Update CVE sources 2024-08-11 18:44

This commit is contained in:
0xMarcio 2024-08-11 18:44:53 +00:00
parent d527075578
commit 8654f5abb7
298 changed files with 1171 additions and 54 deletions

View File

@ -53,6 +53,7 @@ The do_mremap function for the mremap system call in Linux 2.2 to 2.2.25, 2.4 to
- https://github.com/knd06/linux-kernel-exploitation
- https://github.com/kumardineshwar/linux-kernel-exploits
- https://github.com/m0mkris/linux-kernel-exploits
- https://github.com/ndk06/linux-kernel-exploitation
- https://github.com/ndk191/linux-kernel-exploitation
- https://github.com/ozkanbilge/Linux-Kernel-Exploits
- https://github.com/p00h00/linux-exploits

View File

@ -24,6 +24,7 @@ The IA32 system call emulation functionality in Linux kernel 2.4.x and 2.6.x bef
- https://github.com/khanhhdz06/linux-kernel-exploitation
- https://github.com/khanhnd123/linux-kernel-exploitation
- https://github.com/knd06/linux-kernel-exploitation
- https://github.com/ndk06/linux-kernel-exploitation
- https://github.com/ndk191/linux-kernel-exploitation
- https://github.com/skbasava/Linux-Kernel-exploit
- https://github.com/ssr-111/linux-kernel-exploitation

View File

@ -10,6 +10,7 @@ The SNMP agent (snmp_agent.c) in net-snmp before 5.4.1 allows remote attackers t
### POC
#### Reference
- http://www.ubuntu.com/usn/usn-564-1
- https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA43730
#### Github

View File

@ -24,6 +24,7 @@ No PoCs from references.
- https://github.com/khanhhdz06/linux-kernel-exploitation
- https://github.com/khanhnd123/linux-kernel-exploitation
- https://github.com/knd06/linux-kernel-exploitation
- https://github.com/ndk06/linux-kernel-exploitation
- https://github.com/ndk191/linux-kernel-exploitation
- https://github.com/skbasava/Linux-Kernel-exploit
- https://github.com/ssr-111/linux-kernel-exploitation

View File

@ -24,6 +24,7 @@ The copy_from_user_mmap_sem function in fs/splice.c in the Linux kernel 2.6.22 t
- https://github.com/khanhhdz06/linux-kernel-exploitation
- https://github.com/khanhnd123/linux-kernel-exploitation
- https://github.com/knd06/linux-kernel-exploitation
- https://github.com/ndk06/linux-kernel-exploitation
- https://github.com/ndk191/linux-kernel-exploitation
- https://github.com/skbasava/Linux-Kernel-exploit
- https://github.com/ssr-111/linux-kernel-exploitation

View File

@ -51,6 +51,7 @@ The vmsplice_to_pipe function in Linux kernel 2.6.17 through 2.6.24.1 does not v
- https://github.com/knd06/linux-kernel-exploitation
- https://github.com/kumardineshwar/linux-kernel-exploits
- https://github.com/m0mkris/linux-kernel-exploits
- https://github.com/ndk06/linux-kernel-exploitation
- https://github.com/ndk191/linux-kernel-exploitation
- https://github.com/ozkanbilge/Linux-Kernel-Exploits
- https://github.com/p00h00/linux-exploits

View File

@ -24,6 +24,7 @@ No PoCs from references.
- https://github.com/khanhhdz06/linux-kernel-exploitation
- https://github.com/khanhnd123/linux-kernel-exploitation
- https://github.com/knd06/linux-kernel-exploitation
- https://github.com/ndk06/linux-kernel-exploitation
- https://github.com/ndk191/linux-kernel-exploitation
- https://github.com/skbasava/Linux-Kernel-exploit
- https://github.com/ssr-111/linux-kernel-exploitation

View File

@ -24,6 +24,7 @@ No PoCs from references.
- https://github.com/khanhhdz06/linux-kernel-exploitation
- https://github.com/khanhnd123/linux-kernel-exploitation
- https://github.com/knd06/linux-kernel-exploitation
- https://github.com/ndk06/linux-kernel-exploitation
- https://github.com/ndk191/linux-kernel-exploitation
- https://github.com/skbasava/Linux-Kernel-exploit
- https://github.com/ssr-111/linux-kernel-exploitation

View File

@ -59,6 +59,7 @@ The Linux kernel 2.6.0 through 2.6.30.4, and 2.4.4 through 2.4.37.4, does not in
- https://github.com/kumardineshwar/linux-kernel-exploits
- https://github.com/m0mkris/linux-kernel-exploits
- https://github.com/moshekaplan/pentesting_notes
- https://github.com/ndk06/linux-kernel-exploitation
- https://github.com/ndk191/linux-kernel-exploitation
- https://github.com/ozkanbilge/Linux-Kernel-Exploits
- https://github.com/p00h00/linux-exploits

View File

@ -24,6 +24,7 @@ No PoCs from references.
- https://github.com/khanhhdz06/linux-kernel-exploitation
- https://github.com/khanhnd123/linux-kernel-exploitation
- https://github.com/knd06/linux-kernel-exploitation
- https://github.com/ndk06/linux-kernel-exploitation
- https://github.com/ndk191/linux-kernel-exploitation
- https://github.com/skbasava/Linux-Kernel-exploit
- https://github.com/ssr-111/linux-kernel-exploitation

View File

@ -24,6 +24,7 @@ No PoCs from references.
- https://github.com/khanhhdz06/linux-kernel-exploitation
- https://github.com/khanhnd123/linux-kernel-exploitation
- https://github.com/knd06/linux-kernel-exploitation
- https://github.com/ndk06/linux-kernel-exploitation
- https://github.com/ndk191/linux-kernel-exploitation
- https://github.com/skbasava/Linux-Kernel-exploit
- https://github.com/ssr-111/linux-kernel-exploitation

View File

@ -24,6 +24,7 @@ The do_anonymous_page function in mm/memory.c in the Linux kernel before 2.6.27.
- https://github.com/khanhhdz06/linux-kernel-exploitation
- https://github.com/khanhnd123/linux-kernel-exploitation
- https://github.com/knd06/linux-kernel-exploitation
- https://github.com/ndk06/linux-kernel-exploitation
- https://github.com/ndk191/linux-kernel-exploitation
- https://github.com/ssr-111/linux-kernel-exploitation
- https://github.com/wkhnh06/linux-kernel-exploitation

View File

@ -84,6 +84,7 @@ No PoCs from references.
- https://github.com/mmt55/kalilinux
- https://github.com/monkeysm8/OSCP_HELP
- https://github.com/mudongliang/LinuxFlaw
- https://github.com/ndk06/linux-kernel-exploitation
- https://github.com/ndk191/linux-kernel-exploitation
- https://github.com/nitishbadole/hacking_30
- https://github.com/oneoy/cve-

View File

@ -24,6 +24,7 @@ drivers/media/video/v4l2-compat-ioctl32.c in the Video4Linux (V4L) implementatio
- https://github.com/khanhhdz06/linux-kernel-exploitation
- https://github.com/khanhnd123/linux-kernel-exploitation
- https://github.com/knd06/linux-kernel-exploitation
- https://github.com/ndk06/linux-kernel-exploitation
- https://github.com/ndk191/linux-kernel-exploitation
- https://github.com/skbasava/Linux-Kernel-exploit
- https://github.com/ssr-111/linux-kernel-exploitation

View File

@ -55,6 +55,7 @@ The compat_alloc_user_space functions in include/asm/compat.h files in the Linux
- https://github.com/knd06/linux-kernel-exploitation
- https://github.com/kumardineshwar/linux-kernel-exploits
- https://github.com/m0mkris/linux-kernel-exploits
- https://github.com/ndk06/linux-kernel-exploitation
- https://github.com/ndk191/linux-kernel-exploitation
- https://github.com/ozkanbilge/Linux-Kernel-Exploits
- https://github.com/p00h00/linux-exploits

View File

@ -54,6 +54,7 @@ The IA32 system call emulation functionality in arch/x86/ia32/ia32entry.S in the
- https://github.com/knd06/linux-kernel-exploitation
- https://github.com/kumardineshwar/linux-kernel-exploits
- https://github.com/m0mkris/linux-kernel-exploits
- https://github.com/ndk06/linux-kernel-exploitation
- https://github.com/ndk191/linux-kernel-exploitation
- https://github.com/ozkanbilge/Linux-Kernel-Exploits
- https://github.com/p00h00/linux-exploits

View File

@ -52,6 +52,7 @@ Integer signedness error in the pkt_find_dev_from_minor function in drivers/bloc
- https://github.com/knd06/linux-kernel-exploitation
- https://github.com/kumardineshwar/linux-kernel-exploits
- https://github.com/m0mkris/linux-kernel-exploits
- https://github.com/ndk06/linux-kernel-exploitation
- https://github.com/ndk191/linux-kernel-exploitation
- https://github.com/ozkanbilge/Linux-Kernel-Exploits
- https://github.com/p00h00/linux-exploits

View File

@ -57,6 +57,7 @@ The do_exit function in kernel/exit.c in the Linux kernel before 2.6.36.2 does n
- https://github.com/knd06/linux-kernel-exploitation
- https://github.com/kumardineshwar/linux-kernel-exploits
- https://github.com/m0mkris/linux-kernel-exploits
- https://github.com/ndk06/linux-kernel-exploitation
- https://github.com/ndk191/linux-kernel-exploitation
- https://github.com/ozkanbilge/Linux-Kernel-Exploits
- https://github.com/p00h00/linux-exploits

View File

@ -24,6 +24,7 @@ No PoCs from references.
- https://github.com/khanhhdz06/linux-kernel-exploitation
- https://github.com/khanhnd123/linux-kernel-exploitation
- https://github.com/knd06/linux-kernel-exploitation
- https://github.com/ndk06/linux-kernel-exploitation
- https://github.com/ndk191/linux-kernel-exploitation
- https://github.com/skbasava/Linux-Kernel-exploit
- https://github.com/ssr-111/linux-kernel-exploitation

View File

@ -114,6 +114,7 @@ No PoCs from references.
- https://github.com/mjutsu/OSCP
- https://github.com/mmt55/kalilinux
- https://github.com/monkeysm8/OSCP_HELP
- https://github.com/ndk06/linux-kernel-exploitation
- https://github.com/ndk191/linux-kernel-exploitation
- https://github.com/nitishbadole/hacking_30
- https://github.com/nmvuonginfosec/linux

17
2013/CVE-2013-10024.md Normal file
View File

@ -0,0 +1,17 @@
### [CVE-2013-10024](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-10024)
![](https://img.shields.io/static/v1?label=Product&message=Exit%20Strategy%20Plugin&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=%3D%201.55%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-200%20Information%20Disclosure&color=brighgreen)
### Description
A vulnerability has been found in Exit Strategy Plugin 1.55 on WordPress and classified as problematic. Affected by this vulnerability is an unknown functionality of the file exitpage.php. The manipulation leads to information disclosure. The attack can be launched remotely. Upgrading to version 1.59 is able to address this issue. The identifier of the patch is d964b8e961b2634158719f3328f16eda16ce93ac. It is recommended to upgrade the affected component. The identifier VDB-225265 was assigned to this vulnerability.
### POC
#### Reference
No PoCs from references.
#### Github
- https://github.com/20142995/nuclei-templates

View File

@ -55,6 +55,7 @@ Array index error in the __sock_diag_rcv_msg function in net/core/sock_diag.c in
- https://github.com/knd06/linux-kernel-exploitation
- https://github.com/kumardineshwar/linux-kernel-exploits
- https://github.com/m0mkris/linux-kernel-exploits
- https://github.com/ndk06/linux-kernel-exploitation
- https://github.com/ndk191/linux-kernel-exploitation
- https://github.com/ozkanbilge/Linux-Kernel-Exploits
- https://github.com/password520/linux-kernel-exploits

View File

@ -80,6 +80,7 @@ The perf_swevent_init function in kernel/events/core.c in the Linux kernel befor
- https://github.com/lushtree-cn-honeyzhao/awesome-c
- https://github.com/m0mkris/linux-kernel-exploits
- https://github.com/maririn312/Linux_menthor
- https://github.com/ndk06/linux-kernel-exploitation
- https://github.com/ndk191/linux-kernel-exploitation
- https://github.com/nmvuonginfosec/linux
- https://github.com/ozkanbilge/Linux-Kernel-Exploits

View File

@ -67,6 +67,7 @@ The compat_sys_recvmmsg function in net/compat.c in the Linux kernel before 3.13
- https://github.com/kumardineshwar/linux-kernel-exploits
- https://github.com/lushtree-cn-honeyzhao/awesome-c
- https://github.com/m0mkris/linux-kernel-exploits
- https://github.com/ndk06/linux-kernel-exploitation
- https://github.com/ndk191/linux-kernel-exploitation
- https://github.com/ozkanbilge/Linux-Kernel-Exploits
- https://github.com/p00h00/linux-exploits

View File

@ -61,6 +61,7 @@ The n_tty_write function in drivers/tty/n_tty.c in the Linux kernel through 3.14
- https://github.com/knd06/linux-kernel-exploitation
- https://github.com/kumardineshwar/linux-kernel-exploits
- https://github.com/m0mkris/linux-kernel-exploits
- https://github.com/ndk06/linux-kernel-exploitation
- https://github.com/ndk191/linux-kernel-exploitation
- https://github.com/ozkanbilge/Linux-Kernel-Exploits
- https://github.com/p00h00/linux-exploits

View File

@ -25,6 +25,7 @@ No PoCs from references.
- https://github.com/khanhnd123/linux-kernel-exploitation
- https://github.com/knd06/linux-kernel-exploitation
- https://github.com/mudongliang/LinuxFlaw
- https://github.com/ndk06/linux-kernel-exploitation
- https://github.com/ndk191/linux-kernel-exploitation
- https://github.com/oneoy/cve-
- https://github.com/skbasava/Linux-Kernel-exploit

View File

@ -82,6 +82,7 @@ No PoCs from references.
- https://github.com/lieanu/CVE-2014-3153
- https://github.com/lushtree-cn-honeyzhao/awesome-c
- https://github.com/m0mkris/linux-kernel-exploits
- https://github.com/ndk06/linux-kernel-exploitation
- https://github.com/ndk191/linux-kernel-exploitation
- https://github.com/ozkanbilge/Linux-Kernel-Exploits
- https://github.com/password520/linux-kernel-exploits

View File

@ -53,6 +53,7 @@ The capabilities implementation in the Linux kernel before 3.14.8 does not prope
- https://github.com/knd06/linux-kernel-exploitation
- https://github.com/kumardineshwar/linux-kernel-exploits
- https://github.com/m0mkris/linux-kernel-exploits
- https://github.com/ndk06/linux-kernel-exploitation
- https://github.com/ndk191/linux-kernel-exploitation
- https://github.com/ozkanbilge/Linux-Kernel-Exploits
- https://github.com/password520/linux-kernel-exploits

View File

@ -40,6 +40,7 @@ No PoCs from references.
- https://github.com/koozxcv/CVE-2014-7911-CVE-2014-4322_get_root_privilege
- https://github.com/laginimaineb/cve-2014-4322
- https://github.com/lushtree-cn-honeyzhao/awesome-c
- https://github.com/ndk06/linux-kernel-exploitation
- https://github.com/ndk191/linux-kernel-exploitation
- https://github.com/retme7/CVE-2014-4322_poc
- https://github.com/retme7/CVE-2014-7911_poc

View File

@ -59,6 +59,7 @@ The Linux kernel before 3.15.4 on Intel processors does not properly restrict us
- https://github.com/kumardineshwar/linux-kernel-exploits
- https://github.com/m0mkris/linux-kernel-exploits
- https://github.com/msecrist-couchbase/smallcb-training-capella
- https://github.com/ndk06/linux-kernel-exploitation
- https://github.com/ndk191/linux-kernel-exploitation
- https://github.com/ozkanbilge/Linux-Kernel-Exploits
- https://github.com/password520/linux-kernel-exploits

View File

@ -24,6 +24,7 @@ The PPPoL2TP feature in net/l2tp/l2tp_ppp.c in the Linux kernel through 3.15.6 a
- https://github.com/khanhhdz06/linux-kernel-exploitation
- https://github.com/khanhnd123/linux-kernel-exploitation
- https://github.com/knd06/linux-kernel-exploitation
- https://github.com/ndk06/linux-kernel-exploitation
- https://github.com/ndk191/linux-kernel-exploitation
- https://github.com/redes-2015/l2tp-socket-bug
- https://github.com/skbasava/Linux-Kernel-exploit

View File

@ -31,6 +31,7 @@ arch/x86/kernel/entry_64.S in the Linux kernel before 3.17.5 does not properly h
- https://github.com/khanhhdz06/linux-kernel-exploitation
- https://github.com/khanhnd123/linux-kernel-exploitation
- https://github.com/knd06/linux-kernel-exploitation
- https://github.com/ndk06/linux-kernel-exploitation
- https://github.com/ndk191/linux-kernel-exploitation
- https://github.com/paulveillard/cybersecurity-exploit-development
- https://github.com/skbasava/Linux-Kernel-exploit

View File

@ -23,6 +23,7 @@ No PoCs from references.
- https://github.com/khanhhdz06/linux-kernel-exploitation
- https://github.com/khanhnd123/linux-kernel-exploitation
- https://github.com/knd06/linux-kernel-exploitation
- https://github.com/ndk06/linux-kernel-exploitation
- https://github.com/ndk191/linux-kernel-exploitation
- https://github.com/ssr-111/linux-kernel-exploitation
- https://github.com/wkhnh06/linux-kernel-exploitation

View File

@ -24,6 +24,7 @@ No PoCs from references.
- https://github.com/khanhhdz06/linux-kernel-exploitation
- https://github.com/khanhnd123/linux-kernel-exploitation
- https://github.com/knd06/linux-kernel-exploitation
- https://github.com/ndk06/linux-kernel-exploitation
- https://github.com/ndk191/linux-kernel-exploitation
- https://github.com/skbasava/Linux-Kernel-exploit
- https://github.com/ssr-111/linux-kernel-exploitation

View File

@ -41,6 +41,7 @@ The (1) pipe_read and (2) pipe_write implementations in fs/pipe.c in the Linux k
- https://github.com/knd06/linux-kernel-exploitation
- https://github.com/makaitoushi/iovyroot_kyv37
- https://github.com/mobilelinux/iovy_root_research
- https://github.com/ndk06/linux-kernel-exploitation
- https://github.com/ndk191/linux-kernel-exploitation
- https://github.com/panyu6325/CVE-2015-1805
- https://github.com/skbasava/Linux-Kernel-exploit

View File

@ -43,6 +43,7 @@ The ping_unhash function in net/ipv4/ping.c in the Linux kernel before 4.0.3 doe
- https://github.com/khanhnd123/linux-kernel-exploitation
- https://github.com/knd06/linux-kernel-exploitation
- https://github.com/ludongxu/cve-2015-3636
- https://github.com/ndk06/linux-kernel-exploitation
- https://github.com/ndk191/linux-kernel-exploitation
- https://github.com/ne2der/AKLab
- https://github.com/skbasava/Linux-Kernel-exploit

View File

@ -74,6 +74,7 @@ The join_session_keyring function in security/keys/process_keys.c in the Linux k
- https://github.com/mfer/cve_2016_0728
- https://github.com/mudongliang/LinuxFlaw
- https://github.com/nardholio/cve-2016-0728
- https://github.com/ndk06/linux-kernel-exploitation
- https://github.com/ndk191/linux-kernel-exploitation
- https://github.com/neuschaefer/cve-2016-0728-testbed
- https://github.com/oneoy/cve-

View File

@ -24,6 +24,7 @@ No PoCs from references.
- https://github.com/khanhhdz06/linux-kernel-exploitation
- https://github.com/khanhnd123/linux-kernel-exploitation
- https://github.com/knd06/linux-kernel-exploitation
- https://github.com/ndk06/linux-kernel-exploitation
- https://github.com/ndk191/linux-kernel-exploitation
- https://github.com/skbasava/Linux-Kernel-exploit
- https://github.com/ssr-111/linux-kernel-exploitation

View File

@ -24,6 +24,7 @@ No PoCs from references.
- https://github.com/khanhhdz06/linux-kernel-exploitation
- https://github.com/khanhnd123/linux-kernel-exploitation
- https://github.com/knd06/linux-kernel-exploitation
- https://github.com/ndk06/linux-kernel-exploitation
- https://github.com/ndk191/linux-kernel-exploitation
- https://github.com/skbasava/Linux-Kernel-exploit
- https://github.com/ssr-111/linux-kernel-exploitation

View File

@ -29,6 +29,7 @@ An elevation of privilege vulnerability in the Motorola bootloader could enable
- https://github.com/knd06/linux-kernel-exploitation
- https://github.com/leosol/initroot
- https://github.com/lnick2023/nicenice
- https://github.com/ndk06/linux-kernel-exploitation
- https://github.com/ndk191/linux-kernel-exploitation
- https://github.com/qazbnm456/awesome-cve-poc
- https://github.com/ssr-111/linux-kernel-exploitation

17
2016/CVE-2016-15027.md Normal file
View File

@ -0,0 +1,17 @@
### [CVE-2016-15027](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-15027)
![](https://img.shields.io/static/v1?label=Product&message=Post%20Duplicator%20Plugin&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=%3D%202.18%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-79%20Cross%20Site%20Scripting&color=brighgreen)
### Description
A vulnerability was found in meta4creations Post Duplicator Plugin 2.18 on WordPress. It has been classified as problematic. Affected is the function mtphr_post_duplicator_notice of the file includes/notices.php. The manipulation of the argument post-duplicated leads to cross site scripting. It is possible to launch the attack remotely. Upgrading to version 2.19 is able to address this issue. The name of the patch is ca67c05e490c0cf93a1e9b2d93bfeff3dd96f594. It is recommended to upgrade the affected component. The identifier of this vulnerability is VDB-221496.
### POC
#### Reference
No PoCs from references.
#### Github
- https://github.com/20142995/nuclei-templates

View File

@ -29,6 +29,7 @@ The ecryptfs_privileged_open function in fs/ecryptfs/kthread.c in the Linux kern
- https://github.com/khanhhdz06/linux-kernel-exploitation
- https://github.com/khanhnd123/linux-kernel-exploitation
- https://github.com/knd06/linux-kernel-exploitation
- https://github.com/ndk06/linux-kernel-exploitation
- https://github.com/ndk191/linux-kernel-exploitation
- https://github.com/skbasava/Linux-Kernel-exploit
- https://github.com/ssr-111/linux-kernel-exploitation

View File

@ -22,6 +22,7 @@ No PoCs from references.
- https://github.com/khanhhdz06/linux-kernel-exploitation
- https://github.com/khanhnd123/linux-kernel-exploitation
- https://github.com/knd06/linux-kernel-exploitation
- https://github.com/ndk06/linux-kernel-exploitation
- https://github.com/ndk191/linux-kernel-exploitation
- https://github.com/ssr-111/linux-kernel-exploitation
- https://github.com/wkhnh06/linux-kernel-exploitation

View File

@ -59,6 +59,7 @@ Double free vulnerability in the snd_usbmidi_create function in sound/usb/midi.c
- https://github.com/kumardineshwar/linux-kernel-exploits
- https://github.com/lnick2023/nicenice
- https://github.com/m0mkris/linux-kernel-exploits
- https://github.com/ndk06/linux-kernel-exploitation
- https://github.com/ndk191/linux-kernel-exploitation
- https://github.com/ozkanbilge/Linux-Kernel-Exploits
- https://github.com/password520/linux-kernel-exploits

View File

@ -25,6 +25,7 @@ No PoCs from references.
- https://github.com/khanhhdz06/linux-kernel-exploitation
- https://github.com/khanhnd123/linux-kernel-exploitation
- https://github.com/knd06/linux-kernel-exploitation
- https://github.com/ndk06/linux-kernel-exploitation
- https://github.com/ndk191/linux-kernel-exploitation
- https://github.com/skbasava/Linux-Kernel-exploit
- https://github.com/ssr-111/linux-kernel-exploitation

View File

@ -37,6 +37,7 @@ No PoCs from references.
- https://github.com/khanhnd123/linux-kernel-exploitation
- https://github.com/knd06/linux-kernel-exploitation
- https://github.com/likescam/exploit_playground_lists_androidCVE
- https://github.com/ndk06/linux-kernel-exploitation
- https://github.com/ndk191/linux-kernel-exploitation
- https://github.com/skbasava/Linux-Kernel-exploit
- https://github.com/ssr-111/linux-kernel-exploitation

View File

@ -25,6 +25,7 @@ No PoCs from references.
- https://github.com/khanhhdz06/linux-kernel-exploitation
- https://github.com/khanhnd123/linux-kernel-exploitation
- https://github.com/knd06/linux-kernel-exploitation
- https://github.com/ndk06/linux-kernel-exploitation
- https://github.com/ndk191/linux-kernel-exploitation
- https://github.com/skbasava/Linux-Kernel-exploit
- https://github.com/ssr-111/linux-kernel-exploitation

View File

@ -24,6 +24,7 @@ No PoCs from references.
- https://github.com/khanhhdz06/linux-kernel-exploitation
- https://github.com/khanhnd123/linux-kernel-exploitation
- https://github.com/knd06/linux-kernel-exploitation
- https://github.com/ndk06/linux-kernel-exploitation
- https://github.com/ndk191/linux-kernel-exploitation
- https://github.com/skbasava/Linux-Kernel-exploit
- https://github.com/ssr-111/linux-kernel-exploitation

View File

@ -22,6 +22,7 @@ No PoCs from references.
- https://github.com/khanhhdz06/linux-kernel-exploitation
- https://github.com/khanhnd123/linux-kernel-exploitation
- https://github.com/knd06/linux-kernel-exploitation
- https://github.com/ndk06/linux-kernel-exploitation
- https://github.com/ndk191/linux-kernel-exploitation
- https://github.com/ssr-111/linux-kernel-exploitation
- https://github.com/wkhnh06/linux-kernel-exploitation

View File

@ -25,6 +25,7 @@ No PoCs from references.
- https://github.com/khanhhdz06/linux-kernel-exploitation
- https://github.com/khanhnd123/linux-kernel-exploitation
- https://github.com/knd06/linux-kernel-exploitation
- https://github.com/ndk06/linux-kernel-exploitation
- https://github.com/ndk191/linux-kernel-exploitation
- https://github.com/skbasava/Linux-Kernel-exploit
- https://github.com/ssr-111/linux-kernel-exploitation

View File

@ -24,6 +24,7 @@ No PoCs from references.
- https://github.com/khanhhdz06/linux-kernel-exploitation
- https://github.com/khanhnd123/linux-kernel-exploitation
- https://github.com/knd06/linux-kernel-exploitation
- https://github.com/ndk06/linux-kernel-exploitation
- https://github.com/ndk191/linux-kernel-exploitation
- https://github.com/skbasava/Linux-Kernel-exploit
- https://github.com/ssr-111/linux-kernel-exploitation

View File

@ -316,6 +316,7 @@ Race condition in mm/gup.c in the Linux kernel 2.x through 4.x before 4.8.3 allo
- https://github.com/monkeysm8/OSCP_HELP
- https://github.com/naftalyava/DirtyCow-Exploit
- https://github.com/nazgul6092/2nd-Year-Project-01-Linux-Exploitation-using-CVE-20166-5195
- https://github.com/ndk06/linux-kernel-exploitation
- https://github.com/ndk191/linux-kernel-exploitation
- https://github.com/ndobson/inspec_CVE-2016-5195
- https://github.com/ne2der/AKLab

View File

@ -22,6 +22,7 @@ No PoCs from references.
- https://github.com/khanhhdz06/linux-kernel-exploitation
- https://github.com/khanhnd123/linux-kernel-exploitation
- https://github.com/knd06/linux-kernel-exploitation
- https://github.com/ndk06/linux-kernel-exploitation
- https://github.com/ndk191/linux-kernel-exploitation
- https://github.com/ssr-111/linux-kernel-exploitation
- https://github.com/wkhnh06/linux-kernel-exploitation

View File

@ -25,6 +25,7 @@ No PoCs from references.
- https://github.com/khanhnd123/linux-kernel-exploitation
- https://github.com/knd06/linux-kernel-exploitation
- https://github.com/mudongliang/LinuxFlaw
- https://github.com/ndk06/linux-kernel-exploitation
- https://github.com/ndk191/linux-kernel-exploitation
- https://github.com/oneoy/cve-
- https://github.com/ostrichxyz7/kexps

View File

@ -25,6 +25,7 @@ No PoCs from references.
- https://github.com/khanhnd123/linux-kernel-exploitation
- https://github.com/knd06/linux-kernel-exploitation
- https://github.com/lnick2023/nicenice
- https://github.com/ndk06/linux-kernel-exploitation
- https://github.com/ndk191/linux-kernel-exploitation
- https://github.com/qazbnm456/awesome-cve-poc
- https://github.com/ssr-111/linux-kernel-exploitation

View File

@ -24,6 +24,7 @@ No PoCs from references.
- https://github.com/khanhhdz06/linux-kernel-exploitation
- https://github.com/khanhnd123/linux-kernel-exploitation
- https://github.com/knd06/linux-kernel-exploitation
- https://github.com/ndk06/linux-kernel-exploitation
- https://github.com/ndk191/linux-kernel-exploitation
- https://github.com/skbasava/Linux-Kernel-exploit
- https://github.com/ssr-111/linux-kernel-exploitation

View File

@ -24,6 +24,7 @@ No PoCs from references.
- https://github.com/khanhhdz06/linux-kernel-exploitation
- https://github.com/khanhnd123/linux-kernel-exploitation
- https://github.com/knd06/linux-kernel-exploitation
- https://github.com/ndk06/linux-kernel-exploitation
- https://github.com/ndk191/linux-kernel-exploitation
- https://github.com/skbasava/Linux-Kernel-exploit
- https://github.com/ssr-111/linux-kernel-exploitation

View File

@ -24,6 +24,7 @@ No PoCs from references.
- https://github.com/khanhhdz06/linux-kernel-exploitation
- https://github.com/khanhnd123/linux-kernel-exploitation
- https://github.com/knd06/linux-kernel-exploitation
- https://github.com/ndk06/linux-kernel-exploitation
- https://github.com/ndk191/linux-kernel-exploitation
- https://github.com/skbasava/Linux-Kernel-exploit
- https://github.com/ssr-111/linux-kernel-exploitation

View File

@ -58,6 +58,7 @@ Race condition in net/packet/af_packet.c in the Linux kernel through 4.8.12 allo
- https://github.com/mudongliang/LinuxFlaw
- https://github.com/mzet-/linux-exploit-suggester
- https://github.com/n3t1nv4d3/kernel-exploits
- https://github.com/ndk06/linux-kernel-exploitation
- https://github.com/ndk191/linux-kernel-exploitation
- https://github.com/oneoy/cve-
- https://github.com/ostrichxyz7/kexps

View File

@ -24,6 +24,7 @@ No PoCs from references.
- https://github.com/khanhhdz06/linux-kernel-exploitation
- https://github.com/khanhnd123/linux-kernel-exploitation
- https://github.com/knd06/linux-kernel-exploitation
- https://github.com/ndk06/linux-kernel-exploitation
- https://github.com/ndk191/linux-kernel-exploitation
- https://github.com/ssr-111/linux-kernel-exploitation
- https://github.com/wkhnh06/linux-kernel-exploitation

View File

@ -23,6 +23,7 @@ No PoCs from references.
- https://github.com/khanhhdz06/linux-kernel-exploitation
- https://github.com/khanhnd123/linux-kernel-exploitation
- https://github.com/knd06/linux-kernel-exploitation
- https://github.com/ndk06/linux-kernel-exploitation
- https://github.com/ndk191/linux-kernel-exploitation
- https://github.com/ssr-111/linux-kernel-exploitation
- https://github.com/wkhnh06/linux-kernel-exploitation

View File

@ -22,6 +22,7 @@ An elevation of privilege vulnerability in the Broadcom Wi-Fi driver could enabl
- https://github.com/khanhhdz06/linux-kernel-exploitation
- https://github.com/khanhnd123/linux-kernel-exploitation
- https://github.com/knd06/linux-kernel-exploitation
- https://github.com/ndk06/linux-kernel-exploitation
- https://github.com/ndk191/linux-kernel-exploitation
- https://github.com/ssr-111/linux-kernel-exploitation
- https://github.com/wkhnh06/linux-kernel-exploitation

View File

@ -81,6 +81,7 @@ Linux kernel: Exploitable memory corruption due to UFO to non-UFO path switch. W
- https://github.com/milabs/lkrg-bypass
- https://github.com/mzet-/linux-exploit-suggester
- https://github.com/n3t1nv4d3/kernel-exploits
- https://github.com/ndk06/linux-kernel-exploitation
- https://github.com/ndk191/linux-kernel-exploitation
- https://github.com/nikaiw/rump
- https://github.com/nmvuonginfosec/linux

View File

@ -44,6 +44,7 @@ The native Bluetooth stack in the Linux Kernel (BlueZ), starting at the Linux ke
- https://github.com/lnick2023/nicenice
- https://github.com/marcinguy/blueborne-CVE-2017-1000251
- https://github.com/marcinguy/kernel-exploitation
- https://github.com/ndk06/linux-kernel-exploitation
- https://github.com/ndk191/linux-kernel-exploitation
- https://github.com/own2pwn/blueborne-CVE-2017-1000251-POC
- https://github.com/qazbnm456/awesome-cve-poc

View File

@ -24,6 +24,7 @@ No PoCs from references.
- https://github.com/khanhhdz06/linux-kernel-exploitation
- https://github.com/khanhnd123/linux-kernel-exploitation
- https://github.com/knd06/linux-kernel-exploitation
- https://github.com/ndk06/linux-kernel-exploitation
- https://github.com/ndk191/linux-kernel-exploitation
- https://github.com/ssr-111/linux-kernel-exploitation
- https://github.com/wkhnh06/linux-kernel-exploitation

View File

@ -25,6 +25,7 @@ sound/core/timer.c in the Linux kernel before 4.11.5 is vulnerable to a data rac
- https://github.com/khanhhdz06/linux-kernel-exploitation
- https://github.com/khanhnd123/linux-kernel-exploitation
- https://github.com/knd06/linux-kernel-exploitation
- https://github.com/ndk06/linux-kernel-exploitation
- https://github.com/ndk191/linux-kernel-exploitation
- https://github.com/ssr-111/linux-kernel-exploitation
- https://github.com/wkhnh06/linux-kernel-exploitation

View File

@ -24,6 +24,7 @@ Race condition in fs/timerfd.c in the Linux kernel before 4.10.15 allows local u
- https://github.com/khanhnd123/linux-kernel-exploitation
- https://github.com/knd06/linux-kernel-exploitation
- https://github.com/lnick2023/nicenice
- https://github.com/ndk06/linux-kernel-exploitation
- https://github.com/ndk191/linux-kernel-exploitation
- https://github.com/ostrichxyz7/kexps
- https://github.com/qazbnm456/awesome-cve-poc

View File

@ -48,6 +48,7 @@ The mq_notify function in the Linux kernel through 4.11.9 does not set the sock
- https://github.com/knd06/linux-kernel-exploitation
- https://github.com/leonardo1101/cve-2017-11176
- https://github.com/lexfo/cve-2017-11176
- https://github.com/ndk06/linux-kernel-exploitation
- https://github.com/ndk191/linux-kernel-exploitation
- https://github.com/ostrichxyz7/kexps
- https://github.com/paulveillard/cybersecurity-exploit-development

View File

@ -99,6 +99,7 @@ The check_alu_op function in kernel/bpf/verifier.c in the Linux kernel through 4
- https://github.com/lnick2023/nicenice
- https://github.com/mareks1007/cve-2017-16995
- https://github.com/mzet-/linux-exploit-suggester
- https://github.com/ndk06/linux-kernel-exploitation
- https://github.com/ndk191/linux-kernel-exploitation
- https://github.com/ozkanbilge/Linux-Kernel-Exploits
- https://github.com/ozkanbilge/Ubuntu16.04-0day-Local-Root

View File

@ -28,6 +28,7 @@ The timer_create syscall implementation in kernel/time/posix-timers.c in the Lin
- https://github.com/khanhnd123/linux-kernel-exploitation
- https://github.com/knd06/linux-kernel-exploitation
- https://github.com/lnick2023/nicenice
- https://github.com/ndk06/linux-kernel-exploitation
- https://github.com/ndk191/linux-kernel-exploitation
- https://github.com/qazbnm456/awesome-cve-poc
- https://github.com/ssr-111/linux-kernel-exploitation

View File

@ -28,6 +28,7 @@ Race condition in drivers/tty/n_hdlc.c in the Linux kernel through 4.10.1 allows
- https://github.com/khanhnd123/linux-kernel-exploitation
- https://github.com/knd06/linux-kernel-exploitation
- https://github.com/lnick2023/nicenice
- https://github.com/ndk06/linux-kernel-exploitation
- https://github.com/ndk191/linux-kernel-exploitation
- https://github.com/ostrichxyz7/kexps
- https://github.com/qazbnm456/awesome-cve-poc

View File

@ -74,6 +74,7 @@ Insufficient data validation in waitid allowed an user to escape sandboxes on Li
- https://github.com/m0mkris/linux-kernel-exploits
- https://github.com/m0nad/awesome-privilege-escalation
- https://github.com/manikanta-suru/cybersecurity-container-security
- https://github.com/ndk06/linux-kernel-exploitation
- https://github.com/ndk191/linux-kernel-exploitation
- https://github.com/ozkanbilge/Linux-Kernel-Exploits
- https://github.com/password520/linux-kernel-exploits

View File

@ -76,6 +76,7 @@ The dccp_rcv_state_process function in net/dccp/input.c in the Linux kernel thro
- https://github.com/lnick2023/nicenice
- https://github.com/m0mkris/linux-kernel-exploits
- https://github.com/mateeuslinno/kernel-linux-xpls
- https://github.com/ndk06/linux-kernel-exploitation
- https://github.com/ndk191/linux-kernel-exploitation
- https://github.com/ostrichxyz7/kexps
- https://github.com/ozkanbilge/Linux-Kernel-Exploits

View File

@ -26,6 +26,7 @@ The xfrm_replay_verify_len function in net/xfrm/xfrm_user.c in the Linux kernel
- https://github.com/khanhnd123/linux-kernel-exploitation
- https://github.com/knd06/linux-kernel-exploitation
- https://github.com/mudongliang/LinuxFlaw
- https://github.com/ndk06/linux-kernel-exploitation
- https://github.com/ndk191/linux-kernel-exploitation
- https://github.com/oneoy/cve-
- https://github.com/ostrichxyz7/kexps

View File

@ -73,6 +73,7 @@ The packet_set_ring function in net/packet/af_packet.c in the Linux kernel throu
- https://github.com/mateeuslinno/kernel-linux-xpls
- https://github.com/mudongliang/LinuxFlaw
- https://github.com/n3t1nv4d3/kernel-exploits
- https://github.com/ndk06/linux-kernel-exploitation
- https://github.com/ndk191/linux-kernel-exploitation
- https://github.com/oneoy/cve-
- https://github.com/ostrichxyz7/kexps

View File

@ -24,6 +24,7 @@ No PoCs from references.
- https://github.com/khanhhdz06/linux-kernel-exploitation
- https://github.com/khanhnd123/linux-kernel-exploitation
- https://github.com/knd06/linux-kernel-exploitation
- https://github.com/ndk06/linux-kernel-exploitation
- https://github.com/ndk191/linux-kernel-exploitation
- https://github.com/skbasava/Linux-Kernel-exploit
- https://github.com/ssr-111/linux-kernel-exploitation

View File

@ -11,6 +11,7 @@ A flaw was found in the way Linux kernel KVM hypervisor before 4.18 emulated ins
#### Reference
- https://usn.ubuntu.com/3777-1/
- https://usn.ubuntu.com/3777-2/
#### Github
- https://github.com/ARPSyndicate/cvemon

View File

@ -11,6 +11,7 @@ A security flaw was found in the chap_server_compute_md5() function in the ISCSI
#### Reference
- https://usn.ubuntu.com/3777-1/
- https://usn.ubuntu.com/3777-2/
- https://usn.ubuntu.com/3777-3/
#### Github

View File

@ -30,6 +30,7 @@ An integer overflow flaw was found in the Linux kernel's create_elf_tables() fun
- https://github.com/knd06/linux-kernel-exploitation
- https://github.com/lnick2023/nicenice
- https://github.com/luan0ap/cve-2018-14634
- https://github.com/ndk06/linux-kernel-exploitation
- https://github.com/ndk191/linux-kernel-exploitation
- https://github.com/qazbnm456/awesome-cve-poc
- https://github.com/ssr-111/linux-kernel-exploitation

View File

@ -11,6 +11,7 @@ The spectre_v2_select_mitigation function in arch/x86/kernel/cpu/bugs.c in the L
#### Reference
- https://usn.ubuntu.com/3777-1/
- https://usn.ubuntu.com/3777-2/
- https://usn.ubuntu.com/3777-3/
#### Github

View File

@ -11,6 +11,7 @@ arch/x86/kernel/paravirt.c in the Linux kernel before 4.18.1 mishandles certain
#### Reference
- https://usn.ubuntu.com/3777-1/
- https://usn.ubuntu.com/3777-2/
- https://usn.ubuntu.com/3777-3/
#### Github

View File

@ -18,5 +18,6 @@ Microsoft ADFS 4.0 Windows Server 2016 and previous (Active Directory Federation
- https://github.com/0dayhunter/Facebook-BugBounty-Writeups
- https://github.com/Jester0x01/Facebook-Bug-Bounty-Writeups
- https://github.com/Krishnathakur063/Facebook-BugBounty-Writeup
- https://github.com/bikramsah/Meta--BugBounty-Writeups
- https://github.com/jaiswalakshansh/Facebook-BugBounty-Writeups

View File

@ -11,6 +11,7 @@ An issue was discovered in the Linux kernel through 4.18.8. The vmacache_flush_a
#### Reference
- https://usn.ubuntu.com/3777-1/
- https://usn.ubuntu.com/3777-2/
- https://usn.ubuntu.com/3777-3/
- https://www.exploit-db.com/exploits/45497/
@ -53,6 +54,7 @@ An issue was discovered in the Linux kernel through 4.18.8. The vmacache_flush_a
- https://github.com/likescam/vmacache_CVE-2018-17182
- https://github.com/lnick2023/nicenice
- https://github.com/lp008/Hack-readme
- https://github.com/ndk06/linux-kernel-exploitation
- https://github.com/ndk191/linux-kernel-exploitation
- https://github.com/nobiusmallyu/kehai
- https://github.com/qazbnm456/awesome-cve-poc

View File

@ -23,6 +23,7 @@ Since Linux kernel version 3.2, the mremap() syscall performs TLB flushes after
- https://github.com/khanhhdz06/linux-kernel-exploitation
- https://github.com/khanhnd123/linux-kernel-exploitation
- https://github.com/knd06/linux-kernel-exploitation
- https://github.com/ndk06/linux-kernel-exploitation
- https://github.com/ndk191/linux-kernel-exploitation
- https://github.com/ssr-111/linux-kernel-exploitation
- https://github.com/wkhnh06/linux-kernel-exploitation

View File

@ -61,6 +61,7 @@ Systems with microprocessors utilizing speculative execution and speculative exe
- https://github.com/mjaggi-cavium/spectre-meltdown-checker
- https://github.com/mmxsrup/CVE-2018-3639
- https://github.com/morning21/Spectre_Meltdown_MDS_srcs
- https://github.com/ndk06/linux-kernel-exploitation
- https://github.com/ndk191/linux-kernel-exploitation
- https://github.com/nmosier/clou-bugs
- https://github.com/nsacyber/Hardware-and-Firmware-Security-Guidance

View File

@ -11,6 +11,7 @@ Memory leak in the irda_bind function in net/irda/af_irda.c and later in drivers
#### Reference
- https://usn.ubuntu.com/3777-1/
- https://usn.ubuntu.com/3777-2/
- https://usn.ubuntu.com/3777-3/
#### Github
@ -24,6 +25,7 @@ Memory leak in the irda_bind function in net/irda/af_irda.c and later in drivers
- https://github.com/khanhhdz06/linux-kernel-exploitation
- https://github.com/khanhnd123/linux-kernel-exploitation
- https://github.com/knd06/linux-kernel-exploitation
- https://github.com/ndk06/linux-kernel-exploitation
- https://github.com/ndk191/linux-kernel-exploitation
- https://github.com/ssr-111/linux-kernel-exploitation
- https://github.com/wkhnh06/linux-kernel-exploitation

View File

@ -11,6 +11,7 @@ The irda_setsockopt function in net/irda/af_irda.c and later in drivers/staging/
#### Reference
- https://usn.ubuntu.com/3777-1/
- https://usn.ubuntu.com/3777-2/
- https://usn.ubuntu.com/3777-3/
#### Github
@ -23,6 +24,7 @@ The irda_setsockopt function in net/irda/af_irda.c and later in drivers/staging/
- https://github.com/khanhhdz06/linux-kernel-exploitation
- https://github.com/khanhnd123/linux-kernel-exploitation
- https://github.com/knd06/linux-kernel-exploitation
- https://github.com/ndk06/linux-kernel-exploitation
- https://github.com/ndk191/linux-kernel-exploitation
- https://github.com/ostrichxyz7/kexps
- https://github.com/ssr-111/linux-kernel-exploitation

View File

@ -23,6 +23,7 @@ No PoCs from references.
- https://github.com/khanhhdz06/linux-kernel-exploitation
- https://github.com/khanhnd123/linux-kernel-exploitation
- https://github.com/knd06/linux-kernel-exploitation
- https://github.com/ndk06/linux-kernel-exploitation
- https://github.com/ndk191/linux-kernel-exploitation
- https://github.com/ssr-111/linux-kernel-exploitation
- https://github.com/wkhnh06/linux-kernel-exploitation

View File

@ -24,6 +24,7 @@ No PoCs from references.
- https://github.com/khanhhdz06/linux-kernel-exploitation
- https://github.com/khanhnd123/linux-kernel-exploitation
- https://github.com/knd06/linux-kernel-exploitation
- https://github.com/ndk06/linux-kernel-exploitation
- https://github.com/ndk191/linux-kernel-exploitation
- https://github.com/ssr-111/linux-kernel-exploitation
- https://github.com/wkhnh06/linux-kernel-exploitation

View File

@ -22,6 +22,7 @@ There is a way to deceive the GPU kernel driver into thinking there is room in t
- https://github.com/khanhhdz06/linux-kernel-exploitation
- https://github.com/khanhnd123/linux-kernel-exploitation
- https://github.com/knd06/linux-kernel-exploitation
- https://github.com/ndk06/linux-kernel-exploitation
- https://github.com/ndk191/linux-kernel-exploitation
- https://github.com/secmob/TiYunZong-An-Exploit-Chain-to-Remotely-Root-Modern-Android-Devices
- https://github.com/ssr-111/linux-kernel-exploitation

View File

@ -24,6 +24,7 @@ The Linux kernel before 4.8 allows local users to bypass ASLR on setuid programs
- https://github.com/khanhhdz06/linux-kernel-exploitation
- https://github.com/khanhnd123/linux-kernel-exploitation
- https://github.com/knd06/linux-kernel-exploitation
- https://github.com/ndk06/linux-kernel-exploitation
- https://github.com/ndk191/linux-kernel-exploitation
- https://github.com/ssr-111/linux-kernel-exploitation
- https://github.com/wkhnh06/linux-kernel-exploitation

View File

@ -20,6 +20,8 @@ No PoCs from references.
#### Github
- https://github.com/0dayhunter/Windows-Privilege-Escalation-Resources
- https://github.com/0xT11/CVE-POC
- https://github.com/1dika1/network
- https://github.com/1dika1/vsvs
- https://github.com/20142995/sectool
- https://github.com/ARPSyndicate/cvemon
- https://github.com/Abbykito/WINDOWS_PREVILAGEESCALATIONS

View File

@ -25,6 +25,7 @@ Using memory after being freed in qsee due to wrong implementation can lead to u
- https://github.com/khanhhdz06/linux-kernel-exploitation
- https://github.com/khanhnd123/linux-kernel-exploitation
- https://github.com/knd06/linux-kernel-exploitation
- https://github.com/ndk06/linux-kernel-exploitation
- https://github.com/ndk191/linux-kernel-exploitation
- https://github.com/ssr-111/linux-kernel-exploitation
- https://github.com/tamirzb/CVE-2019-14040

View File

@ -25,6 +25,7 @@ During listener modified response processing, a buffer overrun occurs due to lac
- https://github.com/khanhhdz06/linux-kernel-exploitation
- https://github.com/khanhnd123/linux-kernel-exploitation
- https://github.com/knd06/linux-kernel-exploitation
- https://github.com/ndk06/linux-kernel-exploitation
- https://github.com/ndk191/linux-kernel-exploitation
- https://github.com/ssr-111/linux-kernel-exploitation
- https://github.com/tamirzb/CVE-2019-14041

View File

@ -22,6 +22,7 @@ No PoCs from references.
- https://github.com/khanhhdz06/linux-kernel-exploitation
- https://github.com/khanhnd123/linux-kernel-exploitation
- https://github.com/knd06/linux-kernel-exploitation
- https://github.com/ndk06/linux-kernel-exploitation
- https://github.com/ndk191/linux-kernel-exploitation
- https://github.com/ssr-111/linux-kernel-exploitation
- https://github.com/wkhnh06/linux-kernel-exploitation

17
2019/CVE-2019-17072.md Normal file
View File

@ -0,0 +1,17 @@
### [CVE-2019-17072](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17072)
![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen)
### Description
The new-contact-form-widget (aka Contact Form Widget - Contact Query, Form Maker) plugin 1.0.9 for WordPress has SQL Injection via all-query-page.php.
### POC
#### Reference
No PoCs from references.
#### Github
- https://github.com/20142995/nuclei-templates

View File

@ -19,6 +19,7 @@ A vulnerability in WhatsApp Desktop versions prior to 0.3.9309 when paired with
- https://github.com/Ostorlab/known_exploited_vulnerbilities_detectors
- https://github.com/PerimeterX/CVE-2019-18426
- https://github.com/abhav/nvd_scrapper
- https://github.com/bikramsah/Meta--BugBounty-Writeups
- https://github.com/developer3000S/PoC-in-GitHub
- https://github.com/hectorgie/PoC-in-GitHub
- https://github.com/jaiswalakshansh/Facebook-BugBounty-Writeups

View File

@ -24,6 +24,7 @@ The Linux kernel through 5.3.13 has a start_offset+size Integer Overflow in cpia
- https://github.com/khanhhdz06/linux-kernel-exploitation
- https://github.com/khanhnd123/linux-kernel-exploitation
- https://github.com/knd06/linux-kernel-exploitation
- https://github.com/ndk06/linux-kernel-exploitation
- https://github.com/ndk191/linux-kernel-exploitation
- https://github.com/ssr-111/linux-kernel-exploitation
- https://github.com/wkhnh06/linux-kernel-exploitation

View File

@ -33,6 +33,7 @@ An issue was discovered in drivers/media/platform/vivid in the Linux kernel thro
- https://github.com/khanhnd123/linux-kernel-exploitation
- https://github.com/knd06/linux-kernel-exploitation
- https://github.com/lnick2023/nicenice
- https://github.com/ndk06/linux-kernel-exploitation
- https://github.com/ndk191/linux-kernel-exploitation
- https://github.com/qazbnm456/awesome-cve-poc
- https://github.com/sanjana123-cloud/CVE-2019-18683

View File

@ -23,6 +23,7 @@ In the Linux kernel 5.0.21, mounting a crafted btrfs filesystem image, performin
- https://github.com/khanhhdz06/linux-kernel-exploitation
- https://github.com/khanhnd123/linux-kernel-exploitation
- https://github.com/knd06/linux-kernel-exploitation
- https://github.com/ndk06/linux-kernel-exploitation
- https://github.com/ndk191/linux-kernel-exploitation
- https://github.com/ssr-111/linux-kernel-exploitation
- https://github.com/wkhnh06/linux-kernel-exploitation

Some files were not shown because too many files have changed in this diff Show More