github.com/Feng4/linux-kernel-exploits
|
||||
- https://github.com/HaxorSecInfec/autoroot.sh
|
||||
- https://github.com/InteliSecureLabs/Linux_Exploit_Suggester
|
||||
- https://github.com/JlSakuya/Linux-Privilege-Escalation-Exploits
|
||||
- https://github.com/Micr067/linux-kernel-exploits
|
||||
@ -71,6 +72,7 @@ The Linux kernel 2.6.0 through 2.6.30.4, and 2.4.4 through 2.4.37.4, does not in
|
||||
- https://github.com/talent-x90c/cve_list
|
||||
- https://github.com/tangsilian/android-vuln
|
||||
- https://github.com/taviso/iknowthis
|
||||
- https://github.com/wkhnh06/linux-kernel-exploitation
|
||||
- https://github.com/x90hack/vulnerabilty_lab
|
||||
- https://github.com/xairy/linux-kernel-exploitation
|
||||
- https://github.com/xfinest/linux-kernel-exploits
|
||||
|
@ -23,6 +23,7 @@ The udp_sendmsg function in the UDP implementation in (1) net/ipv4/udp.c and (2)
|
||||
- https://github.com/CVEDB/awesome-cve-repo
|
||||
- https://github.com/De4dCr0w/Linux-kernel-EoP-exp
|
||||
- https://github.com/Feng4/linux-kernel-exploits
|
||||
- https://github.com/HaxorSecInfec/autoroot.sh
|
||||
- https://github.com/JlSakuya/Linux-Privilege-Escalation-Exploits
|
||||
- https://github.com/Micr067/linux-kernel-exploits
|
||||
- https://github.com/QChiLan/linux-exp
|
||||
|
@ -27,5 +27,6 @@ No PoCs from references.
|
||||
- https://github.com/ndk191/linux-kernel-exploitation
|
||||
- https://github.com/skbasava/Linux-Kernel-exploit
|
||||
- https://github.com/ssr-111/linux-kernel-exploitation
|
||||
- https://github.com/wkhnh06/linux-kernel-exploitation
|
||||
- https://github.com/xairy/linux-kernel-exploitation
|
||||
|
||||
|
@ -27,5 +27,6 @@ No PoCs from references.
|
||||
- https://github.com/ndk191/linux-kernel-exploitation
|
||||
- https://github.com/skbasava/Linux-Kernel-exploit
|
||||
- https://github.com/ssr-111/linux-kernel-exploitation
|
||||
- https://github.com/wkhnh06/linux-kernel-exploitation
|
||||
- https://github.com/xairy/linux-kernel-exploitation
|
||||
|
||||
|
@ -19,6 +19,7 @@ Multiple race conditions in fs/pipe.c in the Linux kernel before 2.6.32-rc6 allo
|
||||
- https://github.com/C0dak/local-root-exploit-
|
||||
- https://github.com/De4dCr0w/Linux-kernel-EoP-exp
|
||||
- https://github.com/Feng4/linux-kernel-exploits
|
||||
- https://github.com/HaxorSecInfec/autoroot.sh
|
||||
- https://github.com/InteliSecureLabs/Linux_Exploit_Suggester
|
||||
- https://github.com/JlSakuya/Linux-Privilege-Escalation-Exploits
|
||||
- https://github.com/Micr067/linux-kernel-exploits
|
||||
|
17
2009/CVE-2009-3895.md
Normal file
17
2009/CVE-2009-3895.md
Normal file
@ -0,0 +1,17 @@
|
||||
### [CVE-2009-3895](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3895)
|
||||

|
||||

|
||||

|
||||
|
||||
### Description
|
||||
|
||||
Heap-based buffer overflow in the exif_entry_fix function (aka the tag fixup routine) in libexif/exif-entry.c in libexif 0.6.18 allows remote attackers to cause a denial of service or possibly execute arbitrary code via an invalid EXIF image. NOTE: some of these details are obtained from third party information.
|
||||
|
||||
### POC
|
||||
|
||||
#### Reference
|
||||
No PoCs from references.
|
||||
|
||||
#### Github
|
||||
- https://github.com/ch1hyun/fuzzing-class
|
||||
|
@ -19,6 +19,7 @@ No PoCs from references.
|
||||
- https://github.com/C0dak/local-root-exploit-
|
||||
- https://github.com/De4dCr0w/Linux-kernel-EoP-exp
|
||||
- https://github.com/Feng4/linux-kernel-exploits
|
||||
- https://github.com/HaxorSecInfec/autoroot.sh
|
||||
- https://github.com/InteliSecureLabs/Linux_Exploit_Suggester
|
||||
- https://github.com/JlSakuya/Linux-Privilege-Escalation-Exploits
|
||||
- https://github.com/Micr067/linux-kernel-exploits
|
||||
|
@ -26,5 +26,6 @@ The do_anonymous_page function in mm/memory.c in the Linux kernel before 2.6.27.
|
||||
- https://github.com/knd06/linux-kernel-exploitation
|
||||
- https://github.com/ndk191/linux-kernel-exploitation
|
||||
- https://github.com/ssr-111/linux-kernel-exploitation
|
||||
- https://github.com/wkhnh06/linux-kernel-exploitation
|
||||
- https://github.com/xairy/linux-kernel-exploitation
|
||||
|
||||
|
@ -16,6 +16,7 @@ Windows Shell in Microsoft Windows XP SP3, Server 2003 SP2, Vista SP1 and SP2, S
|
||||
#### Github
|
||||
- https://github.com/ARPSyndicate/cvemon
|
||||
- https://github.com/Kuromesi/Py4CSKG
|
||||
- https://github.com/MN439/bingduziyuan
|
||||
- https://github.com/Ostorlab/KEV
|
||||
- https://github.com/Ostorlab/known_exploited_vulnerbilities_detectors
|
||||
- https://github.com/jisosomppi/pentesting
|
||||
|
@ -18,6 +18,7 @@ No PoCs from references.
|
||||
- https://github.com/ThunderJie/CVE
|
||||
- https://github.com/Zhouyi827/myblog
|
||||
- https://github.com/amliaW4/amliaW4.github.io
|
||||
- https://github.com/fangdada/ctf
|
||||
- https://github.com/int0/pdfexplorer
|
||||
- https://github.com/season-lab/rop-collection
|
||||
- https://github.com/xinali/articles
|
||||
|
@ -27,6 +27,7 @@ No PoCs from references.
|
||||
- https://github.com/DhivaKD/OSCP-Notes
|
||||
- https://github.com/Elinpf/OSCP-survival-guide
|
||||
- https://github.com/Feng4/linux-kernel-exploits
|
||||
- https://github.com/HaxorSecInfec/autoroot.sh
|
||||
- https://github.com/InteliSecureLabs/Linux_Exploit_Suggester
|
||||
- https://github.com/JlSakuya/Linux-Privilege-Escalation-Exploits
|
||||
- https://github.com/MLGBSec/os-survival
|
||||
@ -102,6 +103,7 @@ No PoCs from references.
|
||||
- https://github.com/spencerdodd/kernelpop
|
||||
- https://github.com/ssr-111/linux-kernel-exploitation
|
||||
- https://github.com/whackmanic/OSCP_Found
|
||||
- https://github.com/wkhnh06/linux-kernel-exploitation
|
||||
- https://github.com/xairy/linux-kernel-exploitation
|
||||
- https://github.com/xfinest/linux-kernel-exploits
|
||||
- https://github.com/xssfile/linux-kernel-exploits
|
||||
|
@ -27,5 +27,6 @@ No PoCs from references.
|
||||
- https://github.com/ndk191/linux-kernel-exploitation
|
||||
- https://github.com/skbasava/Linux-Kernel-exploit
|
||||
- https://github.com/ssr-111/linux-kernel-exploitation
|
||||
- https://github.com/wkhnh06/linux-kernel-exploitation
|
||||
- https://github.com/xairy/linux-kernel-exploitation
|
||||
|
||||
|
@ -20,6 +20,7 @@ The compat_alloc_user_space functions in include/asm/compat.h files in the Linux
|
||||
- https://github.com/C0dak/local-root-exploit-
|
||||
- https://github.com/De4dCr0w/Linux-kernel-EoP-exp
|
||||
- https://github.com/Feng4/linux-kernel-exploits
|
||||
- https://github.com/HaxorSecInfec/autoroot.sh
|
||||
- https://github.com/InteliSecureLabs/Linux_Exploit_Suggester
|
||||
- https://github.com/JlSakuya/Linux-Privilege-Escalation-Exploits
|
||||
- https://github.com/Micr067/linux-kernel-exploits
|
||||
@ -63,6 +64,7 @@ The compat_alloc_user_space functions in include/asm/compat.h files in the Linux
|
||||
- https://github.com/ram4u/Linux_Exploit_Suggester
|
||||
- https://github.com/skbasava/Linux-Kernel-exploit
|
||||
- https://github.com/ssr-111/linux-kernel-exploitation
|
||||
- https://github.com/wkhnh06/linux-kernel-exploitation
|
||||
- https://github.com/xairy/linux-kernel-exploitation
|
||||
- https://github.com/xfinest/linux-kernel-exploits
|
||||
- https://github.com/xssfile/linux-kernel-exploits
|
||||
|
@ -20,6 +20,7 @@ The IA32 system call emulation functionality in arch/x86/ia32/ia32entry.S in the
|
||||
- https://github.com/C0dak/local-root-exploit-
|
||||
- https://github.com/De4dCr0w/Linux-kernel-EoP-exp
|
||||
- https://github.com/Feng4/linux-kernel-exploits
|
||||
- https://github.com/HaxorSecInfec/autoroot.sh
|
||||
- https://github.com/InteliSecureLabs/Linux_Exploit_Suggester
|
||||
- https://github.com/JlSakuya/Linux-Privilege-Escalation-Exploits
|
||||
- https://github.com/Micr067/linux-kernel-exploits
|
||||
@ -62,6 +63,7 @@ The IA32 system call emulation functionality in arch/x86/ia32/ia32entry.S in the
|
||||
- https://github.com/ram4u/Linux_Exploit_Suggester
|
||||
- https://github.com/skbasava/Linux-Kernel-exploit
|
||||
- https://github.com/ssr-111/linux-kernel-exploitation
|
||||
- https://github.com/wkhnh06/linux-kernel-exploitation
|
||||
- https://github.com/xairy/linux-kernel-exploitation
|
||||
- https://github.com/xfinest/linux-kernel-exploits
|
||||
- https://github.com/xssfile/linux-kernel-exploits
|
||||
|
@ -30,6 +30,7 @@ No PoCs from references.
|
||||
- https://github.com/doshyt/cve-monitor
|
||||
- https://github.com/enthought/cve-search
|
||||
- https://github.com/extremenetworks/cve-search-src
|
||||
- https://github.com/fangdada/ctf
|
||||
- https://github.com/jerfinj/cve-search
|
||||
- https://github.com/miradam/cve-search
|
||||
- https://github.com/pandazheng/Threat-Intelligence-Analyst
|
||||
|
@ -62,6 +62,7 @@ No PoCs from references.
|
||||
- https://github.com/ram4u/Linux_Exploit_Suggester
|
||||
- https://github.com/skbasava/Linux-Kernel-exploit
|
||||
- https://github.com/ssr-111/linux-kernel-exploitation
|
||||
- https://github.com/wkhnh06/linux-kernel-exploitation
|
||||
- https://github.com/xairy/linux-kernel-exploitation
|
||||
- https://github.com/xfinest/linux-kernel-exploits
|
||||
- https://github.com/xssfile/linux-kernel-exploits
|
||||
|
@ -35,6 +35,7 @@ The rds_page_copy_user function in net/rds/page.c in the Reliable Datagram Socke
|
||||
- https://github.com/Elinpf/OSCP-survival-guide
|
||||
- https://github.com/Feng4/linux-kernel-exploits
|
||||
- https://github.com/Gajasurve/The-Security-Handbook
|
||||
- https://github.com/HaxorSecInfec/autoroot.sh
|
||||
- https://github.com/JlSakuya/Linux-Privilege-Escalation-Exploits
|
||||
- https://github.com/MLGBSec/os-survival
|
||||
- https://github.com/Micr067/linux-kernel-exploits
|
||||
|
@ -21,6 +21,7 @@ The ipc subsystem in the Linux kernel before 2.6.37-rc1 does not initialize cert
|
||||
- https://github.com/C0dak/local-root-exploit-
|
||||
- https://github.com/De4dCr0w/Linux-kernel-EoP-exp
|
||||
- https://github.com/Feng4/linux-kernel-exploits
|
||||
- https://github.com/HaxorSecInfec/autoroot.sh
|
||||
- https://github.com/InteliSecureLabs/Linux_Exploit_Suggester
|
||||
- https://github.com/JlSakuya/Linux-Privilege-Escalation-Exploits
|
||||
- https://github.com/Micr067/linux-kernel-exploits
|
||||
|
@ -21,6 +21,7 @@ The do_exit function in kernel/exit.c in the Linux kernel before 2.6.36.2 does n
|
||||
- https://github.com/De4dCr0w/Linux-kernel-EoP-exp
|
||||
- https://github.com/Feng4/linux-kernel-exploits
|
||||
- https://github.com/HUSTSeclab/Kernel-Exploits
|
||||
- https://github.com/HaxorSecInfec/autoroot.sh
|
||||
- https://github.com/JlSakuya/Linux-Privilege-Escalation-Exploits
|
||||
- https://github.com/Micr067/linux-kernel-exploits
|
||||
- https://github.com/QChiLan/linux-exp
|
||||
@ -65,6 +66,7 @@ The do_exit function in kernel/exit.c in the Linux kernel before 2.6.36.2 does n
|
||||
- https://github.com/ssr-111/linux-kernel-exploitation
|
||||
- https://github.com/tranquac/Linux-Privilege-Escalation
|
||||
- https://github.com/usamaelshazly/Linux-Privilege-Escalation
|
||||
- https://github.com/wkhnh06/linux-kernel-exploitation
|
||||
- https://github.com/xairy/linux-kernel-exploitation
|
||||
- https://github.com/xfinest/linux-kernel-exploits
|
||||
- https://github.com/xssfile/linux-kernel-exploits
|
||||
|
@ -19,6 +19,7 @@ No PoCs from references.
|
||||
- https://github.com/C0dak/local-root-exploit-
|
||||
- https://github.com/De4dCr0w/Linux-kernel-EoP-exp
|
||||
- https://github.com/Feng4/linux-kernel-exploits
|
||||
- https://github.com/HaxorSecInfec/autoroot.sh
|
||||
- https://github.com/InteliSecureLabs/Linux_Exploit_Suggester
|
||||
- https://github.com/JlSakuya/Linux-Privilege-Escalation-Exploits
|
||||
- https://github.com/Micr067/linux-kernel-exploits
|
||||
|
@ -14,6 +14,7 @@ No PoCs from references.
|
||||
|
||||
#### Github
|
||||
- https://github.com/ARPSyndicate/cvemon
|
||||
- https://github.com/cryptoquick/ossification
|
||||
- https://github.com/uvhw/conchimgiangnang
|
||||
- https://github.com/uvhw/wallet.cpp
|
||||
|
||||
|
@ -15,5 +15,5 @@ The client in HP Data Protector does not properly validate EXEC_CMD arguments, w
|
||||
- http://securityreason.com/securityalert/8329
|
||||
|
||||
#### Github
|
||||
No PoCs found on GitHub currently.
|
||||
- https://github.com/marcocarolasec/CVE-2016-2004-Exploit
|
||||
|
||||
|
@ -27,5 +27,6 @@ No PoCs from references.
|
||||
- https://github.com/ndk191/linux-kernel-exploitation
|
||||
- https://github.com/skbasava/Linux-Kernel-exploit
|
||||
- https://github.com/ssr-111/linux-kernel-exploitation
|
||||
- https://github.com/wkhnh06/linux-kernel-exploitation
|
||||
- https://github.com/xairy/linux-kernel-exploitation
|
||||
|
||||
|
@ -71,6 +71,7 @@ vsftpd 2.3.4 downloaded between 20110630 and 20110703 contains a backdoor which
|
||||
- https://github.com/shamsulchowdhury/Unit-16-Homework-Penetration-Testing1
|
||||
- https://github.com/slxwzk/slxwzkBotnet
|
||||
- https://github.com/sponkmonk/Ladon_english_update
|
||||
- https://github.com/sug4r-wr41th/CVE-2011-2523
|
||||
- https://github.com/sunzu94/vsftpd_2.3.4_Exploit
|
||||
- https://github.com/tarikemal/exploit-ftp-samba
|
||||
- https://github.com/thanawut2903/Port-21-tcp-vsftpd-2.3.4-exploit
|
||||
|
@ -36,6 +36,7 @@ No PoCs from references.
|
||||
- https://github.com/garethr/snykout
|
||||
- https://github.com/goharbor/pluggable-scanner-spec
|
||||
- https://github.com/jnsgruk/trivy-cvss-tools
|
||||
- https://github.com/m-pasima/CI-CD-Security-image-scan
|
||||
- https://github.com/mauraneh/WIK-DPS-TP02
|
||||
- https://github.com/sharmapravin1001/Kubernetes-cks
|
||||
- https://github.com/siddharthraopotukuchi/trivy
|
||||
|
@ -40,6 +40,7 @@ The SSL protocol, as used in certain configurations in Microsoft Windows and Mic
|
||||
- https://github.com/alexandrburyakov/Rep2
|
||||
- https://github.com/alexgro1982/devops-netology
|
||||
- https://github.com/bysart/devops-netology
|
||||
- https://github.com/catsploit/catsploit
|
||||
- https://github.com/cdupuis/image-api
|
||||
- https://github.com/daniel1302/litecoin
|
||||
- https://github.com/dmitrii1312/03-sysadmin-09
|
||||
|
@ -16,6 +16,7 @@ Unspecified vulnerability in the Java Runtime Environment component in Oracle Ja
|
||||
#### Github
|
||||
- https://github.com/20142995/Goby
|
||||
- https://github.com/ARPSyndicate/cvemon
|
||||
- https://github.com/CVEDB/awesome-cve-repo
|
||||
- https://github.com/HimmelAward/Goby_POC
|
||||
- https://github.com/MelanyRoob/Goby
|
||||
- https://github.com/Z0fhack/Goby_POC
|
||||
|
17
2011/CVE-2011-3730.md
Normal file
17
2011/CVE-2011-3730.md
Normal file
@ -0,0 +1,17 @@
|
||||
### [CVE-2011-3730](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3730)
|
||||

|
||||

|
||||

|
||||
|
||||
### Description
|
||||
|
||||
Drupal 7.0 allows remote attackers to obtain sensitive information via a direct request to a .php file, which reveals the installation path in an error message, as demonstrated by modules/simpletest/tests/upgrade/drupal-6.upload.database.php and certain other files.
|
||||
|
||||
### POC
|
||||
|
||||
#### Reference
|
||||
No PoCs from references.
|
||||
|
||||
#### Github
|
||||
- https://github.com/catsploit/catsploit
|
||||
|
@ -18,5 +18,6 @@ Jetty 8.1.0.RC2 and earlier computes hash values for form parameters without res
|
||||
#### Github
|
||||
- https://github.com/Anonymous-Phunter/PHunter
|
||||
- https://github.com/CGCL-codes/PHunter
|
||||
- https://github.com/LibHunter/LibHunter
|
||||
- https://github.com/javirodriguezzz/Shodan-Browser
|
||||
|
||||
|
@ -14,6 +14,7 @@ Cross-site scripting (XSS) vulnerability in jQuery before 1.6.3, when using loca
|
||||
|
||||
#### Github
|
||||
- https://github.com/FallibleInc/retirejslib
|
||||
- https://github.com/catsploit/catsploit
|
||||
- https://github.com/ctcpip/jquery-security
|
||||
- https://github.com/eliasgranderubio/4depcheck
|
||||
|
||||
|
@ -35,6 +35,7 @@ No PoCs from references.
|
||||
- https://github.com/Elinpf/OSCP-survival-guide
|
||||
- https://github.com/Feng4/linux-kernel-exploits
|
||||
- https://github.com/Gajasurve/The-Security-Handbook
|
||||
- https://github.com/HaxorSecInfec/autoroot.sh
|
||||
- https://github.com/InteliSecureLabs/Linux_Exploit_Suggester
|
||||
- https://github.com/JlSakuya/Linux-Privilege-Escalation-Exploits
|
||||
- https://github.com/MLGBSec/os-survival
|
||||
@ -141,6 +142,7 @@ No PoCs from references.
|
||||
- https://github.com/tranquac/Linux-Privilege-Escalation
|
||||
- https://github.com/usamaelshazly/Linux-Privilege-Escalation
|
||||
- https://github.com/whackmanic/OSCP_Found
|
||||
- https://github.com/wkhnh06/linux-kernel-exploitation
|
||||
- https://github.com/xairy/linux-kernel-exploitation
|
||||
- https://github.com/xcsrf/OSCP-PWK-Notes-Public
|
||||
- https://github.com/xfinest/linux-kernel-exploits
|
||||
|
@ -28,6 +28,7 @@ The (1) ListView, (2) ListView2, (3) TreeView, and (4) TreeView2 ActiveX control
|
||||
- https://github.com/amliaW4/amliaW4.github.io
|
||||
- https://github.com/cnhouzi/APTNotes
|
||||
- https://github.com/czq945659538/-study
|
||||
- https://github.com/fangdada/ctf
|
||||
- https://github.com/havocykp/Vulnerability-analysis
|
||||
- https://github.com/helloandrewpaul/Mandiant---APT
|
||||
- https://github.com/houjingyi233/office-exploit-case-study
|
||||
|
@ -38,9 +38,11 @@ No PoCs from references.
|
||||
- https://github.com/Soundaryakambhampati/test-6
|
||||
- https://github.com/Unix13/metasploitable2
|
||||
- https://github.com/Vibragence/Dockersploit
|
||||
- https://github.com/XiangDongCJC/CVE-2024-4577-PHP-CGI-RCE
|
||||
- https://github.com/ajread4/cve_pull
|
||||
- https://github.com/alex14324/Eagel
|
||||
- https://github.com/beched/libpywebhack
|
||||
- https://github.com/bl4cksku11/CVE-2024-4577
|
||||
- https://github.com/cyberdeception/deepdig
|
||||
- https://github.com/cyberharsh/PHP_CVE-2012-1823
|
||||
- https://github.com/daai1/CVE-2012-1823
|
||||
|
@ -18,5 +18,6 @@ Algorithmic complexity vulnerability in the sorting algorithms in bzip2 compress
|
||||
- https://github.com/Anonymous-Phunter/PHunter
|
||||
- https://github.com/BrunoBonacci/lein-binplus
|
||||
- https://github.com/CGCL-codes/PHunter
|
||||
- https://github.com/LibHunter/LibHunter
|
||||
- https://github.com/markus-wa/clj-bin
|
||||
|
||||
|
@ -15,5 +15,6 @@ No PoCs from references.
|
||||
#### Github
|
||||
- https://github.com/ARPSyndicate/cvemon
|
||||
- https://github.com/asur4s/fuzzing
|
||||
- https://github.com/ch1hyun/fuzzing-class
|
||||
- https://github.com/chiehw/fuzzing
|
||||
|
||||
|
@ -28,6 +28,7 @@ file/show.cgi in Webmin 1.590 and earlier allows remote authenticated users to e
|
||||
- https://github.com/Mithlonde/Mithlonde
|
||||
- https://github.com/OstojaOfficial/CVE-2012-2982
|
||||
- https://github.com/R00tendo/CVE-2012-2982
|
||||
- https://github.com/Shadow-Spinner/CVE-2012-2982_python
|
||||
- https://github.com/SlizBinksman/CVE_2012-2982
|
||||
- https://github.com/Will-Banksy/My-Exploits
|
||||
- https://github.com/alien-keric/webmin-v1.580-exploit
|
||||
|
@ -15,4 +15,5 @@ No PoCs from references.
|
||||
#### Github
|
||||
- https://github.com/ARPSyndicate/cvemon
|
||||
- https://github.com/ferdinandmudjialim/metasploit-cve-search
|
||||
- https://github.com/tunnelcat/metasploit-cve-search
|
||||
|
||||
|
@ -62,6 +62,7 @@ The TLS protocol 1.2 and earlier, as used in Mozilla Firefox, Google Chrome, Qt,
|
||||
- https://github.com/ilya-starchikov/devops-netology
|
||||
- https://github.com/jselvi/docker-crime
|
||||
- https://github.com/mohitrex7/Wap-Recon
|
||||
- https://github.com/mpgn/CRIME-poc
|
||||
- https://github.com/nikolay480/devops-netology
|
||||
- https://github.com/nkiselyov/devops-netology
|
||||
- https://github.com/paroteen/SecurEagle
|
||||
|
@ -13,5 +13,5 @@ tiki-featured_link.php in TikiWiki CMS/Groupware 8.3 allows remote attackers to
|
||||
- http://st2tea.blogspot.com/2012/02/tiki-wiki-cms-groupware-frame-injection.html
|
||||
|
||||
#### Github
|
||||
No PoCs found on GitHub currently.
|
||||
- https://github.com/Cappricio-Securities/CVE-2012-5321
|
||||
|
||||
|
17
2012/CVE-2012-6664.md
Normal file
17
2012/CVE-2012-6664.md
Normal file
@ -0,0 +1,17 @@
|
||||
### [CVE-2012-6664](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-6664)
|
||||

|
||||

|
||||

|
||||
|
||||
### Description
|
||||
|
||||
Multiple directory traversal vulnerabilities in the TFTP Server in Distinct Intranet Servers 3.10 and earlier allow remote attackers to read or write arbitrary files via a .. (dot dot) in the (1) get or (2) put commands.
|
||||
|
||||
### POC
|
||||
|
||||
#### Reference
|
||||
- https://www.exploit-db.com/exploits/41714
|
||||
|
||||
#### Github
|
||||
No PoCs found on GitHub currently.
|
||||
|
@ -17,6 +17,7 @@ jQuery before 1.9.0 is vulnerable to Cross-site Scripting (XSS) attacks. The jQu
|
||||
#### Github
|
||||
- https://github.com/ARPSyndicate/cvemon
|
||||
- https://github.com/catdever/watchdog
|
||||
- https://github.com/catsploit/catsploit
|
||||
- https://github.com/ctcpip/jquery-security
|
||||
- https://github.com/flipkart-incubator/watchdog
|
||||
- https://github.com/rohankumardubey/watchdog
|
||||
|
@ -19,6 +19,7 @@ No PoCs from references.
|
||||
- https://github.com/C0dak/local-root-exploit-
|
||||
- https://github.com/De4dCr0w/Linux-kernel-EoP-exp
|
||||
- https://github.com/Feng4/linux-kernel-exploits
|
||||
- https://github.com/HaxorSecInfec/autoroot.sh
|
||||
- https://github.com/JlSakuya/Linux-Privilege-Escalation-Exploits
|
||||
- https://github.com/Micr067/linux-kernel-exploits
|
||||
- https://github.com/QChiLan/linux-exp
|
||||
|
@ -21,6 +21,7 @@ Array index error in the __sock_diag_rcv_msg function in net/core/sock_diag.c in
|
||||
- https://github.com/C0dak/local-root-exploit-
|
||||
- https://github.com/De4dCr0w/Linux-kernel-EoP-exp
|
||||
- https://github.com/Feng4/linux-kernel-exploits
|
||||
- https://github.com/HaxorSecInfec/autoroot.sh
|
||||
- https://github.com/JlSakuya/Linux-Privilege-Escalation-Exploits
|
||||
- https://github.com/Micr067/linux-kernel-exploits
|
||||
- https://github.com/QChiLan/linux-exp
|
||||
@ -61,6 +62,7 @@ Array index error in the __sock_diag_rcv_msg function in net/core/sock_diag.c in
|
||||
- https://github.com/rakjong/LinuxElevation
|
||||
- https://github.com/skbasava/Linux-Kernel-exploit
|
||||
- https://github.com/ssr-111/linux-kernel-exploitation
|
||||
- https://github.com/wkhnh06/linux-kernel-exploitation
|
||||
- https://github.com/xairy/linux-kernel-exploitation
|
||||
- https://github.com/xfinest/linux-kernel-exploits
|
||||
- https://github.com/xssfile/linux-kernel-exploits
|
||||
|
@ -18,6 +18,7 @@ The BrokerFactory functionality in Apache OpenJPA 1.x before 1.2.3 and 2.x befor
|
||||
- https://github.com/BrittanyKuhn/javascript-tutorial
|
||||
- https://github.com/CGCL-codes/PHunter
|
||||
- https://github.com/GrrrDog/Java-Deserialization-Cheat-Sheet
|
||||
- https://github.com/LibHunter/LibHunter
|
||||
- https://github.com/PalindromeLabs/Java-Deserialization-CVEs
|
||||
- https://github.com/klausware/Java-Deserialization-Cheat-Sheet
|
||||
- https://github.com/mishmashclone/GrrrDog-Java-Deserialization-Cheat-Sheet
|
||||
|
@ -19,6 +19,7 @@ The clone system-call implementation in the Linux kernel before 3.8.3 does not p
|
||||
- https://github.com/C0dak/local-root-exploit-
|
||||
- https://github.com/De4dCr0w/Linux-kernel-EoP-exp
|
||||
- https://github.com/Feng4/linux-kernel-exploits
|
||||
- https://github.com/HaxorSecInfec/autoroot.sh
|
||||
- https://github.com/JlSakuya/Linux-Privilege-Escalation-Exploits
|
||||
- https://github.com/Micr067/linux-kernel-exploits
|
||||
- https://github.com/QChiLan/linux-exp
|
||||
|
@ -13,5 +13,6 @@ kernel/user_namespace.c in the Linux kernel before 3.8.9 does not have appropria
|
||||
- http://www.openwall.com/lists/oss-security/2013/04/29/1
|
||||
|
||||
#### Github
|
||||
- https://github.com/HaxorSecInfec/autoroot.sh
|
||||
- https://github.com/JlSakuya/Linux-Privilege-Escalation-Exploits
|
||||
|
||||
|
@ -25,6 +25,7 @@ The perf_swevent_init function in kernel/events/core.c in the Linux kernel befor
|
||||
- https://github.com/CVEDB/awesome-cve-repo
|
||||
- https://github.com/De4dCr0w/Linux-kernel-EoP-exp
|
||||
- https://github.com/Feng4/linux-kernel-exploits
|
||||
- https://github.com/HaxorSecInfec/autoroot.sh
|
||||
- https://github.com/I-Prashanth-S/CybersecurityTIFAC
|
||||
- https://github.com/IMCG/awesome-c
|
||||
- https://github.com/InteliSecureLabs/Linux_Exploit_Suggester
|
||||
@ -96,6 +97,7 @@ The perf_swevent_init function in kernel/events/core.c in the Linux kernel befor
|
||||
- https://github.com/timhsutw/cve-2013-2094
|
||||
- https://github.com/vnik5287/CVE-2013-2094
|
||||
- https://github.com/weeka10/-hktalent-TOP
|
||||
- https://github.com/wkhnh06/linux-kernel-exploitation
|
||||
- https://github.com/xairy/linux-kernel-exploitation
|
||||
- https://github.com/xfinest/linux-kernel-exploits
|
||||
- https://github.com/xssfile/linux-kernel-exploits
|
||||
|
@ -13,4 +13,5 @@ OpenText Exceed OnDemand (EoD) 8 uses weak encryption for passwords, which makes
|
||||
- https://github.com/koto/exceed-mitm
|
||||
|
||||
#### Github
|
||||
- https://github.com/koto/exceed-mitm
|
||||
|
||||
|
@ -13,4 +13,5 @@ OpenText Exceed OnDemand (EoD) 8 allows man-in-the-middle attackers to disable b
|
||||
- https://github.com/koto/exceed-mitm
|
||||
|
||||
#### Github
|
||||
- https://github.com/koto/exceed-mitm
|
||||
|
||||
|
@ -13,4 +13,5 @@ The client in OpenText Exceed OnDemand (EoD) 8 supports anonymous ciphers by def
|
||||
- https://github.com/koto/exceed-mitm
|
||||
|
||||
#### Github
|
||||
- https://github.com/koto/exceed-mitm
|
||||
|
||||
|
Some files were not shown because too many files have changed in this diff Show More
Loading…
x
Reference in New Issue
Block a user