mirror of
https://github.com/0xMarcio/cve.git
synced 2025-06-19 17:30:12 +00:00
Update CVE sources 2024-08-11 18:44
This commit is contained in:
parent
d527075578
commit
8654f5abb7
@ -53,6 +53,7 @@ The do_mremap function for the mremap system call in Linux 2.2 to 2.2.25, 2.4 to
|
||||
- https://github.com/knd06/linux-kernel-exploitation
|
||||
- https://github.com/kumardineshwar/linux-kernel-exploits
|
||||
- https://github.com/m0mkris/linux-kernel-exploits
|
||||
- https://github.com/ndk06/linux-kernel-exploitation
|
||||
- https://github.com/ndk191/linux-kernel-exploitation
|
||||
- https://github.com/ozkanbilge/Linux-Kernel-Exploits
|
||||
- https://github.com/p00h00/linux-exploits
|
||||
|
@ -24,6 +24,7 @@ The IA32 system call emulation functionality in Linux kernel 2.4.x and 2.6.x bef
|
||||
- https://github.com/khanhhdz06/linux-kernel-exploitation
|
||||
- https://github.com/khanhnd123/linux-kernel-exploitation
|
||||
- https://github.com/knd06/linux-kernel-exploitation
|
||||
- https://github.com/ndk06/linux-kernel-exploitation
|
||||
- https://github.com/ndk191/linux-kernel-exploitation
|
||||
- https://github.com/skbasava/Linux-Kernel-exploit
|
||||
- https://github.com/ssr-111/linux-kernel-exploitation
|
||||
|
@ -10,6 +10,7 @@ The SNMP agent (snmp_agent.c) in net-snmp before 5.4.1 allows remote attackers t
|
||||
### POC
|
||||
|
||||
#### Reference
|
||||
- http://www.ubuntu.com/usn/usn-564-1
|
||||
- https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA43730
|
||||
|
||||
#### Github
|
||||
|
@ -24,6 +24,7 @@ No PoCs from references.
|
||||
- https://github.com/khanhhdz06/linux-kernel-exploitation
|
||||
- https://github.com/khanhnd123/linux-kernel-exploitation
|
||||
- https://github.com/knd06/linux-kernel-exploitation
|
||||
- https://github.com/ndk06/linux-kernel-exploitation
|
||||
- https://github.com/ndk191/linux-kernel-exploitation
|
||||
- https://github.com/skbasava/Linux-Kernel-exploit
|
||||
- https://github.com/ssr-111/linux-kernel-exploitation
|
||||
|
@ -24,6 +24,7 @@ The copy_from_user_mmap_sem function in fs/splice.c in the Linux kernel 2.6.22 t
|
||||
- https://github.com/khanhhdz06/linux-kernel-exploitation
|
||||
- https://github.com/khanhnd123/linux-kernel-exploitation
|
||||
- https://github.com/knd06/linux-kernel-exploitation
|
||||
- https://github.com/ndk06/linux-kernel-exploitation
|
||||
- https://github.com/ndk191/linux-kernel-exploitation
|
||||
- https://github.com/skbasava/Linux-Kernel-exploit
|
||||
- https://github.com/ssr-111/linux-kernel-exploitation
|
||||
|
@ -51,6 +51,7 @@ The vmsplice_to_pipe function in Linux kernel 2.6.17 through 2.6.24.1 does not v
|
||||
- https://github.com/knd06/linux-kernel-exploitation
|
||||
- https://github.com/kumardineshwar/linux-kernel-exploits
|
||||
- https://github.com/m0mkris/linux-kernel-exploits
|
||||
- https://github.com/ndk06/linux-kernel-exploitation
|
||||
- https://github.com/ndk191/linux-kernel-exploitation
|
||||
- https://github.com/ozkanbilge/Linux-Kernel-Exploits
|
||||
- https://github.com/p00h00/linux-exploits
|
||||
|
@ -24,6 +24,7 @@ No PoCs from references.
|
||||
- https://github.com/khanhhdz06/linux-kernel-exploitation
|
||||
- https://github.com/khanhnd123/linux-kernel-exploitation
|
||||
- https://github.com/knd06/linux-kernel-exploitation
|
||||
- https://github.com/ndk06/linux-kernel-exploitation
|
||||
- https://github.com/ndk191/linux-kernel-exploitation
|
||||
- https://github.com/skbasava/Linux-Kernel-exploit
|
||||
- https://github.com/ssr-111/linux-kernel-exploitation
|
||||
|
@ -24,6 +24,7 @@ No PoCs from references.
|
||||
- https://github.com/khanhhdz06/linux-kernel-exploitation
|
||||
- https://github.com/khanhnd123/linux-kernel-exploitation
|
||||
- https://github.com/knd06/linux-kernel-exploitation
|
||||
- https://github.com/ndk06/linux-kernel-exploitation
|
||||
- https://github.com/ndk191/linux-kernel-exploitation
|
||||
- https://github.com/skbasava/Linux-Kernel-exploit
|
||||
- https://github.com/ssr-111/linux-kernel-exploitation
|
||||
|
@ -59,6 +59,7 @@ The Linux kernel 2.6.0 through 2.6.30.4, and 2.4.4 through 2.4.37.4, does not in
|
||||
- https://github.com/kumardineshwar/linux-kernel-exploits
|
||||
- https://github.com/m0mkris/linux-kernel-exploits
|
||||
- https://github.com/moshekaplan/pentesting_notes
|
||||
- https://github.com/ndk06/linux-kernel-exploitation
|
||||
- https://github.com/ndk191/linux-kernel-exploitation
|
||||
- https://github.com/ozkanbilge/Linux-Kernel-Exploits
|
||||
- https://github.com/p00h00/linux-exploits
|
||||
|
@ -24,6 +24,7 @@ No PoCs from references.
|
||||
- https://github.com/khanhhdz06/linux-kernel-exploitation
|
||||
- https://github.com/khanhnd123/linux-kernel-exploitation
|
||||
- https://github.com/knd06/linux-kernel-exploitation
|
||||
- https://github.com/ndk06/linux-kernel-exploitation
|
||||
- https://github.com/ndk191/linux-kernel-exploitation
|
||||
- https://github.com/skbasava/Linux-Kernel-exploit
|
||||
- https://github.com/ssr-111/linux-kernel-exploitation
|
||||
|
@ -24,6 +24,7 @@ No PoCs from references.
|
||||
- https://github.com/khanhhdz06/linux-kernel-exploitation
|
||||
- https://github.com/khanhnd123/linux-kernel-exploitation
|
||||
- https://github.com/knd06/linux-kernel-exploitation
|
||||
- https://github.com/ndk06/linux-kernel-exploitation
|
||||
- https://github.com/ndk191/linux-kernel-exploitation
|
||||
- https://github.com/skbasava/Linux-Kernel-exploit
|
||||
- https://github.com/ssr-111/linux-kernel-exploitation
|
||||
|
@ -24,6 +24,7 @@ The do_anonymous_page function in mm/memory.c in the Linux kernel before 2.6.27.
|
||||
- https://github.com/khanhhdz06/linux-kernel-exploitation
|
||||
- https://github.com/khanhnd123/linux-kernel-exploitation
|
||||
- https://github.com/knd06/linux-kernel-exploitation
|
||||
- https://github.com/ndk06/linux-kernel-exploitation
|
||||
- https://github.com/ndk191/linux-kernel-exploitation
|
||||
- https://github.com/ssr-111/linux-kernel-exploitation
|
||||
- https://github.com/wkhnh06/linux-kernel-exploitation
|
||||
|
@ -84,6 +84,7 @@ No PoCs from references.
|
||||
- https://github.com/mmt55/kalilinux
|
||||
- https://github.com/monkeysm8/OSCP_HELP
|
||||
- https://github.com/mudongliang/LinuxFlaw
|
||||
- https://github.com/ndk06/linux-kernel-exploitation
|
||||
- https://github.com/ndk191/linux-kernel-exploitation
|
||||
- https://github.com/nitishbadole/hacking_30
|
||||
- https://github.com/oneoy/cve-
|
||||
|
@ -24,6 +24,7 @@ drivers/media/video/v4l2-compat-ioctl32.c in the Video4Linux (V4L) implementatio
|
||||
- https://github.com/khanhhdz06/linux-kernel-exploitation
|
||||
- https://github.com/khanhnd123/linux-kernel-exploitation
|
||||
- https://github.com/knd06/linux-kernel-exploitation
|
||||
- https://github.com/ndk06/linux-kernel-exploitation
|
||||
- https://github.com/ndk191/linux-kernel-exploitation
|
||||
- https://github.com/skbasava/Linux-Kernel-exploit
|
||||
- https://github.com/ssr-111/linux-kernel-exploitation
|
||||
|
@ -55,6 +55,7 @@ The compat_alloc_user_space functions in include/asm/compat.h files in the Linux
|
||||
- https://github.com/knd06/linux-kernel-exploitation
|
||||
- https://github.com/kumardineshwar/linux-kernel-exploits
|
||||
- https://github.com/m0mkris/linux-kernel-exploits
|
||||
- https://github.com/ndk06/linux-kernel-exploitation
|
||||
- https://github.com/ndk191/linux-kernel-exploitation
|
||||
- https://github.com/ozkanbilge/Linux-Kernel-Exploits
|
||||
- https://github.com/p00h00/linux-exploits
|
||||
|
@ -54,6 +54,7 @@ The IA32 system call emulation functionality in arch/x86/ia32/ia32entry.S in the
|
||||
- https://github.com/knd06/linux-kernel-exploitation
|
||||
- https://github.com/kumardineshwar/linux-kernel-exploits
|
||||
- https://github.com/m0mkris/linux-kernel-exploits
|
||||
- https://github.com/ndk06/linux-kernel-exploitation
|
||||
- https://github.com/ndk191/linux-kernel-exploitation
|
||||
- https://github.com/ozkanbilge/Linux-Kernel-Exploits
|
||||
- https://github.com/p00h00/linux-exploits
|
||||
|
@ -52,6 +52,7 @@ Integer signedness error in the pkt_find_dev_from_minor function in drivers/bloc
|
||||
- https://github.com/knd06/linux-kernel-exploitation
|
||||
- https://github.com/kumardineshwar/linux-kernel-exploits
|
||||
- https://github.com/m0mkris/linux-kernel-exploits
|
||||
- https://github.com/ndk06/linux-kernel-exploitation
|
||||
- https://github.com/ndk191/linux-kernel-exploitation
|
||||
- https://github.com/ozkanbilge/Linux-Kernel-Exploits
|
||||
- https://github.com/p00h00/linux-exploits
|
||||
|
@ -57,6 +57,7 @@ The do_exit function in kernel/exit.c in the Linux kernel before 2.6.36.2 does n
|
||||
- https://github.com/knd06/linux-kernel-exploitation
|
||||
- https://github.com/kumardineshwar/linux-kernel-exploits
|
||||
- https://github.com/m0mkris/linux-kernel-exploits
|
||||
- https://github.com/ndk06/linux-kernel-exploitation
|
||||
- https://github.com/ndk191/linux-kernel-exploitation
|
||||
- https://github.com/ozkanbilge/Linux-Kernel-Exploits
|
||||
- https://github.com/p00h00/linux-exploits
|
||||
|
@ -24,6 +24,7 @@ No PoCs from references.
|
||||
- https://github.com/khanhhdz06/linux-kernel-exploitation
|
||||
- https://github.com/khanhnd123/linux-kernel-exploitation
|
||||
- https://github.com/knd06/linux-kernel-exploitation
|
||||
- https://github.com/ndk06/linux-kernel-exploitation
|
||||
- https://github.com/ndk191/linux-kernel-exploitation
|
||||
- https://github.com/skbasava/Linux-Kernel-exploit
|
||||
- https://github.com/ssr-111/linux-kernel-exploitation
|
||||
|
@ -114,6 +114,7 @@ No PoCs from references.
|
||||
- https://github.com/mjutsu/OSCP
|
||||
- https://github.com/mmt55/kalilinux
|
||||
- https://github.com/monkeysm8/OSCP_HELP
|
||||
- https://github.com/ndk06/linux-kernel-exploitation
|
||||
- https://github.com/ndk191/linux-kernel-exploitation
|
||||
- https://github.com/nitishbadole/hacking_30
|
||||
- https://github.com/nmvuonginfosec/linux
|
||||
|
17
2013/CVE-2013-10024.md
Normal file
17
2013/CVE-2013-10024.md
Normal file
@ -0,0 +1,17 @@
|
||||
### [CVE-2013-10024](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-10024)
|
||||

|
||||

|
||||

|
||||
|
||||
### Description
|
||||
|
||||
A vulnerability has been found in Exit Strategy Plugin 1.55 on WordPress and classified as problematic. Affected by this vulnerability is an unknown functionality of the file exitpage.php. The manipulation leads to information disclosure. The attack can be launched remotely. Upgrading to version 1.59 is able to address this issue. The identifier of the patch is d964b8e961b2634158719f3328f16eda16ce93ac. It is recommended to upgrade the affected component. The identifier VDB-225265 was assigned to this vulnerability.
|
||||
|
||||
### POC
|
||||
|
||||
#### Reference
|
||||
No PoCs from references.
|
||||
|
||||
#### Github
|
||||
- https://github.com/20142995/nuclei-templates
|
||||
|
@ -55,6 +55,7 @@ Array index error in the __sock_diag_rcv_msg function in net/core/sock_diag.c in
|
||||
- https://github.com/knd06/linux-kernel-exploitation
|
||||
- https://github.com/kumardineshwar/linux-kernel-exploits
|
||||
- https://github.com/m0mkris/linux-kernel-exploits
|
||||
- https://github.com/ndk06/linux-kernel-exploitation
|
||||
- https://github.com/ndk191/linux-kernel-exploitation
|
||||
- https://github.com/ozkanbilge/Linux-Kernel-Exploits
|
||||
- https://github.com/password520/linux-kernel-exploits
|
||||
|
@ -80,6 +80,7 @@ The perf_swevent_init function in kernel/events/core.c in the Linux kernel befor
|
||||
- https://github.com/lushtree-cn-honeyzhao/awesome-c
|
||||
- https://github.com/m0mkris/linux-kernel-exploits
|
||||
- https://github.com/maririn312/Linux_menthor
|
||||
- https://github.com/ndk06/linux-kernel-exploitation
|
||||
- https://github.com/ndk191/linux-kernel-exploitation
|
||||
- https://github.com/nmvuonginfosec/linux
|
||||
- https://github.com/ozkanbilge/Linux-Kernel-Exploits
|
||||
|
@ -67,6 +67,7 @@ The compat_sys_recvmmsg function in net/compat.c in the Linux kernel before 3.13
|
||||
- https://github.com/kumardineshwar/linux-kernel-exploits
|
||||
- https://github.com/lushtree-cn-honeyzhao/awesome-c
|
||||
- https://github.com/m0mkris/linux-kernel-exploits
|
||||
- https://github.com/ndk06/linux-kernel-exploitation
|
||||
- https://github.com/ndk191/linux-kernel-exploitation
|
||||
- https://github.com/ozkanbilge/Linux-Kernel-Exploits
|
||||
- https://github.com/p00h00/linux-exploits
|
||||
|
@ -61,6 +61,7 @@ The n_tty_write function in drivers/tty/n_tty.c in the Linux kernel through 3.14
|
||||
- https://github.com/knd06/linux-kernel-exploitation
|
||||
- https://github.com/kumardineshwar/linux-kernel-exploits
|
||||
- https://github.com/m0mkris/linux-kernel-exploits
|
||||
- https://github.com/ndk06/linux-kernel-exploitation
|
||||
- https://github.com/ndk191/linux-kernel-exploitation
|
||||
- https://github.com/ozkanbilge/Linux-Kernel-Exploits
|
||||
- https://github.com/p00h00/linux-exploits
|
||||
|
@ -25,6 +25,7 @@ No PoCs from references.
|
||||
- https://github.com/khanhnd123/linux-kernel-exploitation
|
||||
- https://github.com/knd06/linux-kernel-exploitation
|
||||
- https://github.com/mudongliang/LinuxFlaw
|
||||
- https://github.com/ndk06/linux-kernel-exploitation
|
||||
- https://github.com/ndk191/linux-kernel-exploitation
|
||||
- https://github.com/oneoy/cve-
|
||||
- https://github.com/skbasava/Linux-Kernel-exploit
|
||||
|
@ -82,6 +82,7 @@ No PoCs from references.
|
||||
- https://github.com/lieanu/CVE-2014-3153
|
||||
- https://github.com/lushtree-cn-honeyzhao/awesome-c
|
||||
- https://github.com/m0mkris/linux-kernel-exploits
|
||||
- https://github.com/ndk06/linux-kernel-exploitation
|
||||
- https://github.com/ndk191/linux-kernel-exploitation
|
||||
- https://github.com/ozkanbilge/Linux-Kernel-Exploits
|
||||
- https://github.com/password520/linux-kernel-exploits
|
||||
|
@ -53,6 +53,7 @@ The capabilities implementation in the Linux kernel before 3.14.8 does not prope
|
||||
- https://github.com/knd06/linux-kernel-exploitation
|
||||
- https://github.com/kumardineshwar/linux-kernel-exploits
|
||||
- https://github.com/m0mkris/linux-kernel-exploits
|
||||
- https://github.com/ndk06/linux-kernel-exploitation
|
||||
- https://github.com/ndk191/linux-kernel-exploitation
|
||||
- https://github.com/ozkanbilge/Linux-Kernel-Exploits
|
||||
- https://github.com/password520/linux-kernel-exploits
|
||||
|
@ -40,6 +40,7 @@ No PoCs from references.
|
||||
- https://github.com/koozxcv/CVE-2014-7911-CVE-2014-4322_get_root_privilege
|
||||
- https://github.com/laginimaineb/cve-2014-4322
|
||||
- https://github.com/lushtree-cn-honeyzhao/awesome-c
|
||||
- https://github.com/ndk06/linux-kernel-exploitation
|
||||
- https://github.com/ndk191/linux-kernel-exploitation
|
||||
- https://github.com/retme7/CVE-2014-4322_poc
|
||||
- https://github.com/retme7/CVE-2014-7911_poc
|
||||
|
@ -59,6 +59,7 @@ The Linux kernel before 3.15.4 on Intel processors does not properly restrict us
|
||||
- https://github.com/kumardineshwar/linux-kernel-exploits
|
||||
- https://github.com/m0mkris/linux-kernel-exploits
|
||||
- https://github.com/msecrist-couchbase/smallcb-training-capella
|
||||
- https://github.com/ndk06/linux-kernel-exploitation
|
||||
- https://github.com/ndk191/linux-kernel-exploitation
|
||||
- https://github.com/ozkanbilge/Linux-Kernel-Exploits
|
||||
- https://github.com/password520/linux-kernel-exploits
|
||||
|
@ -24,6 +24,7 @@ The PPPoL2TP feature in net/l2tp/l2tp_ppp.c in the Linux kernel through 3.15.6 a
|
||||
- https://github.com/khanhhdz06/linux-kernel-exploitation
|
||||
- https://github.com/khanhnd123/linux-kernel-exploitation
|
||||
- https://github.com/knd06/linux-kernel-exploitation
|
||||
- https://github.com/ndk06/linux-kernel-exploitation
|
||||
- https://github.com/ndk191/linux-kernel-exploitation
|
||||
- https://github.com/redes-2015/l2tp-socket-bug
|
||||
- https://github.com/skbasava/Linux-Kernel-exploit
|
||||
|
@ -31,6 +31,7 @@ arch/x86/kernel/entry_64.S in the Linux kernel before 3.17.5 does not properly h
|
||||
- https://github.com/khanhhdz06/linux-kernel-exploitation
|
||||
- https://github.com/khanhnd123/linux-kernel-exploitation
|
||||
- https://github.com/knd06/linux-kernel-exploitation
|
||||
- https://github.com/ndk06/linux-kernel-exploitation
|
||||
- https://github.com/ndk191/linux-kernel-exploitation
|
||||
- https://github.com/paulveillard/cybersecurity-exploit-development
|
||||
- https://github.com/skbasava/Linux-Kernel-exploit
|
||||
|
@ -23,6 +23,7 @@ No PoCs from references.
|
||||
- https://github.com/khanhhdz06/linux-kernel-exploitation
|
||||
- https://github.com/khanhnd123/linux-kernel-exploitation
|
||||
- https://github.com/knd06/linux-kernel-exploitation
|
||||
- https://github.com/ndk06/linux-kernel-exploitation
|
||||
- https://github.com/ndk191/linux-kernel-exploitation
|
||||
- https://github.com/ssr-111/linux-kernel-exploitation
|
||||
- https://github.com/wkhnh06/linux-kernel-exploitation
|
||||
|
@ -24,6 +24,7 @@ No PoCs from references.
|
||||
- https://github.com/khanhhdz06/linux-kernel-exploitation
|
||||
- https://github.com/khanhnd123/linux-kernel-exploitation
|
||||
- https://github.com/knd06/linux-kernel-exploitation
|
||||
- https://github.com/ndk06/linux-kernel-exploitation
|
||||
- https://github.com/ndk191/linux-kernel-exploitation
|
||||
- https://github.com/skbasava/Linux-Kernel-exploit
|
||||
- https://github.com/ssr-111/linux-kernel-exploitation
|
||||
|
@ -41,6 +41,7 @@ The (1) pipe_read and (2) pipe_write implementations in fs/pipe.c in the Linux k
|
||||
- https://github.com/knd06/linux-kernel-exploitation
|
||||
- https://github.com/makaitoushi/iovyroot_kyv37
|
||||
- https://github.com/mobilelinux/iovy_root_research
|
||||
- https://github.com/ndk06/linux-kernel-exploitation
|
||||
- https://github.com/ndk191/linux-kernel-exploitation
|
||||
- https://github.com/panyu6325/CVE-2015-1805
|
||||
- https://github.com/skbasava/Linux-Kernel-exploit
|
||||
|
@ -43,6 +43,7 @@ The ping_unhash function in net/ipv4/ping.c in the Linux kernel before 4.0.3 doe
|
||||
- https://github.com/khanhnd123/linux-kernel-exploitation
|
||||
- https://github.com/knd06/linux-kernel-exploitation
|
||||
- https://github.com/ludongxu/cve-2015-3636
|
||||
- https://github.com/ndk06/linux-kernel-exploitation
|
||||
- https://github.com/ndk191/linux-kernel-exploitation
|
||||
- https://github.com/ne2der/AKLab
|
||||
- https://github.com/skbasava/Linux-Kernel-exploit
|
||||
|
@ -74,6 +74,7 @@ The join_session_keyring function in security/keys/process_keys.c in the Linux k
|
||||
- https://github.com/mfer/cve_2016_0728
|
||||
- https://github.com/mudongliang/LinuxFlaw
|
||||
- https://github.com/nardholio/cve-2016-0728
|
||||
- https://github.com/ndk06/linux-kernel-exploitation
|
||||
- https://github.com/ndk191/linux-kernel-exploitation
|
||||
- https://github.com/neuschaefer/cve-2016-0728-testbed
|
||||
- https://github.com/oneoy/cve-
|
||||
|
@ -24,6 +24,7 @@ No PoCs from references.
|
||||
- https://github.com/khanhhdz06/linux-kernel-exploitation
|
||||
- https://github.com/khanhnd123/linux-kernel-exploitation
|
||||
- https://github.com/knd06/linux-kernel-exploitation
|
||||
- https://github.com/ndk06/linux-kernel-exploitation
|
||||
- https://github.com/ndk191/linux-kernel-exploitation
|
||||
- https://github.com/skbasava/Linux-Kernel-exploit
|
||||
- https://github.com/ssr-111/linux-kernel-exploitation
|
||||
|
@ -24,6 +24,7 @@ No PoCs from references.
|
||||
- https://github.com/khanhhdz06/linux-kernel-exploitation
|
||||
- https://github.com/khanhnd123/linux-kernel-exploitation
|
||||
- https://github.com/knd06/linux-kernel-exploitation
|
||||
- https://github.com/ndk06/linux-kernel-exploitation
|
||||
- https://github.com/ndk191/linux-kernel-exploitation
|
||||
- https://github.com/skbasava/Linux-Kernel-exploit
|
||||
- https://github.com/ssr-111/linux-kernel-exploitation
|
||||
|
@ -29,6 +29,7 @@ An elevation of privilege vulnerability in the Motorola bootloader could enable
|
||||
- https://github.com/knd06/linux-kernel-exploitation
|
||||
- https://github.com/leosol/initroot
|
||||
- https://github.com/lnick2023/nicenice
|
||||
- https://github.com/ndk06/linux-kernel-exploitation
|
||||
- https://github.com/ndk191/linux-kernel-exploitation
|
||||
- https://github.com/qazbnm456/awesome-cve-poc
|
||||
- https://github.com/ssr-111/linux-kernel-exploitation
|
||||
|
17
2016/CVE-2016-15027.md
Normal file
17
2016/CVE-2016-15027.md
Normal file
@ -0,0 +1,17 @@
|
||||
### [CVE-2016-15027](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-15027)
|
||||

|
||||

|
||||

|
||||
|
||||
### Description
|
||||
|
||||
A vulnerability was found in meta4creations Post Duplicator Plugin 2.18 on WordPress. It has been classified as problematic. Affected is the function mtphr_post_duplicator_notice of the file includes/notices.php. The manipulation of the argument post-duplicated leads to cross site scripting. It is possible to launch the attack remotely. Upgrading to version 2.19 is able to address this issue. The name of the patch is ca67c05e490c0cf93a1e9b2d93bfeff3dd96f594. It is recommended to upgrade the affected component. The identifier of this vulnerability is VDB-221496.
|
||||
|
||||
### POC
|
||||
|
||||
#### Reference
|
||||
No PoCs from references.
|
||||
|
||||
#### Github
|
||||
- https://github.com/20142995/nuclei-templates
|
||||
|
@ -29,6 +29,7 @@ The ecryptfs_privileged_open function in fs/ecryptfs/kthread.c in the Linux kern
|
||||
- https://github.com/khanhhdz06/linux-kernel-exploitation
|
||||
- https://github.com/khanhnd123/linux-kernel-exploitation
|
||||
- https://github.com/knd06/linux-kernel-exploitation
|
||||
- https://github.com/ndk06/linux-kernel-exploitation
|
||||
- https://github.com/ndk191/linux-kernel-exploitation
|
||||
- https://github.com/skbasava/Linux-Kernel-exploit
|
||||
- https://github.com/ssr-111/linux-kernel-exploitation
|
||||
|
@ -22,6 +22,7 @@ No PoCs from references.
|
||||
- https://github.com/khanhhdz06/linux-kernel-exploitation
|
||||
- https://github.com/khanhnd123/linux-kernel-exploitation
|
||||
- https://github.com/knd06/linux-kernel-exploitation
|
||||
- https://github.com/ndk06/linux-kernel-exploitation
|
||||
- https://github.com/ndk191/linux-kernel-exploitation
|
||||
- https://github.com/ssr-111/linux-kernel-exploitation
|
||||
- https://github.com/wkhnh06/linux-kernel-exploitation
|
||||
|
@ -59,6 +59,7 @@ Double free vulnerability in the snd_usbmidi_create function in sound/usb/midi.c
|
||||
- https://github.com/kumardineshwar/linux-kernel-exploits
|
||||
- https://github.com/lnick2023/nicenice
|
||||
- https://github.com/m0mkris/linux-kernel-exploits
|
||||
- https://github.com/ndk06/linux-kernel-exploitation
|
||||
- https://github.com/ndk191/linux-kernel-exploitation
|
||||
- https://github.com/ozkanbilge/Linux-Kernel-Exploits
|
||||
- https://github.com/password520/linux-kernel-exploits
|
||||
|
@ -25,6 +25,7 @@ No PoCs from references.
|
||||
- https://github.com/khanhhdz06/linux-kernel-exploitation
|
||||
- https://github.com/khanhnd123/linux-kernel-exploitation
|
||||
- https://github.com/knd06/linux-kernel-exploitation
|
||||
- https://github.com/ndk06/linux-kernel-exploitation
|
||||
- https://github.com/ndk191/linux-kernel-exploitation
|
||||
- https://github.com/skbasava/Linux-Kernel-exploit
|
||||
- https://github.com/ssr-111/linux-kernel-exploitation
|
||||
|
@ -37,6 +37,7 @@ No PoCs from references.
|
||||
- https://github.com/khanhnd123/linux-kernel-exploitation
|
||||
- https://github.com/knd06/linux-kernel-exploitation
|
||||
- https://github.com/likescam/exploit_playground_lists_androidCVE
|
||||
- https://github.com/ndk06/linux-kernel-exploitation
|
||||
- https://github.com/ndk191/linux-kernel-exploitation
|
||||
- https://github.com/skbasava/Linux-Kernel-exploit
|
||||
- https://github.com/ssr-111/linux-kernel-exploitation
|
||||
|
@ -25,6 +25,7 @@ No PoCs from references.
|
||||
- https://github.com/khanhhdz06/linux-kernel-exploitation
|
||||
- https://github.com/khanhnd123/linux-kernel-exploitation
|
||||
- https://github.com/knd06/linux-kernel-exploitation
|
||||
- https://github.com/ndk06/linux-kernel-exploitation
|
||||
- https://github.com/ndk191/linux-kernel-exploitation
|
||||
- https://github.com/skbasava/Linux-Kernel-exploit
|
||||
- https://github.com/ssr-111/linux-kernel-exploitation
|
||||
|
@ -24,6 +24,7 @@ No PoCs from references.
|
||||
- https://github.com/khanhhdz06/linux-kernel-exploitation
|
||||
- https://github.com/khanhnd123/linux-kernel-exploitation
|
||||
- https://github.com/knd06/linux-kernel-exploitation
|
||||
- https://github.com/ndk06/linux-kernel-exploitation
|
||||
- https://github.com/ndk191/linux-kernel-exploitation
|
||||
- https://github.com/skbasava/Linux-Kernel-exploit
|
||||
- https://github.com/ssr-111/linux-kernel-exploitation
|
||||
|
@ -22,6 +22,7 @@ No PoCs from references.
|
||||
- https://github.com/khanhhdz06/linux-kernel-exploitation
|
||||
- https://github.com/khanhnd123/linux-kernel-exploitation
|
||||
- https://github.com/knd06/linux-kernel-exploitation
|
||||
- https://github.com/ndk06/linux-kernel-exploitation
|
||||
- https://github.com/ndk191/linux-kernel-exploitation
|
||||
- https://github.com/ssr-111/linux-kernel-exploitation
|
||||
- https://github.com/wkhnh06/linux-kernel-exploitation
|
||||
|
@ -25,6 +25,7 @@ No PoCs from references.
|
||||
- https://github.com/khanhhdz06/linux-kernel-exploitation
|
||||
- https://github.com/khanhnd123/linux-kernel-exploitation
|
||||
- https://github.com/knd06/linux-kernel-exploitation
|
||||
- https://github.com/ndk06/linux-kernel-exploitation
|
||||
- https://github.com/ndk191/linux-kernel-exploitation
|
||||
- https://github.com/skbasava/Linux-Kernel-exploit
|
||||
- https://github.com/ssr-111/linux-kernel-exploitation
|
||||
|
@ -24,6 +24,7 @@ No PoCs from references.
|
||||
- https://github.com/khanhhdz06/linux-kernel-exploitation
|
||||
- https://github.com/khanhnd123/linux-kernel-exploitation
|
||||
- https://github.com/knd06/linux-kernel-exploitation
|
||||
- https://github.com/ndk06/linux-kernel-exploitation
|
||||
- https://github.com/ndk191/linux-kernel-exploitation
|
||||
- https://github.com/skbasava/Linux-Kernel-exploit
|
||||
- https://github.com/ssr-111/linux-kernel-exploitation
|
||||
|
@ -316,6 +316,7 @@ Race condition in mm/gup.c in the Linux kernel 2.x through 4.x before 4.8.3 allo
|
||||
- https://github.com/monkeysm8/OSCP_HELP
|
||||
- https://github.com/naftalyava/DirtyCow-Exploit
|
||||
- https://github.com/nazgul6092/2nd-Year-Project-01-Linux-Exploitation-using-CVE-20166-5195
|
||||
- https://github.com/ndk06/linux-kernel-exploitation
|
||||
- https://github.com/ndk191/linux-kernel-exploitation
|
||||
- https://github.com/ndobson/inspec_CVE-2016-5195
|
||||
- https://github.com/ne2der/AKLab
|
||||
|
@ -22,6 +22,7 @@ No PoCs from references.
|
||||
- https://github.com/khanhhdz06/linux-kernel-exploitation
|
||||
- https://github.com/khanhnd123/linux-kernel-exploitation
|
||||
- https://github.com/knd06/linux-kernel-exploitation
|
||||
- https://github.com/ndk06/linux-kernel-exploitation
|
||||
- https://github.com/ndk191/linux-kernel-exploitation
|
||||
- https://github.com/ssr-111/linux-kernel-exploitation
|
||||
- https://github.com/wkhnh06/linux-kernel-exploitation
|
||||
|
@ -25,6 +25,7 @@ No PoCs from references.
|
||||
- https://github.com/khanhnd123/linux-kernel-exploitation
|
||||
- https://github.com/knd06/linux-kernel-exploitation
|
||||
- https://github.com/mudongliang/LinuxFlaw
|
||||
- https://github.com/ndk06/linux-kernel-exploitation
|
||||
- https://github.com/ndk191/linux-kernel-exploitation
|
||||
- https://github.com/oneoy/cve-
|
||||
- https://github.com/ostrichxyz7/kexps
|
||||
|
@ -25,6 +25,7 @@ No PoCs from references.
|
||||
- https://github.com/khanhnd123/linux-kernel-exploitation
|
||||
- https://github.com/knd06/linux-kernel-exploitation
|
||||
- https://github.com/lnick2023/nicenice
|
||||
- https://github.com/ndk06/linux-kernel-exploitation
|
||||
- https://github.com/ndk191/linux-kernel-exploitation
|
||||
- https://github.com/qazbnm456/awesome-cve-poc
|
||||
- https://github.com/ssr-111/linux-kernel-exploitation
|
||||
|
@ -24,6 +24,7 @@ No PoCs from references.
|
||||
- https://github.com/khanhhdz06/linux-kernel-exploitation
|
||||
- https://github.com/khanhnd123/linux-kernel-exploitation
|
||||
- https://github.com/knd06/linux-kernel-exploitation
|
||||
- https://github.com/ndk06/linux-kernel-exploitation
|
||||
- https://github.com/ndk191/linux-kernel-exploitation
|
||||
- https://github.com/skbasava/Linux-Kernel-exploit
|
||||
- https://github.com/ssr-111/linux-kernel-exploitation
|
||||
|
@ -24,6 +24,7 @@ No PoCs from references.
|
||||
- https://github.com/khanhhdz06/linux-kernel-exploitation
|
||||
- https://github.com/khanhnd123/linux-kernel-exploitation
|
||||
- https://github.com/knd06/linux-kernel-exploitation
|
||||
- https://github.com/ndk06/linux-kernel-exploitation
|
||||
- https://github.com/ndk191/linux-kernel-exploitation
|
||||
- https://github.com/skbasava/Linux-Kernel-exploit
|
||||
- https://github.com/ssr-111/linux-kernel-exploitation
|
||||
|
@ -24,6 +24,7 @@ No PoCs from references.
|
||||
- https://github.com/khanhhdz06/linux-kernel-exploitation
|
||||
- https://github.com/khanhnd123/linux-kernel-exploitation
|
||||
- https://github.com/knd06/linux-kernel-exploitation
|
||||
- https://github.com/ndk06/linux-kernel-exploitation
|
||||
- https://github.com/ndk191/linux-kernel-exploitation
|
||||
- https://github.com/skbasava/Linux-Kernel-exploit
|
||||
- https://github.com/ssr-111/linux-kernel-exploitation
|
||||
|
@ -58,6 +58,7 @@ Race condition in net/packet/af_packet.c in the Linux kernel through 4.8.12 allo
|
||||
- https://github.com/mudongliang/LinuxFlaw
|
||||
- https://github.com/mzet-/linux-exploit-suggester
|
||||
- https://github.com/n3t1nv4d3/kernel-exploits
|
||||
- https://github.com/ndk06/linux-kernel-exploitation
|
||||
- https://github.com/ndk191/linux-kernel-exploitation
|
||||
- https://github.com/oneoy/cve-
|
||||
- https://github.com/ostrichxyz7/kexps
|
||||
|
@ -24,6 +24,7 @@ No PoCs from references.
|
||||
- https://github.com/khanhhdz06/linux-kernel-exploitation
|
||||
- https://github.com/khanhnd123/linux-kernel-exploitation
|
||||
- https://github.com/knd06/linux-kernel-exploitation
|
||||
- https://github.com/ndk06/linux-kernel-exploitation
|
||||
- https://github.com/ndk191/linux-kernel-exploitation
|
||||
- https://github.com/ssr-111/linux-kernel-exploitation
|
||||
- https://github.com/wkhnh06/linux-kernel-exploitation
|
||||
|
@ -23,6 +23,7 @@ No PoCs from references.
|
||||
- https://github.com/khanhhdz06/linux-kernel-exploitation
|
||||
- https://github.com/khanhnd123/linux-kernel-exploitation
|
||||
- https://github.com/knd06/linux-kernel-exploitation
|
||||
- https://github.com/ndk06/linux-kernel-exploitation
|
||||
- https://github.com/ndk191/linux-kernel-exploitation
|
||||
- https://github.com/ssr-111/linux-kernel-exploitation
|
||||
- https://github.com/wkhnh06/linux-kernel-exploitation
|
||||
|
@ -22,6 +22,7 @@ An elevation of privilege vulnerability in the Broadcom Wi-Fi driver could enabl
|
||||
- https://github.com/khanhhdz06/linux-kernel-exploitation
|
||||
- https://github.com/khanhnd123/linux-kernel-exploitation
|
||||
- https://github.com/knd06/linux-kernel-exploitation
|
||||
- https://github.com/ndk06/linux-kernel-exploitation
|
||||
- https://github.com/ndk191/linux-kernel-exploitation
|
||||
- https://github.com/ssr-111/linux-kernel-exploitation
|
||||
- https://github.com/wkhnh06/linux-kernel-exploitation
|
||||
|
@ -81,6 +81,7 @@ Linux kernel: Exploitable memory corruption due to UFO to non-UFO path switch. W
|
||||
- https://github.com/milabs/lkrg-bypass
|
||||
- https://github.com/mzet-/linux-exploit-suggester
|
||||
- https://github.com/n3t1nv4d3/kernel-exploits
|
||||
- https://github.com/ndk06/linux-kernel-exploitation
|
||||
- https://github.com/ndk191/linux-kernel-exploitation
|
||||
- https://github.com/nikaiw/rump
|
||||
- https://github.com/nmvuonginfosec/linux
|
||||
|
@ -44,6 +44,7 @@ The native Bluetooth stack in the Linux Kernel (BlueZ), starting at the Linux ke
|
||||
- https://github.com/lnick2023/nicenice
|
||||
- https://github.com/marcinguy/blueborne-CVE-2017-1000251
|
||||
- https://github.com/marcinguy/kernel-exploitation
|
||||
- https://github.com/ndk06/linux-kernel-exploitation
|
||||
- https://github.com/ndk191/linux-kernel-exploitation
|
||||
- https://github.com/own2pwn/blueborne-CVE-2017-1000251-POC
|
||||
- https://github.com/qazbnm456/awesome-cve-poc
|
||||
|
@ -24,6 +24,7 @@ No PoCs from references.
|
||||
- https://github.com/khanhhdz06/linux-kernel-exploitation
|
||||
- https://github.com/khanhnd123/linux-kernel-exploitation
|
||||
- https://github.com/knd06/linux-kernel-exploitation
|
||||
- https://github.com/ndk06/linux-kernel-exploitation
|
||||
- https://github.com/ndk191/linux-kernel-exploitation
|
||||
- https://github.com/ssr-111/linux-kernel-exploitation
|
||||
- https://github.com/wkhnh06/linux-kernel-exploitation
|
||||
|
@ -25,6 +25,7 @@ sound/core/timer.c in the Linux kernel before 4.11.5 is vulnerable to a data rac
|
||||
- https://github.com/khanhhdz06/linux-kernel-exploitation
|
||||
- https://github.com/khanhnd123/linux-kernel-exploitation
|
||||
- https://github.com/knd06/linux-kernel-exploitation
|
||||
- https://github.com/ndk06/linux-kernel-exploitation
|
||||
- https://github.com/ndk191/linux-kernel-exploitation
|
||||
- https://github.com/ssr-111/linux-kernel-exploitation
|
||||
- https://github.com/wkhnh06/linux-kernel-exploitation
|
||||
|
@ -24,6 +24,7 @@ Race condition in fs/timerfd.c in the Linux kernel before 4.10.15 allows local u
|
||||
- https://github.com/khanhnd123/linux-kernel-exploitation
|
||||
- https://github.com/knd06/linux-kernel-exploitation
|
||||
- https://github.com/lnick2023/nicenice
|
||||
- https://github.com/ndk06/linux-kernel-exploitation
|
||||
- https://github.com/ndk191/linux-kernel-exploitation
|
||||
- https://github.com/ostrichxyz7/kexps
|
||||
- https://github.com/qazbnm456/awesome-cve-poc
|
||||
|
@ -48,6 +48,7 @@ The mq_notify function in the Linux kernel through 4.11.9 does not set the sock
|
||||
- https://github.com/knd06/linux-kernel-exploitation
|
||||
- https://github.com/leonardo1101/cve-2017-11176
|
||||
- https://github.com/lexfo/cve-2017-11176
|
||||
- https://github.com/ndk06/linux-kernel-exploitation
|
||||
- https://github.com/ndk191/linux-kernel-exploitation
|
||||
- https://github.com/ostrichxyz7/kexps
|
||||
- https://github.com/paulveillard/cybersecurity-exploit-development
|
||||
|
@ -99,6 +99,7 @@ The check_alu_op function in kernel/bpf/verifier.c in the Linux kernel through 4
|
||||
- https://github.com/lnick2023/nicenice
|
||||
- https://github.com/mareks1007/cve-2017-16995
|
||||
- https://github.com/mzet-/linux-exploit-suggester
|
||||
- https://github.com/ndk06/linux-kernel-exploitation
|
||||
- https://github.com/ndk191/linux-kernel-exploitation
|
||||
- https://github.com/ozkanbilge/Linux-Kernel-Exploits
|
||||
- https://github.com/ozkanbilge/Ubuntu16.04-0day-Local-Root
|
||||
|
@ -28,6 +28,7 @@ The timer_create syscall implementation in kernel/time/posix-timers.c in the Lin
|
||||
- https://github.com/khanhnd123/linux-kernel-exploitation
|
||||
- https://github.com/knd06/linux-kernel-exploitation
|
||||
- https://github.com/lnick2023/nicenice
|
||||
- https://github.com/ndk06/linux-kernel-exploitation
|
||||
- https://github.com/ndk191/linux-kernel-exploitation
|
||||
- https://github.com/qazbnm456/awesome-cve-poc
|
||||
- https://github.com/ssr-111/linux-kernel-exploitation
|
||||
|
@ -28,6 +28,7 @@ Race condition in drivers/tty/n_hdlc.c in the Linux kernel through 4.10.1 allows
|
||||
- https://github.com/khanhnd123/linux-kernel-exploitation
|
||||
- https://github.com/knd06/linux-kernel-exploitation
|
||||
- https://github.com/lnick2023/nicenice
|
||||
- https://github.com/ndk06/linux-kernel-exploitation
|
||||
- https://github.com/ndk191/linux-kernel-exploitation
|
||||
- https://github.com/ostrichxyz7/kexps
|
||||
- https://github.com/qazbnm456/awesome-cve-poc
|
||||
|
@ -74,6 +74,7 @@ Insufficient data validation in waitid allowed an user to escape sandboxes on Li
|
||||
- https://github.com/m0mkris/linux-kernel-exploits
|
||||
- https://github.com/m0nad/awesome-privilege-escalation
|
||||
- https://github.com/manikanta-suru/cybersecurity-container-security
|
||||
- https://github.com/ndk06/linux-kernel-exploitation
|
||||
- https://github.com/ndk191/linux-kernel-exploitation
|
||||
- https://github.com/ozkanbilge/Linux-Kernel-Exploits
|
||||
- https://github.com/password520/linux-kernel-exploits
|
||||
|
@ -76,6 +76,7 @@ The dccp_rcv_state_process function in net/dccp/input.c in the Linux kernel thro
|
||||
- https://github.com/lnick2023/nicenice
|
||||
- https://github.com/m0mkris/linux-kernel-exploits
|
||||
- https://github.com/mateeuslinno/kernel-linux-xpls
|
||||
- https://github.com/ndk06/linux-kernel-exploitation
|
||||
- https://github.com/ndk191/linux-kernel-exploitation
|
||||
- https://github.com/ostrichxyz7/kexps
|
||||
- https://github.com/ozkanbilge/Linux-Kernel-Exploits
|
||||
|
@ -26,6 +26,7 @@ The xfrm_replay_verify_len function in net/xfrm/xfrm_user.c in the Linux kernel
|
||||
- https://github.com/khanhnd123/linux-kernel-exploitation
|
||||
- https://github.com/knd06/linux-kernel-exploitation
|
||||
- https://github.com/mudongliang/LinuxFlaw
|
||||
- https://github.com/ndk06/linux-kernel-exploitation
|
||||
- https://github.com/ndk191/linux-kernel-exploitation
|
||||
- https://github.com/oneoy/cve-
|
||||
- https://github.com/ostrichxyz7/kexps
|
||||
|
@ -73,6 +73,7 @@ The packet_set_ring function in net/packet/af_packet.c in the Linux kernel throu
|
||||
- https://github.com/mateeuslinno/kernel-linux-xpls
|
||||
- https://github.com/mudongliang/LinuxFlaw
|
||||
- https://github.com/n3t1nv4d3/kernel-exploits
|
||||
- https://github.com/ndk06/linux-kernel-exploitation
|
||||
- https://github.com/ndk191/linux-kernel-exploitation
|
||||
- https://github.com/oneoy/cve-
|
||||
- https://github.com/ostrichxyz7/kexps
|
||||
|
@ -24,6 +24,7 @@ No PoCs from references.
|
||||
- https://github.com/khanhhdz06/linux-kernel-exploitation
|
||||
- https://github.com/khanhnd123/linux-kernel-exploitation
|
||||
- https://github.com/knd06/linux-kernel-exploitation
|
||||
- https://github.com/ndk06/linux-kernel-exploitation
|
||||
- https://github.com/ndk191/linux-kernel-exploitation
|
||||
- https://github.com/skbasava/Linux-Kernel-exploit
|
||||
- https://github.com/ssr-111/linux-kernel-exploitation
|
||||
|
@ -11,6 +11,7 @@ A flaw was found in the way Linux kernel KVM hypervisor before 4.18 emulated ins
|
||||
|
||||
#### Reference
|
||||
- https://usn.ubuntu.com/3777-1/
|
||||
- https://usn.ubuntu.com/3777-2/
|
||||
|
||||
#### Github
|
||||
- https://github.com/ARPSyndicate/cvemon
|
||||
|
@ -11,6 +11,7 @@ A security flaw was found in the chap_server_compute_md5() function in the ISCSI
|
||||
|
||||
#### Reference
|
||||
- https://usn.ubuntu.com/3777-1/
|
||||
- https://usn.ubuntu.com/3777-2/
|
||||
- https://usn.ubuntu.com/3777-3/
|
||||
|
||||
#### Github
|
||||
|
@ -30,6 +30,7 @@ An integer overflow flaw was found in the Linux kernel's create_elf_tables() fun
|
||||
- https://github.com/knd06/linux-kernel-exploitation
|
||||
- https://github.com/lnick2023/nicenice
|
||||
- https://github.com/luan0ap/cve-2018-14634
|
||||
- https://github.com/ndk06/linux-kernel-exploitation
|
||||
- https://github.com/ndk191/linux-kernel-exploitation
|
||||
- https://github.com/qazbnm456/awesome-cve-poc
|
||||
- https://github.com/ssr-111/linux-kernel-exploitation
|
||||
|
@ -11,6 +11,7 @@ The spectre_v2_select_mitigation function in arch/x86/kernel/cpu/bugs.c in the L
|
||||
|
||||
#### Reference
|
||||
- https://usn.ubuntu.com/3777-1/
|
||||
- https://usn.ubuntu.com/3777-2/
|
||||
- https://usn.ubuntu.com/3777-3/
|
||||
|
||||
#### Github
|
||||
|
@ -11,6 +11,7 @@ arch/x86/kernel/paravirt.c in the Linux kernel before 4.18.1 mishandles certain
|
||||
|
||||
#### Reference
|
||||
- https://usn.ubuntu.com/3777-1/
|
||||
- https://usn.ubuntu.com/3777-2/
|
||||
- https://usn.ubuntu.com/3777-3/
|
||||
|
||||
#### Github
|
||||
|
@ -18,5 +18,6 @@ Microsoft ADFS 4.0 Windows Server 2016 and previous (Active Directory Federation
|
||||
- https://github.com/0dayhunter/Facebook-BugBounty-Writeups
|
||||
- https://github.com/Jester0x01/Facebook-Bug-Bounty-Writeups
|
||||
- https://github.com/Krishnathakur063/Facebook-BugBounty-Writeup
|
||||
- https://github.com/bikramsah/Meta--BugBounty-Writeups
|
||||
- https://github.com/jaiswalakshansh/Facebook-BugBounty-Writeups
|
||||
|
||||
|
@ -11,6 +11,7 @@ An issue was discovered in the Linux kernel through 4.18.8. The vmacache_flush_a
|
||||
|
||||
#### Reference
|
||||
- https://usn.ubuntu.com/3777-1/
|
||||
- https://usn.ubuntu.com/3777-2/
|
||||
- https://usn.ubuntu.com/3777-3/
|
||||
- https://www.exploit-db.com/exploits/45497/
|
||||
|
||||
@ -53,6 +54,7 @@ An issue was discovered in the Linux kernel through 4.18.8. The vmacache_flush_a
|
||||
- https://github.com/likescam/vmacache_CVE-2018-17182
|
||||
- https://github.com/lnick2023/nicenice
|
||||
- https://github.com/lp008/Hack-readme
|
||||
- https://github.com/ndk06/linux-kernel-exploitation
|
||||
- https://github.com/ndk191/linux-kernel-exploitation
|
||||
- https://github.com/nobiusmallyu/kehai
|
||||
- https://github.com/qazbnm456/awesome-cve-poc
|
||||
|
@ -23,6 +23,7 @@ Since Linux kernel version 3.2, the mremap() syscall performs TLB flushes after
|
||||
- https://github.com/khanhhdz06/linux-kernel-exploitation
|
||||
- https://github.com/khanhnd123/linux-kernel-exploitation
|
||||
- https://github.com/knd06/linux-kernel-exploitation
|
||||
- https://github.com/ndk06/linux-kernel-exploitation
|
||||
- https://github.com/ndk191/linux-kernel-exploitation
|
||||
- https://github.com/ssr-111/linux-kernel-exploitation
|
||||
- https://github.com/wkhnh06/linux-kernel-exploitation
|
||||
|
@ -61,6 +61,7 @@ Systems with microprocessors utilizing speculative execution and speculative exe
|
||||
- https://github.com/mjaggi-cavium/spectre-meltdown-checker
|
||||
- https://github.com/mmxsrup/CVE-2018-3639
|
||||
- https://github.com/morning21/Spectre_Meltdown_MDS_srcs
|
||||
- https://github.com/ndk06/linux-kernel-exploitation
|
||||
- https://github.com/ndk191/linux-kernel-exploitation
|
||||
- https://github.com/nmosier/clou-bugs
|
||||
- https://github.com/nsacyber/Hardware-and-Firmware-Security-Guidance
|
||||
|
@ -11,6 +11,7 @@ Memory leak in the irda_bind function in net/irda/af_irda.c and later in drivers
|
||||
|
||||
#### Reference
|
||||
- https://usn.ubuntu.com/3777-1/
|
||||
- https://usn.ubuntu.com/3777-2/
|
||||
- https://usn.ubuntu.com/3777-3/
|
||||
|
||||
#### Github
|
||||
@ -24,6 +25,7 @@ Memory leak in the irda_bind function in net/irda/af_irda.c and later in drivers
|
||||
- https://github.com/khanhhdz06/linux-kernel-exploitation
|
||||
- https://github.com/khanhnd123/linux-kernel-exploitation
|
||||
- https://github.com/knd06/linux-kernel-exploitation
|
||||
- https://github.com/ndk06/linux-kernel-exploitation
|
||||
- https://github.com/ndk191/linux-kernel-exploitation
|
||||
- https://github.com/ssr-111/linux-kernel-exploitation
|
||||
- https://github.com/wkhnh06/linux-kernel-exploitation
|
||||
|
@ -11,6 +11,7 @@ The irda_setsockopt function in net/irda/af_irda.c and later in drivers/staging/
|
||||
|
||||
#### Reference
|
||||
- https://usn.ubuntu.com/3777-1/
|
||||
- https://usn.ubuntu.com/3777-2/
|
||||
- https://usn.ubuntu.com/3777-3/
|
||||
|
||||
#### Github
|
||||
@ -23,6 +24,7 @@ The irda_setsockopt function in net/irda/af_irda.c and later in drivers/staging/
|
||||
- https://github.com/khanhhdz06/linux-kernel-exploitation
|
||||
- https://github.com/khanhnd123/linux-kernel-exploitation
|
||||
- https://github.com/knd06/linux-kernel-exploitation
|
||||
- https://github.com/ndk06/linux-kernel-exploitation
|
||||
- https://github.com/ndk191/linux-kernel-exploitation
|
||||
- https://github.com/ostrichxyz7/kexps
|
||||
- https://github.com/ssr-111/linux-kernel-exploitation
|
||||
|
@ -23,6 +23,7 @@ No PoCs from references.
|
||||
- https://github.com/khanhhdz06/linux-kernel-exploitation
|
||||
- https://github.com/khanhnd123/linux-kernel-exploitation
|
||||
- https://github.com/knd06/linux-kernel-exploitation
|
||||
- https://github.com/ndk06/linux-kernel-exploitation
|
||||
- https://github.com/ndk191/linux-kernel-exploitation
|
||||
- https://github.com/ssr-111/linux-kernel-exploitation
|
||||
- https://github.com/wkhnh06/linux-kernel-exploitation
|
||||
|
@ -24,6 +24,7 @@ No PoCs from references.
|
||||
- https://github.com/khanhhdz06/linux-kernel-exploitation
|
||||
- https://github.com/khanhnd123/linux-kernel-exploitation
|
||||
- https://github.com/knd06/linux-kernel-exploitation
|
||||
- https://github.com/ndk06/linux-kernel-exploitation
|
||||
- https://github.com/ndk191/linux-kernel-exploitation
|
||||
- https://github.com/ssr-111/linux-kernel-exploitation
|
||||
- https://github.com/wkhnh06/linux-kernel-exploitation
|
||||
|
@ -22,6 +22,7 @@ There is a way to deceive the GPU kernel driver into thinking there is room in t
|
||||
- https://github.com/khanhhdz06/linux-kernel-exploitation
|
||||
- https://github.com/khanhnd123/linux-kernel-exploitation
|
||||
- https://github.com/knd06/linux-kernel-exploitation
|
||||
- https://github.com/ndk06/linux-kernel-exploitation
|
||||
- https://github.com/ndk191/linux-kernel-exploitation
|
||||
- https://github.com/secmob/TiYunZong-An-Exploit-Chain-to-Remotely-Root-Modern-Android-Devices
|
||||
- https://github.com/ssr-111/linux-kernel-exploitation
|
||||
|
@ -24,6 +24,7 @@ The Linux kernel before 4.8 allows local users to bypass ASLR on setuid programs
|
||||
- https://github.com/khanhhdz06/linux-kernel-exploitation
|
||||
- https://github.com/khanhnd123/linux-kernel-exploitation
|
||||
- https://github.com/knd06/linux-kernel-exploitation
|
||||
- https://github.com/ndk06/linux-kernel-exploitation
|
||||
- https://github.com/ndk191/linux-kernel-exploitation
|
||||
- https://github.com/ssr-111/linux-kernel-exploitation
|
||||
- https://github.com/wkhnh06/linux-kernel-exploitation
|
||||
|
@ -20,6 +20,8 @@ No PoCs from references.
|
||||
#### Github
|
||||
- https://github.com/0dayhunter/Windows-Privilege-Escalation-Resources
|
||||
- https://github.com/0xT11/CVE-POC
|
||||
- https://github.com/1dika1/network
|
||||
- https://github.com/1dika1/vsvs
|
||||
- https://github.com/20142995/sectool
|
||||
- https://github.com/ARPSyndicate/cvemon
|
||||
- https://github.com/Abbykito/WINDOWS_PREVILAGEESCALATIONS
|
||||
|
@ -25,6 +25,7 @@ Using memory after being freed in qsee due to wrong implementation can lead to u
|
||||
- https://github.com/khanhhdz06/linux-kernel-exploitation
|
||||
- https://github.com/khanhnd123/linux-kernel-exploitation
|
||||
- https://github.com/knd06/linux-kernel-exploitation
|
||||
- https://github.com/ndk06/linux-kernel-exploitation
|
||||
- https://github.com/ndk191/linux-kernel-exploitation
|
||||
- https://github.com/ssr-111/linux-kernel-exploitation
|
||||
- https://github.com/tamirzb/CVE-2019-14040
|
||||
|
@ -25,6 +25,7 @@ During listener modified response processing, a buffer overrun occurs due to lac
|
||||
- https://github.com/khanhhdz06/linux-kernel-exploitation
|
||||
- https://github.com/khanhnd123/linux-kernel-exploitation
|
||||
- https://github.com/knd06/linux-kernel-exploitation
|
||||
- https://github.com/ndk06/linux-kernel-exploitation
|
||||
- https://github.com/ndk191/linux-kernel-exploitation
|
||||
- https://github.com/ssr-111/linux-kernel-exploitation
|
||||
- https://github.com/tamirzb/CVE-2019-14041
|
||||
|
@ -22,6 +22,7 @@ No PoCs from references.
|
||||
- https://github.com/khanhhdz06/linux-kernel-exploitation
|
||||
- https://github.com/khanhnd123/linux-kernel-exploitation
|
||||
- https://github.com/knd06/linux-kernel-exploitation
|
||||
- https://github.com/ndk06/linux-kernel-exploitation
|
||||
- https://github.com/ndk191/linux-kernel-exploitation
|
||||
- https://github.com/ssr-111/linux-kernel-exploitation
|
||||
- https://github.com/wkhnh06/linux-kernel-exploitation
|
||||
|
17
2019/CVE-2019-17072.md
Normal file
17
2019/CVE-2019-17072.md
Normal file
@ -0,0 +1,17 @@
|
||||
### [CVE-2019-17072](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17072)
|
||||

|
||||

|
||||

|
||||
|
||||
### Description
|
||||
|
||||
The new-contact-form-widget (aka Contact Form Widget - Contact Query, Form Maker) plugin 1.0.9 for WordPress has SQL Injection via all-query-page.php.
|
||||
|
||||
### POC
|
||||
|
||||
#### Reference
|
||||
No PoCs from references.
|
||||
|
||||
#### Github
|
||||
- https://github.com/20142995/nuclei-templates
|
||||
|
@ -19,6 +19,7 @@ A vulnerability in WhatsApp Desktop versions prior to 0.3.9309 when paired with
|
||||
- https://github.com/Ostorlab/known_exploited_vulnerbilities_detectors
|
||||
- https://github.com/PerimeterX/CVE-2019-18426
|
||||
- https://github.com/abhav/nvd_scrapper
|
||||
- https://github.com/bikramsah/Meta--BugBounty-Writeups
|
||||
- https://github.com/developer3000S/PoC-in-GitHub
|
||||
- https://github.com/hectorgie/PoC-in-GitHub
|
||||
- https://github.com/jaiswalakshansh/Facebook-BugBounty-Writeups
|
||||
|
@ -24,6 +24,7 @@ The Linux kernel through 5.3.13 has a start_offset+size Integer Overflow in cpia
|
||||
- https://github.com/khanhhdz06/linux-kernel-exploitation
|
||||
- https://github.com/khanhnd123/linux-kernel-exploitation
|
||||
- https://github.com/knd06/linux-kernel-exploitation
|
||||
- https://github.com/ndk06/linux-kernel-exploitation
|
||||
- https://github.com/ndk191/linux-kernel-exploitation
|
||||
- https://github.com/ssr-111/linux-kernel-exploitation
|
||||
- https://github.com/wkhnh06/linux-kernel-exploitation
|
||||
|
@ -33,6 +33,7 @@ An issue was discovered in drivers/media/platform/vivid in the Linux kernel thro
|
||||
- https://github.com/khanhnd123/linux-kernel-exploitation
|
||||
- https://github.com/knd06/linux-kernel-exploitation
|
||||
- https://github.com/lnick2023/nicenice
|
||||
- https://github.com/ndk06/linux-kernel-exploitation
|
||||
- https://github.com/ndk191/linux-kernel-exploitation
|
||||
- https://github.com/qazbnm456/awesome-cve-poc
|
||||
- https://github.com/sanjana123-cloud/CVE-2019-18683
|
||||
|
@ -23,6 +23,7 @@ In the Linux kernel 5.0.21, mounting a crafted btrfs filesystem image, performin
|
||||
- https://github.com/khanhhdz06/linux-kernel-exploitation
|
||||
- https://github.com/khanhnd123/linux-kernel-exploitation
|
||||
- https://github.com/knd06/linux-kernel-exploitation
|
||||
- https://github.com/ndk06/linux-kernel-exploitation
|
||||
- https://github.com/ndk191/linux-kernel-exploitation
|
||||
- https://github.com/ssr-111/linux-kernel-exploitation
|
||||
- https://github.com/wkhnh06/linux-kernel-exploitation
|
||||
|
Some files were not shown because too many files have changed in this diff Show More
Loading…
x
Reference in New Issue
Block a user