mirror of
https://github.com/0xMarcio/cve.git
synced 2025-06-19 17:30:12 +00:00
Update Mon May 27 13:12:02 UTC 2024
This commit is contained in:
parent
2d745dea05
commit
b042ce8188
@ -13,5 +13,6 @@ The Windows 2000 telnet client attempts to perform NTLM authentication by defaul
|
|||||||
No PoCs from references.
|
No PoCs from references.
|
||||||
|
|
||||||
#### Github
|
#### Github
|
||||||
|
- https://github.com/Cruxer8Mech/Idk
|
||||||
- https://github.com/ycdxsb/WindowsPrivilegeEscalation
|
- https://github.com/ycdxsb/WindowsPrivilegeEscalation
|
||||||
|
|
||||||
|
@ -16,6 +16,7 @@ File and Print Sharing service in Windows 95, Windows 98, and Windows Me does no
|
|||||||
- https://github.com/ARPSyndicate/cvemon
|
- https://github.com/ARPSyndicate/cvemon
|
||||||
- https://github.com/Ascotbe/Kernelhub
|
- https://github.com/Ascotbe/Kernelhub
|
||||||
- https://github.com/CVEDB/PoC-List
|
- https://github.com/CVEDB/PoC-List
|
||||||
|
- https://github.com/Cruxer8Mech/Idk
|
||||||
- https://github.com/Z6543/CVE-2000-0979
|
- https://github.com/Z6543/CVE-2000-0979
|
||||||
- https://github.com/ycdxsb/WindowsPrivilegeEscalation
|
- https://github.com/ycdxsb/WindowsPrivilegeEscalation
|
||||||
|
|
||||||
|
@ -16,6 +16,7 @@ No PoCs from references.
|
|||||||
- https://github.com/ARPSyndicate/cvemon
|
- https://github.com/ARPSyndicate/cvemon
|
||||||
- https://github.com/Al1ex/WindowsElevation
|
- https://github.com/Al1ex/WindowsElevation
|
||||||
- https://github.com/Ascotbe/Kernelhub
|
- https://github.com/Ascotbe/Kernelhub
|
||||||
|
- https://github.com/Cruxer8Mech/Idk
|
||||||
- https://github.com/fei9747/WindowsElevation
|
- https://github.com/fei9747/WindowsElevation
|
||||||
- https://github.com/lyshark/Windows-exploits
|
- https://github.com/lyshark/Windows-exploits
|
||||||
- https://github.com/makoto56/penetration-suite-toolkit
|
- https://github.com/makoto56/penetration-suite-toolkit
|
||||||
|
@ -32,6 +32,7 @@ The do_mremap function for the mremap system call in Linux 2.2 to 2.2.25, 2.4 to
|
|||||||
- https://github.com/Singlea-lyh/linux-kernel-exploits
|
- https://github.com/Singlea-lyh/linux-kernel-exploits
|
||||||
- https://github.com/Snoopy-Sec/Localroot-ALL-CVE
|
- https://github.com/Snoopy-Sec/Localroot-ALL-CVE
|
||||||
- https://github.com/Technoashofficial/kernel-exploitation-linux
|
- https://github.com/Technoashofficial/kernel-exploitation-linux
|
||||||
|
- https://github.com/ZTK-009/linux-kernel-exploits
|
||||||
- https://github.com/albinjoshy03/linux-kernel-exploits
|
- https://github.com/albinjoshy03/linux-kernel-exploits
|
||||||
- https://github.com/alian87/linux-kernel-exploits
|
- https://github.com/alian87/linux-kernel-exploits
|
||||||
- https://github.com/coffee727/linux-exp
|
- https://github.com/coffee727/linux-exp
|
||||||
|
@ -29,6 +29,7 @@ Race condition in the (1) load_elf_library and (2) binfmt_aout function calls fo
|
|||||||
- https://github.com/Shadowshusky/linux-kernel-exploits
|
- https://github.com/Shadowshusky/linux-kernel-exploits
|
||||||
- https://github.com/Singlea-lyh/linux-kernel-exploits
|
- https://github.com/Singlea-lyh/linux-kernel-exploits
|
||||||
- https://github.com/Snoopy-Sec/Localroot-ALL-CVE
|
- https://github.com/Snoopy-Sec/Localroot-ALL-CVE
|
||||||
|
- https://github.com/ZTK-009/linux-kernel-exploits
|
||||||
- https://github.com/albinjoshy03/linux-kernel-exploits
|
- https://github.com/albinjoshy03/linux-kernel-exploits
|
||||||
- https://github.com/alian87/linux-kernel-exploits
|
- https://github.com/alian87/linux-kernel-exploits
|
||||||
- https://github.com/coffee727/linux-exp
|
- https://github.com/coffee727/linux-exp
|
||||||
|
@ -14,5 +14,6 @@ The Windows Animated Cursor (ANI) capability in Windows NT, Windows 2000 through
|
|||||||
- https://docs.microsoft.com/en-us/security-updates/securitybulletins/2005/ms05-002
|
- https://docs.microsoft.com/en-us/security-updates/securitybulletins/2005/ms05-002
|
||||||
|
|
||||||
#### Github
|
#### Github
|
||||||
|
- https://github.com/Cruxer8Mech/Idk
|
||||||
- https://github.com/ycdxsb/WindowsPrivilegeEscalation
|
- https://github.com/ycdxsb/WindowsPrivilegeEscalation
|
||||||
|
|
||||||
|
@ -29,6 +29,7 @@ Integer overflow in sys_epoll_wait in eventpoll.c for Linux kernel 2.6 to 2.6.11
|
|||||||
- https://github.com/Shadowshusky/linux-kernel-exploits
|
- https://github.com/Shadowshusky/linux-kernel-exploits
|
||||||
- https://github.com/Singlea-lyh/linux-kernel-exploits
|
- https://github.com/Singlea-lyh/linux-kernel-exploits
|
||||||
- https://github.com/Snoopy-Sec/Localroot-ALL-CVE
|
- https://github.com/Snoopy-Sec/Localroot-ALL-CVE
|
||||||
|
- https://github.com/ZTK-009/linux-kernel-exploits
|
||||||
- https://github.com/albinjoshy03/linux-kernel-exploits
|
- https://github.com/albinjoshy03/linux-kernel-exploits
|
||||||
- https://github.com/alian87/linux-kernel-exploits
|
- https://github.com/alian87/linux-kernel-exploits
|
||||||
- https://github.com/coffee727/linux-exp
|
- https://github.com/coffee727/linux-exp
|
||||||
|
@ -28,6 +28,7 @@ The elf_core_dump function in binfmt_elf.c for Linux kernel 2.x.x to 2.2.27-rc2,
|
|||||||
- https://github.com/Shadowshusky/linux-kernel-exploits
|
- https://github.com/Shadowshusky/linux-kernel-exploits
|
||||||
- https://github.com/Singlea-lyh/linux-kernel-exploits
|
- https://github.com/Singlea-lyh/linux-kernel-exploits
|
||||||
- https://github.com/Snoopy-Sec/Localroot-ALL-CVE
|
- https://github.com/Snoopy-Sec/Localroot-ALL-CVE
|
||||||
|
- https://github.com/ZTK-009/linux-kernel-exploits
|
||||||
- https://github.com/albinjoshy03/linux-kernel-exploits
|
- https://github.com/albinjoshy03/linux-kernel-exploits
|
||||||
- https://github.com/alian87/linux-kernel-exploits
|
- https://github.com/alian87/linux-kernel-exploits
|
||||||
- https://github.com/coffee727/linux-exp
|
- https://github.com/coffee727/linux-exp
|
||||||
|
@ -17,6 +17,7 @@ Stack-based buffer overflow in the Plug and Play (PnP) service for Microsoft Win
|
|||||||
- https://github.com/ARPSyndicate/cvemon
|
- https://github.com/ARPSyndicate/cvemon
|
||||||
- https://github.com/Al1ex/WindowsElevation
|
- https://github.com/Al1ex/WindowsElevation
|
||||||
- https://github.com/Ascotbe/Kernelhub
|
- https://github.com/Ascotbe/Kernelhub
|
||||||
|
- https://github.com/Cruxer8Mech/Idk
|
||||||
- https://github.com/fei9747/WindowsElevation
|
- https://github.com/fei9747/WindowsElevation
|
||||||
- https://github.com/makoto56/penetration-suite-toolkit
|
- https://github.com/makoto56/penetration-suite-toolkit
|
||||||
- https://github.com/ycdxsb/WindowsPrivilegeEscalation
|
- https://github.com/ycdxsb/WindowsPrivilegeEscalation
|
||||||
|
@ -13,6 +13,7 @@ Heap-based buffer overflow in the Server Service (SRV.SYS driver) in Microsoft W
|
|||||||
- https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-035
|
- https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-035
|
||||||
|
|
||||||
#### Github
|
#### Github
|
||||||
|
- https://github.com/Cruxer8Mech/Idk
|
||||||
- https://github.com/uroboros-security/SMB-CVE
|
- https://github.com/uroboros-security/SMB-CVE
|
||||||
- https://github.com/ycdxsb/WindowsPrivilegeEscalation
|
- https://github.com/ycdxsb/WindowsPrivilegeEscalation
|
||||||
|
|
||||||
|
@ -31,6 +31,7 @@ No PoCs from references.
|
|||||||
- https://github.com/Shadowshusky/linux-kernel-exploits
|
- https://github.com/Shadowshusky/linux-kernel-exploits
|
||||||
- https://github.com/Singlea-lyh/linux-kernel-exploits
|
- https://github.com/Singlea-lyh/linux-kernel-exploits
|
||||||
- https://github.com/Snoopy-Sec/Localroot-ALL-CVE
|
- https://github.com/Snoopy-Sec/Localroot-ALL-CVE
|
||||||
|
- https://github.com/ZTK-009/linux-kernel-exploits
|
||||||
- https://github.com/albinjoshy03/linux-kernel-exploits
|
- https://github.com/albinjoshy03/linux-kernel-exploits
|
||||||
- https://github.com/alian87/linux-kernel-exploits
|
- https://github.com/alian87/linux-kernel-exploits
|
||||||
- https://github.com/coffee727/linux-exp
|
- https://github.com/coffee727/linux-exp
|
||||||
|
17
2006/CVE-2006-2822.md
Normal file
17
2006/CVE-2006-2822.md
Normal file
@ -0,0 +1,17 @@
|
|||||||
|
### [CVE-2006-2822](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2822)
|
||||||
|

|
||||||
|

|
||||||
|

|
||||||
|
|
||||||
|
### Description
|
||||||
|
|
||||||
|
SQL injection vulnerability in admin/default.asp in Dusan Drobac CodeAvalanche FreeForum (aka CAForum) 1.0 allows remote attackers to execute arbitrary SQL commands via the password parameter.
|
||||||
|
|
||||||
|
### POC
|
||||||
|
|
||||||
|
#### Reference
|
||||||
|
- http://securityreason.com/securityalert/1026
|
||||||
|
|
||||||
|
#### Github
|
||||||
|
No PoCs found on GitHub currently.
|
||||||
|
|
@ -16,6 +16,7 @@ No PoCs from references.
|
|||||||
- https://github.com/ARPSyndicate/cvemon
|
- https://github.com/ARPSyndicate/cvemon
|
||||||
- https://github.com/Al1ex/WindowsElevation
|
- https://github.com/Al1ex/WindowsElevation
|
||||||
- https://github.com/Ascotbe/Kernelhub
|
- https://github.com/Ascotbe/Kernelhub
|
||||||
|
- https://github.com/Cruxer8Mech/Idk
|
||||||
- https://github.com/fei9747/WindowsElevation
|
- https://github.com/fei9747/WindowsElevation
|
||||||
- https://github.com/lyshark/Windows-exploits
|
- https://github.com/lyshark/Windows-exploits
|
||||||
- https://github.com/makoto56/penetration-suite-toolkit
|
- https://github.com/makoto56/penetration-suite-toolkit
|
||||||
|
@ -28,6 +28,7 @@ Race condition in Linux kernel 2.6.17.4 and earlier allows local users to gain r
|
|||||||
- https://github.com/Shadowshusky/linux-kernel-exploits
|
- https://github.com/Shadowshusky/linux-kernel-exploits
|
||||||
- https://github.com/Singlea-lyh/linux-kernel-exploits
|
- https://github.com/Singlea-lyh/linux-kernel-exploits
|
||||||
- https://github.com/Snoopy-Sec/Localroot-ALL-CVE
|
- https://github.com/Snoopy-Sec/Localroot-ALL-CVE
|
||||||
|
- https://github.com/ZTK-009/linux-kernel-exploits
|
||||||
- https://github.com/albinjoshy03/linux-kernel-exploits
|
- https://github.com/albinjoshy03/linux-kernel-exploits
|
||||||
- https://github.com/alian87/linux-kernel-exploits
|
- https://github.com/alian87/linux-kernel-exploits
|
||||||
- https://github.com/coffee727/linux-exp
|
- https://github.com/coffee727/linux-exp
|
||||||
|
@ -25,6 +25,7 @@ No PoCs from references.
|
|||||||
- https://github.com/aulauniversal/Pppwn-Android
|
- https://github.com/aulauniversal/Pppwn-Android
|
||||||
- https://github.com/aulauniversal/Pppwn.Android
|
- https://github.com/aulauniversal/Pppwn.Android
|
||||||
- https://github.com/aulauniversal/Ps4-pppwn-Windows
|
- https://github.com/aulauniversal/Ps4-pppwn-Windows
|
||||||
|
- https://github.com/lvca-dev/easyPPPwn
|
||||||
- https://github.com/secdev/awesome-scapy
|
- https://github.com/secdev/awesome-scapy
|
||||||
- https://github.com/sonicps/pppwn-sonicps
|
- https://github.com/sonicps/pppwn-sonicps
|
||||||
- https://github.com/vineshgoyal/SISTR0-PPPwn
|
- https://github.com/vineshgoyal/SISTR0-PPPwn
|
||||||
|
@ -18,5 +18,6 @@ Stack-based buffer overflow in the animated cursor code in Microsoft Windows 200
|
|||||||
- https://github.com/Axua/CVE-2007-0038
|
- https://github.com/Axua/CVE-2007-0038
|
||||||
- https://github.com/CVEDB/PoC-List
|
- https://github.com/CVEDB/PoC-List
|
||||||
- https://github.com/CVEDB/awesome-cve-repo
|
- https://github.com/CVEDB/awesome-cve-repo
|
||||||
|
- https://github.com/Cruxer8Mech/Idk
|
||||||
- https://github.com/ycdxsb/WindowsPrivilegeEscalation
|
- https://github.com/ycdxsb/WindowsPrivilegeEscalation
|
||||||
|
|
||||||
|
@ -16,6 +16,7 @@ The ReadDirectoryChangesW API function on Microsoft Windows 2000, XP, Server 200
|
|||||||
- https://github.com/ARPSyndicate/cvemon
|
- https://github.com/ARPSyndicate/cvemon
|
||||||
- https://github.com/CVEDB/PoC-List
|
- https://github.com/CVEDB/PoC-List
|
||||||
- https://github.com/CVEDB/awesome-cve-repo
|
- https://github.com/CVEDB/awesome-cve-repo
|
||||||
|
- https://github.com/Cruxer8Mech/Idk
|
||||||
- https://github.com/disintegr8te/MonitorFileSystemWatcher
|
- https://github.com/disintegr8te/MonitorFileSystemWatcher
|
||||||
- https://github.com/ycdxsb/WindowsPrivilegeEscalation
|
- https://github.com/ycdxsb/WindowsPrivilegeEscalation
|
||||||
- https://github.com/z3APA3A/spydir
|
- https://github.com/z3APA3A/spydir
|
||||||
|
@ -13,5 +13,6 @@ Unspecified vulnerability in Microsoft Windows 2000 SP4 through Vista allows rem
|
|||||||
No PoCs from references.
|
No PoCs from references.
|
||||||
|
|
||||||
#### Github
|
#### Github
|
||||||
|
- https://github.com/Cruxer8Mech/Idk
|
||||||
- https://github.com/ycdxsb/WindowsPrivilegeEscalation
|
- https://github.com/ycdxsb/WindowsPrivilegeEscalation
|
||||||
|
|
||||||
|
@ -30,6 +30,7 @@ The vmsplice_to_pipe function in Linux kernel 2.6.17 through 2.6.24.1 does not v
|
|||||||
- https://github.com/Singlea-lyh/linux-kernel-exploits
|
- https://github.com/Singlea-lyh/linux-kernel-exploits
|
||||||
- https://github.com/Snoopy-Sec/Localroot-ALL-CVE
|
- https://github.com/Snoopy-Sec/Localroot-ALL-CVE
|
||||||
- https://github.com/Technoashofficial/kernel-exploitation-linux
|
- https://github.com/Technoashofficial/kernel-exploitation-linux
|
||||||
|
- https://github.com/ZTK-009/linux-kernel-exploits
|
||||||
- https://github.com/albinjoshy03/linux-kernel-exploits
|
- https://github.com/albinjoshy03/linux-kernel-exploits
|
||||||
- https://github.com/alian87/linux-kernel-exploits
|
- https://github.com/alian87/linux-kernel-exploits
|
||||||
- https://github.com/coffee727/linux-exp
|
- https://github.com/coffee727/linux-exp
|
||||||
|
@ -17,6 +17,7 @@ Unspecified vulnerability in the kernel in Microsoft Windows 2000 SP4, XP SP2, S
|
|||||||
- https://github.com/ARPSyndicate/cvemon
|
- https://github.com/ARPSyndicate/cvemon
|
||||||
- https://github.com/Al1ex/WindowsElevation
|
- https://github.com/Al1ex/WindowsElevation
|
||||||
- https://github.com/Ascotbe/Kernelhub
|
- https://github.com/Ascotbe/Kernelhub
|
||||||
|
- https://github.com/Cruxer8Mech/Idk
|
||||||
- https://github.com/fei9747/WindowsElevation
|
- https://github.com/fei9747/WindowsElevation
|
||||||
- https://github.com/lyshark/Windows-exploits
|
- https://github.com/lyshark/Windows-exploits
|
||||||
- https://github.com/makoto56/penetration-suite-toolkit
|
- https://github.com/makoto56/penetration-suite-toolkit
|
||||||
|
@ -16,6 +16,7 @@ afd.sys in the Ancillary Function Driver (AFD) component in Microsoft Windows XP
|
|||||||
#### Github
|
#### Github
|
||||||
- https://github.com/Al1ex/WindowsElevation
|
- https://github.com/Al1ex/WindowsElevation
|
||||||
- https://github.com/Ascotbe/Kernelhub
|
- https://github.com/Ascotbe/Kernelhub
|
||||||
|
- https://github.com/Cruxer8Mech/Idk
|
||||||
- https://github.com/fei9747/WindowsElevation
|
- https://github.com/fei9747/WindowsElevation
|
||||||
- https://github.com/lyshark/Windows-exploits
|
- https://github.com/lyshark/Windows-exploits
|
||||||
- https://github.com/ycdxsb/WindowsPrivilegeEscalation
|
- https://github.com/ycdxsb/WindowsPrivilegeEscalation
|
||||||
|
@ -16,6 +16,7 @@ Microsoft Windows 2000 Gold through SP4, XP Gold through SP3, Server 2003 SP1 an
|
|||||||
#### Github
|
#### Github
|
||||||
- https://github.com/Al1ex/WindowsElevation
|
- https://github.com/Al1ex/WindowsElevation
|
||||||
- https://github.com/Ascotbe/Kernelhub
|
- https://github.com/Ascotbe/Kernelhub
|
||||||
|
- https://github.com/Cruxer8Mech/Idk
|
||||||
- https://github.com/fei9747/WindowsElevation
|
- https://github.com/fei9747/WindowsElevation
|
||||||
- https://github.com/lyshark/Windows-exploits
|
- https://github.com/lyshark/Windows-exploits
|
||||||
- https://github.com/uroboros-security/SMB-CVE
|
- https://github.com/uroboros-security/SMB-CVE
|
||||||
|
@ -28,6 +28,7 @@ fs/open.c in the Linux kernel before 2.6.22 does not properly strip setuid and s
|
|||||||
- https://github.com/Shadowshusky/linux-kernel-exploits
|
- https://github.com/Shadowshusky/linux-kernel-exploits
|
||||||
- https://github.com/Singlea-lyh/linux-kernel-exploits
|
- https://github.com/Singlea-lyh/linux-kernel-exploits
|
||||||
- https://github.com/Snoopy-Sec/Localroot-ALL-CVE
|
- https://github.com/Snoopy-Sec/Localroot-ALL-CVE
|
||||||
|
- https://github.com/ZTK-009/linux-kernel-exploits
|
||||||
- https://github.com/albinjoshy03/linux-kernel-exploits
|
- https://github.com/albinjoshy03/linux-kernel-exploits
|
||||||
- https://github.com/alian87/linux-kernel-exploits
|
- https://github.com/alian87/linux-kernel-exploits
|
||||||
- https://github.com/coffee727/linux-exp
|
- https://github.com/coffee727/linux-exp
|
||||||
|
@ -27,6 +27,7 @@ The Server service in Microsoft Windows 2000 SP4, XP SP2 and SP3, Server 2003 SP
|
|||||||
- https://github.com/Ascotbe/Kernelhub
|
- https://github.com/Ascotbe/Kernelhub
|
||||||
- https://github.com/CVEDB/PoC-List
|
- https://github.com/CVEDB/PoC-List
|
||||||
- https://github.com/CVEDB/awesome-cve-repo
|
- https://github.com/CVEDB/awesome-cve-repo
|
||||||
|
- https://github.com/Cruxer8Mech/Idk
|
||||||
- https://github.com/H3xL00m/MS08-067
|
- https://github.com/H3xL00m/MS08-067
|
||||||
- https://github.com/Jean-Francois-C/Boot2root-CTFs-Writeups
|
- https://github.com/Jean-Francois-C/Boot2root-CTFs-Writeups
|
||||||
- https://github.com/Kuromesi/Py4CSKG
|
- https://github.com/Kuromesi/Py4CSKG
|
||||||
|
@ -15,6 +15,7 @@ No PoCs from references.
|
|||||||
#### Github
|
#### Github
|
||||||
- https://github.com/Al1ex/WindowsElevation
|
- https://github.com/Al1ex/WindowsElevation
|
||||||
- https://github.com/Ascotbe/Kernelhub
|
- https://github.com/Ascotbe/Kernelhub
|
||||||
|
- https://github.com/Cruxer8Mech/Idk
|
||||||
- https://github.com/fei9747/WindowsElevation
|
- https://github.com/fei9747/WindowsElevation
|
||||||
- https://github.com/ycdxsb/WindowsPrivilegeEscalation
|
- https://github.com/ycdxsb/WindowsPrivilegeEscalation
|
||||||
|
|
||||||
|
@ -17,6 +17,7 @@ The Windows Printing Service in Microsoft Windows 2000 SP4, XP SP2 and SP3, Serv
|
|||||||
- https://github.com/ARPSyndicate/cvemon
|
- https://github.com/ARPSyndicate/cvemon
|
||||||
- https://github.com/CVEDB/PoC-List
|
- https://github.com/CVEDB/PoC-List
|
||||||
- https://github.com/CVEDB/awesome-cve-repo
|
- https://github.com/CVEDB/awesome-cve-repo
|
||||||
|
- https://github.com/Cruxer8Mech/Idk
|
||||||
- https://github.com/clearbluejar/cve-markdown-charts
|
- https://github.com/clearbluejar/cve-markdown-charts
|
||||||
- https://github.com/developer3000S/PoC-in-GitHub
|
- https://github.com/developer3000S/PoC-in-GitHub
|
||||||
- https://github.com/hectorgie/PoC-in-GitHub
|
- https://github.com/hectorgie/PoC-in-GitHub
|
||||||
|
@ -13,5 +13,6 @@ The WebDAV extension in Microsoft Internet Information Services (IIS) 5.0 on Win
|
|||||||
- https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-020
|
- https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-020
|
||||||
|
|
||||||
#### Github
|
#### Github
|
||||||
|
- https://github.com/Cruxer8Mech/Idk
|
||||||
- https://github.com/ycdxsb/WindowsPrivilegeEscalation
|
- https://github.com/ycdxsb/WindowsPrivilegeEscalation
|
||||||
|
|
||||||
|
@ -31,6 +31,7 @@ udev before 1.4.1 does not verify whether a NETLINK message originates from kern
|
|||||||
- https://github.com/Shadowshusky/linux-kernel-exploits
|
- https://github.com/Shadowshusky/linux-kernel-exploits
|
||||||
- https://github.com/Singlea-lyh/linux-kernel-exploits
|
- https://github.com/Singlea-lyh/linux-kernel-exploits
|
||||||
- https://github.com/Snoopy-Sec/Localroot-ALL-CVE
|
- https://github.com/Snoopy-Sec/Localroot-ALL-CVE
|
||||||
|
- https://github.com/ZTK-009/linux-kernel-exploits
|
||||||
- https://github.com/albinjoshy03/linux-kernel-exploits
|
- https://github.com/albinjoshy03/linux-kernel-exploits
|
||||||
- https://github.com/alian87/linux-kernel-exploits
|
- https://github.com/alian87/linux-kernel-exploits
|
||||||
- https://github.com/amane312/Linux_menthor
|
- https://github.com/amane312/Linux_menthor
|
||||||
|
@ -29,6 +29,7 @@ The exit_notify function in kernel/exit.c in the Linux kernel before 2.6.30-rc1
|
|||||||
- https://github.com/Shadowshusky/linux-kernel-exploits
|
- https://github.com/Shadowshusky/linux-kernel-exploits
|
||||||
- https://github.com/Singlea-lyh/linux-kernel-exploits
|
- https://github.com/Singlea-lyh/linux-kernel-exploits
|
||||||
- https://github.com/Snoopy-Sec/Localroot-ALL-CVE
|
- https://github.com/Snoopy-Sec/Localroot-ALL-CVE
|
||||||
|
- https://github.com/ZTK-009/linux-kernel-exploits
|
||||||
- https://github.com/albinjoshy03/linux-kernel-exploits
|
- https://github.com/albinjoshy03/linux-kernel-exploits
|
||||||
- https://github.com/alian87/linux-kernel-exploits
|
- https://github.com/alian87/linux-kernel-exploits
|
||||||
- https://github.com/coffee727/linux-exp
|
- https://github.com/coffee727/linux-exp
|
||||||
|
@ -16,6 +16,7 @@ The WebDAV extension in Microsoft Internet Information Services (IIS) 5.1 and 6.
|
|||||||
|
|
||||||
#### Github
|
#### Github
|
||||||
- https://github.com/Al1ex/WindowsElevation
|
- https://github.com/Al1ex/WindowsElevation
|
||||||
|
- https://github.com/Cruxer8Mech/Idk
|
||||||
- https://github.com/fei9747/WindowsElevation
|
- https://github.com/fei9747/WindowsElevation
|
||||||
- https://github.com/ycdxsb/WindowsPrivilegeEscalation
|
- https://github.com/ycdxsb/WindowsPrivilegeEscalation
|
||||||
|
|
||||||
|
@ -15,6 +15,7 @@ Microsoft Windows Vista Gold, SP1, and SP2, Windows Server 2008 Gold and SP2, an
|
|||||||
#### Github
|
#### Github
|
||||||
- https://github.com/Al1ex/WindowsElevation
|
- https://github.com/Al1ex/WindowsElevation
|
||||||
- https://github.com/Ascotbe/Kernelhub
|
- https://github.com/Ascotbe/Kernelhub
|
||||||
|
- https://github.com/Cruxer8Mech/Idk
|
||||||
- https://github.com/EricwentwithCyber/Vulnerability-Scan-Lab
|
- https://github.com/EricwentwithCyber/Vulnerability-Scan-Lab
|
||||||
- https://github.com/fei9747/WindowsElevation
|
- https://github.com/fei9747/WindowsElevation
|
||||||
- https://github.com/lyshark/Windows-exploits
|
- https://github.com/lyshark/Windows-exploits
|
||||||
|
@ -34,6 +34,7 @@ The Linux kernel 2.6.0 through 2.6.30.4, and 2.4.4 through 2.4.37.4, does not in
|
|||||||
- https://github.com/Singlea-lyh/linux-kernel-exploits
|
- https://github.com/Singlea-lyh/linux-kernel-exploits
|
||||||
- https://github.com/Snoopy-Sec/Localroot-ALL-CVE
|
- https://github.com/Snoopy-Sec/Localroot-ALL-CVE
|
||||||
- https://github.com/Technoashofficial/kernel-exploitation-linux
|
- https://github.com/Technoashofficial/kernel-exploitation-linux
|
||||||
|
- https://github.com/ZTK-009/linux-kernel-exploits
|
||||||
- https://github.com/albinjoshy03/linux-kernel-exploits
|
- https://github.com/albinjoshy03/linux-kernel-exploits
|
||||||
- https://github.com/alian87/linux-kernel-exploits
|
- https://github.com/alian87/linux-kernel-exploits
|
||||||
- https://github.com/cloudsec/exploit
|
- https://github.com/cloudsec/exploit
|
||||||
|
@ -34,6 +34,7 @@ The udp_sendmsg function in the UDP implementation in (1) net/ipv4/udp.c and (2)
|
|||||||
- https://github.com/Snoopy-Sec/Localroot-ALL-CVE
|
- https://github.com/Snoopy-Sec/Localroot-ALL-CVE
|
||||||
- https://github.com/YgorAlberto/Ethical-Hacker
|
- https://github.com/YgorAlberto/Ethical-Hacker
|
||||||
- https://github.com/YgorAlberto/ygoralberto.github.io
|
- https://github.com/YgorAlberto/ygoralberto.github.io
|
||||||
|
- https://github.com/ZTK-009/linux-kernel-exploits
|
||||||
- https://github.com/albinjoshy03/linux-kernel-exploits
|
- https://github.com/albinjoshy03/linux-kernel-exploits
|
||||||
- https://github.com/alian87/linux-kernel-exploits
|
- https://github.com/alian87/linux-kernel-exploits
|
||||||
- https://github.com/cloudsec/exploit
|
- https://github.com/cloudsec/exploit
|
||||||
|
@ -30,6 +30,7 @@ Multiple race conditions in fs/pipe.c in the Linux kernel before 2.6.32-rc6 allo
|
|||||||
- https://github.com/Shadowshusky/linux-kernel-exploits
|
- https://github.com/Shadowshusky/linux-kernel-exploits
|
||||||
- https://github.com/Singlea-lyh/linux-kernel-exploits
|
- https://github.com/Singlea-lyh/linux-kernel-exploits
|
||||||
- https://github.com/Snoopy-Sec/Localroot-ALL-CVE
|
- https://github.com/Snoopy-Sec/Localroot-ALL-CVE
|
||||||
|
- https://github.com/ZTK-009/linux-kernel-exploits
|
||||||
- https://github.com/albinjoshy03/linux-kernel-exploits
|
- https://github.com/albinjoshy03/linux-kernel-exploits
|
||||||
- https://github.com/alian87/linux-kernel-exploits
|
- https://github.com/alian87/linux-kernel-exploits
|
||||||
- https://github.com/coffee727/linux-exp
|
- https://github.com/coffee727/linux-exp
|
||||||
|
@ -16,6 +16,7 @@ No PoCs from references.
|
|||||||
- https://github.com/Al1ex/WindowsElevation
|
- https://github.com/Al1ex/WindowsElevation
|
||||||
- https://github.com/Amnesthesia/EHAPT-Group-Project
|
- https://github.com/Amnesthesia/EHAPT-Group-Project
|
||||||
- https://github.com/Ascotbe/Kernelhub
|
- https://github.com/Ascotbe/Kernelhub
|
||||||
|
- https://github.com/Cruxer8Mech/Idk
|
||||||
- https://github.com/EricwentwithCyber/Vulnerability-Scan-Lab
|
- https://github.com/EricwentwithCyber/Vulnerability-Scan-Lab
|
||||||
- https://github.com/fei9747/WindowsElevation
|
- https://github.com/fei9747/WindowsElevation
|
||||||
- https://github.com/uroboros-security/SMB-CVE
|
- https://github.com/uroboros-security/SMB-CVE
|
||||||
|
@ -14,6 +14,7 @@ No PoCs from references.
|
|||||||
|
|
||||||
#### Github
|
#### Github
|
||||||
- https://github.com/Ascotbe/Kernelhub
|
- https://github.com/Ascotbe/Kernelhub
|
||||||
|
- https://github.com/Cruxer8Mech/Idk
|
||||||
- https://github.com/lyshark/Windows-exploits
|
- https://github.com/lyshark/Windows-exploits
|
||||||
- https://github.com/ycdxsb/WindowsPrivilegeEscalation
|
- https://github.com/ycdxsb/WindowsPrivilegeEscalation
|
||||||
|
|
||||||
|
@ -14,6 +14,7 @@ No PoCs from references.
|
|||||||
|
|
||||||
#### Github
|
#### Github
|
||||||
- https://github.com/Ascotbe/Kernelhub
|
- https://github.com/Ascotbe/Kernelhub
|
||||||
|
- https://github.com/Cruxer8Mech/Idk
|
||||||
- https://github.com/aRustyDev/C844
|
- https://github.com/aRustyDev/C844
|
||||||
- https://github.com/lyshark/Windows-exploits
|
- https://github.com/lyshark/Windows-exploits
|
||||||
- https://github.com/ycdxsb/WindowsPrivilegeEscalation
|
- https://github.com/ycdxsb/WindowsPrivilegeEscalation
|
||||||
|
@ -28,6 +28,7 @@ The do_pages_move function in mm/migrate.c in the Linux kernel before 2.6.33-rc7
|
|||||||
- https://github.com/SecWiki/linux-kernel-exploits
|
- https://github.com/SecWiki/linux-kernel-exploits
|
||||||
- https://github.com/Shadowshusky/linux-kernel-exploits
|
- https://github.com/Shadowshusky/linux-kernel-exploits
|
||||||
- https://github.com/Singlea-lyh/linux-kernel-exploits
|
- https://github.com/Singlea-lyh/linux-kernel-exploits
|
||||||
|
- https://github.com/ZTK-009/linux-kernel-exploits
|
||||||
- https://github.com/albinjoshy03/linux-kernel-exploits
|
- https://github.com/albinjoshy03/linux-kernel-exploits
|
||||||
- https://github.com/alian87/linux-kernel-exploits
|
- https://github.com/alian87/linux-kernel-exploits
|
||||||
- https://github.com/coffee727/linux-exp
|
- https://github.com/coffee727/linux-exp
|
||||||
|
@ -30,6 +30,7 @@ No PoCs from references.
|
|||||||
- https://github.com/Shadowshusky/linux-kernel-exploits
|
- https://github.com/Shadowshusky/linux-kernel-exploits
|
||||||
- https://github.com/Singlea-lyh/linux-kernel-exploits
|
- https://github.com/Singlea-lyh/linux-kernel-exploits
|
||||||
- https://github.com/Snoopy-Sec/Localroot-ALL-CVE
|
- https://github.com/Snoopy-Sec/Localroot-ALL-CVE
|
||||||
|
- https://github.com/ZTK-009/linux-kernel-exploits
|
||||||
- https://github.com/albinjoshy03/linux-kernel-exploits
|
- https://github.com/albinjoshy03/linux-kernel-exploits
|
||||||
- https://github.com/alian87/linux-kernel-exploits
|
- https://github.com/alian87/linux-kernel-exploits
|
||||||
- https://github.com/coffee727/linux-exp
|
- https://github.com/coffee727/linux-exp
|
||||||
|
@ -14,6 +14,7 @@ The Windows kernel-mode drivers in win32k.sys in Microsoft Windows XP SP2 and SP
|
|||||||
|
|
||||||
#### Github
|
#### Github
|
||||||
- https://github.com/Al1ex/WindowsElevation
|
- https://github.com/Al1ex/WindowsElevation
|
||||||
|
- https://github.com/Cruxer8Mech/Idk
|
||||||
- https://github.com/fei9747/WindowsElevation
|
- https://github.com/fei9747/WindowsElevation
|
||||||
- https://github.com/ycdxsb/WindowsPrivilegeEscalation
|
- https://github.com/ycdxsb/WindowsPrivilegeEscalation
|
||||||
|
|
||||||
|
@ -14,6 +14,7 @@ The Windows kernel-mode drivers in win32k.sys in Microsoft Windows XP SP2 and SP
|
|||||||
|
|
||||||
#### Github
|
#### Github
|
||||||
- https://github.com/Ascotbe/Kernelhub
|
- https://github.com/Ascotbe/Kernelhub
|
||||||
|
- https://github.com/Cruxer8Mech/Idk
|
||||||
- https://github.com/lyshark/Windows-exploits
|
- https://github.com/lyshark/Windows-exploits
|
||||||
- https://github.com/ycdxsb/WindowsPrivilegeEscalation
|
- https://github.com/ycdxsb/WindowsPrivilegeEscalation
|
||||||
|
|
||||||
|
@ -15,6 +15,7 @@ No PoCs from references.
|
|||||||
#### Github
|
#### Github
|
||||||
- https://github.com/Al1ex/WindowsElevation
|
- https://github.com/Al1ex/WindowsElevation
|
||||||
- https://github.com/Ascotbe/Kernelhub
|
- https://github.com/Ascotbe/Kernelhub
|
||||||
|
- https://github.com/Cruxer8Mech/Idk
|
||||||
- https://github.com/fei9747/WindowsElevation
|
- https://github.com/fei9747/WindowsElevation
|
||||||
- https://github.com/ycdxsb/WindowsPrivilegeEscalation
|
- https://github.com/ycdxsb/WindowsPrivilegeEscalation
|
||||||
|
|
||||||
|
@ -13,6 +13,7 @@ Buffer overflow in Microsoft Internet Information Services (IIS) 7.5, when FastC
|
|||||||
No PoCs from references.
|
No PoCs from references.
|
||||||
|
|
||||||
#### Github
|
#### Github
|
||||||
|
- https://github.com/Cruxer8Mech/Idk
|
||||||
- https://github.com/Romulus968/copycat
|
- https://github.com/Romulus968/copycat
|
||||||
- https://github.com/bioly230/THM_Alfred
|
- https://github.com/bioly230/THM_Alfred
|
||||||
- https://github.com/dominicporter/shodan-playing
|
- https://github.com/dominicporter/shodan-playing
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
### [CVE-2010-2954](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2954)
|
### [CVE-2010-2954](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2954)
|
||||||

|

|
||||||

|

|
||||||

|

|
||||||
|
|
||||||
### Description
|
### Description
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
### [CVE-2010-2955](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2955)
|
### [CVE-2010-2955](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2955)
|
||||||

|

|
||||||

|

|
||||||

|

|
||||||
|
|
||||||
### Description
|
### Description
|
||||||
|
@ -45,6 +45,7 @@ No PoCs from references.
|
|||||||
- https://github.com/Skixie/OSCP-Journey
|
- https://github.com/Skixie/OSCP-Journey
|
||||||
- https://github.com/Snoopy-Sec/Localroot-ALL-CVE
|
- https://github.com/Snoopy-Sec/Localroot-ALL-CVE
|
||||||
- https://github.com/Technoashofficial/kernel-exploitation-linux
|
- https://github.com/Technoashofficial/kernel-exploitation-linux
|
||||||
|
- https://github.com/ZTK-009/linux-kernel-exploits
|
||||||
- https://github.com/akr3ch/OSCP-Survival-Guide
|
- https://github.com/akr3ch/OSCP-Survival-Guide
|
||||||
- https://github.com/aktechnohacker/OSCP-Notes
|
- https://github.com/aktechnohacker/OSCP-Notes
|
||||||
- https://github.com/albinjoshy03/linux-kernel-exploits
|
- https://github.com/albinjoshy03/linux-kernel-exploits
|
||||||
|
@ -34,6 +34,7 @@ The compat_alloc_user_space functions in include/asm/compat.h files in the Linux
|
|||||||
- https://github.com/Snoopy-Sec/Localroot-ALL-CVE
|
- https://github.com/Snoopy-Sec/Localroot-ALL-CVE
|
||||||
- https://github.com/SteinsGatep001/Binary
|
- https://github.com/SteinsGatep001/Binary
|
||||||
- https://github.com/Technoashofficial/kernel-exploitation-linux
|
- https://github.com/Technoashofficial/kernel-exploitation-linux
|
||||||
|
- https://github.com/ZTK-009/linux-kernel-exploits
|
||||||
- https://github.com/albinjoshy03/linux-kernel-exploits
|
- https://github.com/albinjoshy03/linux-kernel-exploits
|
||||||
- https://github.com/alian87/linux-kernel-exploits
|
- https://github.com/alian87/linux-kernel-exploits
|
||||||
- https://github.com/coffee727/linux-exp
|
- https://github.com/coffee727/linux-exp
|
||||||
|
@ -33,6 +33,7 @@ The IA32 system call emulation functionality in arch/x86/ia32/ia32entry.S in the
|
|||||||
- https://github.com/Singlea-lyh/linux-kernel-exploits
|
- https://github.com/Singlea-lyh/linux-kernel-exploits
|
||||||
- https://github.com/Snoopy-Sec/Localroot-ALL-CVE
|
- https://github.com/Snoopy-Sec/Localroot-ALL-CVE
|
||||||
- https://github.com/Technoashofficial/kernel-exploitation-linux
|
- https://github.com/Technoashofficial/kernel-exploitation-linux
|
||||||
|
- https://github.com/ZTK-009/linux-kernel-exploits
|
||||||
- https://github.com/albinjoshy03/linux-kernel-exploits
|
- https://github.com/albinjoshy03/linux-kernel-exploits
|
||||||
- https://github.com/alian87/linux-kernel-exploits
|
- https://github.com/alian87/linux-kernel-exploits
|
||||||
- https://github.com/coffee727/linux-exp
|
- https://github.com/coffee727/linux-exp
|
||||||
|
@ -15,6 +15,7 @@ The Windows Task Scheduler in Microsoft Windows Vista SP1 and SP2, Windows Serve
|
|||||||
#### Github
|
#### Github
|
||||||
- https://github.com/Al1ex/WindowsElevation
|
- https://github.com/Al1ex/WindowsElevation
|
||||||
- https://github.com/Ascotbe/Kernelhub
|
- https://github.com/Ascotbe/Kernelhub
|
||||||
|
- https://github.com/Cruxer8Mech/Idk
|
||||||
- https://github.com/fei9747/WindowsElevation
|
- https://github.com/fei9747/WindowsElevation
|
||||||
- https://github.com/lyshark/Windows-exploits
|
- https://github.com/lyshark/Windows-exploits
|
||||||
- https://github.com/ycdxsb/WindowsPrivilegeEscalation
|
- https://github.com/ycdxsb/WindowsPrivilegeEscalation
|
||||||
|
@ -32,6 +32,7 @@ No PoCs from references.
|
|||||||
- https://github.com/Singlea-lyh/linux-kernel-exploits
|
- https://github.com/Singlea-lyh/linux-kernel-exploits
|
||||||
- https://github.com/Snoopy-Sec/Localroot-ALL-CVE
|
- https://github.com/Snoopy-Sec/Localroot-ALL-CVE
|
||||||
- https://github.com/Technoashofficial/kernel-exploitation-linux
|
- https://github.com/Technoashofficial/kernel-exploitation-linux
|
||||||
|
- https://github.com/ZTK-009/linux-kernel-exploits
|
||||||
- https://github.com/albinjoshy03/linux-kernel-exploits
|
- https://github.com/albinjoshy03/linux-kernel-exploits
|
||||||
- https://github.com/alian87/linux-kernel-exploits
|
- https://github.com/alian87/linux-kernel-exploits
|
||||||
- https://github.com/coffee727/linux-exp
|
- https://github.com/coffee727/linux-exp
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
### [CVE-2010-3705](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3705)
|
### [CVE-2010-3705](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3705)
|
||||||

|

|
||||||

|

|
||||||

|

|
||||||
|
|
||||||
### Description
|
### Description
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
### [CVE-2010-3873](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3873)
|
### [CVE-2010-3873](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3873)
|
||||||

|

|
||||||

|

|
||||||

|

|
||||||
|
|
||||||
### Description
|
### Description
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
### [CVE-2010-3875](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3875)
|
### [CVE-2010-3875](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3875)
|
||||||

|

|
||||||

|

|
||||||

|

|
||||||
|
|
||||||
### Description
|
### Description
|
||||||
|
@ -14,5 +14,6 @@ Unspecified vulnerability in Microsoft Windows on 32-bit platforms allows local
|
|||||||
- http://www.symantec.com/connect/blogs/stuxnet-using-three-additional-zero-day-vulnerabilities
|
- http://www.symantec.com/connect/blogs/stuxnet-using-three-additional-zero-day-vulnerabilities
|
||||||
|
|
||||||
#### Github
|
#### Github
|
||||||
|
- https://github.com/Cruxer8Mech/Idk
|
||||||
- https://github.com/ycdxsb/WindowsPrivilegeEscalation
|
- https://github.com/ycdxsb/WindowsPrivilegeEscalation
|
||||||
|
|
||||||
|
@ -53,6 +53,7 @@ The rds_page_copy_user function in net/rds/page.c in the Reliable Datagram Socke
|
|||||||
- https://github.com/Skixie/OSCP-Journey
|
- https://github.com/Skixie/OSCP-Journey
|
||||||
- https://github.com/Snoopy-Sec/Localroot-ALL-CVE
|
- https://github.com/Snoopy-Sec/Localroot-ALL-CVE
|
||||||
- https://github.com/T3b0g025/PWK-CheatSheet
|
- https://github.com/T3b0g025/PWK-CheatSheet
|
||||||
|
- https://github.com/ZTK-009/linux-kernel-exploits
|
||||||
- https://github.com/akr3ch/OSCP-Survival-Guide
|
- https://github.com/akr3ch/OSCP-Survival-Guide
|
||||||
- https://github.com/aktechnohacker/OSCP-Notes
|
- https://github.com/aktechnohacker/OSCP-Notes
|
||||||
- https://github.com/albinjoshy03/linux-kernel-exploits
|
- https://github.com/albinjoshy03/linux-kernel-exploits
|
||||||
|
@ -32,6 +32,7 @@ The ipc subsystem in the Linux kernel before 2.6.37-rc1 does not initialize cert
|
|||||||
- https://github.com/Shadowshusky/linux-kernel-exploits
|
- https://github.com/Shadowshusky/linux-kernel-exploits
|
||||||
- https://github.com/Singlea-lyh/linux-kernel-exploits
|
- https://github.com/Singlea-lyh/linux-kernel-exploits
|
||||||
- https://github.com/Snoopy-Sec/Localroot-ALL-CVE
|
- https://github.com/Snoopy-Sec/Localroot-ALL-CVE
|
||||||
|
- https://github.com/ZTK-009/linux-kernel-exploits
|
||||||
- https://github.com/albinjoshy03/linux-kernel-exploits
|
- https://github.com/albinjoshy03/linux-kernel-exploits
|
||||||
- https://github.com/alian87/linux-kernel-exploits
|
- https://github.com/alian87/linux-kernel-exploits
|
||||||
- https://github.com/coffee727/linux-exp
|
- https://github.com/coffee727/linux-exp
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
### [CVE-2010-4164](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4164)
|
### [CVE-2010-4164](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4164)
|
||||||

|

|
||||||

|

|
||||||

|

|
||||||
|
|
||||||
### Description
|
### Description
|
||||||
|
@ -32,6 +32,7 @@ The do_exit function in kernel/exit.c in the Linux kernel before 2.6.36.2 does n
|
|||||||
- https://github.com/Singlea-lyh/linux-kernel-exploits
|
- https://github.com/Singlea-lyh/linux-kernel-exploits
|
||||||
- https://github.com/Snoopy-Sec/Localroot-ALL-CVE
|
- https://github.com/Snoopy-Sec/Localroot-ALL-CVE
|
||||||
- https://github.com/Technoashofficial/kernel-exploitation-linux
|
- https://github.com/Technoashofficial/kernel-exploitation-linux
|
||||||
|
- https://github.com/ZTK-009/linux-kernel-exploits
|
||||||
- https://github.com/albinjoshy03/linux-kernel-exploits
|
- https://github.com/albinjoshy03/linux-kernel-exploits
|
||||||
- https://github.com/alian87/linux-kernel-exploits
|
- https://github.com/alian87/linux-kernel-exploits
|
||||||
- https://github.com/coffee727/linux-exp
|
- https://github.com/coffee727/linux-exp
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
### [CVE-2010-4342](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4342)
|
### [CVE-2010-4342](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4342)
|
||||||

|

|
||||||

|

|
||||||

|

|
||||||
|
|
||||||
### Description
|
### Description
|
||||||
|
@ -30,6 +30,7 @@ No PoCs from references.
|
|||||||
- https://github.com/Shadowshusky/linux-kernel-exploits
|
- https://github.com/Shadowshusky/linux-kernel-exploits
|
||||||
- https://github.com/Singlea-lyh/linux-kernel-exploits
|
- https://github.com/Singlea-lyh/linux-kernel-exploits
|
||||||
- https://github.com/Snoopy-Sec/Localroot-ALL-CVE
|
- https://github.com/Snoopy-Sec/Localroot-ALL-CVE
|
||||||
|
- https://github.com/ZTK-009/linux-kernel-exploits
|
||||||
- https://github.com/albinjoshy03/linux-kernel-exploits
|
- https://github.com/albinjoshy03/linux-kernel-exploits
|
||||||
- https://github.com/alian87/linux-kernel-exploits
|
- https://github.com/alian87/linux-kernel-exploits
|
||||||
- https://github.com/coffee727/linux-exp
|
- https://github.com/coffee727/linux-exp
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
### [CVE-2010-4527](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4527)
|
### [CVE-2010-4527](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4527)
|
||||||

|

|
||||||

|

|
||||||

|

|
||||||
|
|
||||||
### Description
|
### Description
|
||||||
|
@ -14,5 +14,6 @@ The Trace Events functionality in the kernel in Microsoft Windows XP SP3 does no
|
|||||||
|
|
||||||
#### Github
|
#### Github
|
||||||
- https://github.com/Ascotbe/Kernelhub
|
- https://github.com/Ascotbe/Kernelhub
|
||||||
|
- https://github.com/Cruxer8Mech/Idk
|
||||||
- https://github.com/ycdxsb/WindowsPrivilegeEscalation
|
- https://github.com/ycdxsb/WindowsPrivilegeEscalation
|
||||||
|
|
||||||
|
17
2011/CVE-2011-0615.md
Normal file
17
2011/CVE-2011-0615.md
Normal file
@ -0,0 +1,17 @@
|
|||||||
|
### [CVE-2011-0615](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0615)
|
||||||
|

|
||||||
|

|
||||||
|

|
||||||
|
|
||||||
|
### Description
|
||||||
|
|
||||||
|
Multiple buffer overflows in Adobe Audition 3.0.1 and earlier allow remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via crafted data in unspecified fields in the TRKM chunk in an Audition Session (aka .ses) file, related to inconsistent use of character data types.
|
||||||
|
|
||||||
|
### POC
|
||||||
|
|
||||||
|
#### Reference
|
||||||
|
- http://www.coresecurity.com/content/Adobe-Audition-malformed-SES-file
|
||||||
|
|
||||||
|
#### Github
|
||||||
|
No PoCs found on GitHub currently.
|
||||||
|
|
@ -18,5 +18,6 @@ No PoCs from references.
|
|||||||
- https://github.com/BrunoPujos/CVE-2011-1237
|
- https://github.com/BrunoPujos/CVE-2011-1237
|
||||||
- https://github.com/CVEDB/PoC-List
|
- https://github.com/CVEDB/PoC-List
|
||||||
- https://github.com/CVEDB/awesome-cve-repo
|
- https://github.com/CVEDB/awesome-cve-repo
|
||||||
|
- https://github.com/Cruxer8Mech/Idk
|
||||||
- https://github.com/ycdxsb/WindowsPrivilegeEscalation
|
- https://github.com/ycdxsb/WindowsPrivilegeEscalation
|
||||||
|
|
||||||
|
@ -19,6 +19,7 @@ The Ancillary Function Driver (AFD) in afd.sys in Microsoft Windows XP SP2 and S
|
|||||||
- https://github.com/Ascotbe/Kernelhub
|
- https://github.com/Ascotbe/Kernelhub
|
||||||
- https://github.com/CVEDB/PoC-List
|
- https://github.com/CVEDB/PoC-List
|
||||||
- https://github.com/CVEDB/awesome-cve-repo
|
- https://github.com/CVEDB/awesome-cve-repo
|
||||||
|
- https://github.com/Cruxer8Mech/Idk
|
||||||
- https://github.com/H3xL00m/CVE-2011-1249
|
- https://github.com/H3xL00m/CVE-2011-1249
|
||||||
- https://github.com/Madusanka99/OHTS
|
- https://github.com/Madusanka99/OHTS
|
||||||
- https://github.com/c0d3cr4f73r/CVE-2011-1249
|
- https://github.com/c0d3cr4f73r/CVE-2011-1249
|
||||||
|
@ -11,6 +11,7 @@ The encryptPassword function in Login.js in ManageEngine ServiceDesk Plus (SDP)
|
|||||||
|
|
||||||
#### Reference
|
#### Reference
|
||||||
- http://securityreason.com/securityalert/8385
|
- http://securityreason.com/securityalert/8385
|
||||||
|
- http://www.coresecurity.com/content/multiples-vulnerabilities-manageengine-sdp
|
||||||
|
|
||||||
#### Github
|
#### Github
|
||||||
No PoCs found on GitHub currently.
|
No PoCs found on GitHub currently.
|
||||||
|
@ -11,6 +11,7 @@ Cross-site scripting (XSS) vulnerability in SolutionSearch.do in ManageEngine Se
|
|||||||
|
|
||||||
#### Reference
|
#### Reference
|
||||||
- http://securityreason.com/securityalert/8385
|
- http://securityreason.com/securityalert/8385
|
||||||
|
- http://www.coresecurity.com/content/multiples-vulnerabilities-manageengine-sdp
|
||||||
|
|
||||||
#### Github
|
#### Github
|
||||||
No PoCs found on GitHub currently.
|
No PoCs found on GitHub currently.
|
||||||
|
@ -11,6 +11,7 @@ Heap-based buffer overflow in xlssr.dll in Autonomy KeyView, as used in IBM Lotu
|
|||||||
|
|
||||||
#### Reference
|
#### Reference
|
||||||
- http://securityreason.com/securityalert/8263
|
- http://securityreason.com/securityalert/8263
|
||||||
|
- http://www.coresecurity.com/content/LotusNotes-XLS-viewer-heap-overflow
|
||||||
|
|
||||||
#### Github
|
#### Github
|
||||||
No PoCs found on GitHub currently.
|
No PoCs found on GitHub currently.
|
||||||
|
17
2011/CVE-2011-1513.md
Normal file
17
2011/CVE-2011-1513.md
Normal file
@ -0,0 +1,17 @@
|
|||||||
|
### [CVE-2011-1513](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1513)
|
||||||
|

|
||||||
|

|
||||||
|

|
||||||
|
|
||||||
|
### Description
|
||||||
|
|
||||||
|
Static code injection vulnerability in install_.php in e107 CMS 0.7.24 and probably earlier versions, when the installation script is not removed, allows remote attackers to inject arbitrary PHP code into e107_config.php via a crafted MySQL server name.
|
||||||
|
|
||||||
|
### POC
|
||||||
|
|
||||||
|
#### Reference
|
||||||
|
- http://www.coresecurity.com/content/e107-cms-script-command-injection
|
||||||
|
|
||||||
|
#### Github
|
||||||
|
No PoCs found on GitHub currently.
|
||||||
|
|
17
2011/CVE-2011-1514.md
Normal file
17
2011/CVE-2011-1514.md
Normal file
@ -0,0 +1,17 @@
|
|||||||
|
### [CVE-2011-1514](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1514)
|
||||||
|

|
||||||
|

|
||||||
|

|
||||||
|
|
||||||
|
### Description
|
||||||
|
|
||||||
|
The inet service in HP OpenView Storage Data Protector 6.00 through 6.20 allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via a request containing crafted parameters.
|
||||||
|
|
||||||
|
### POC
|
||||||
|
|
||||||
|
#### Reference
|
||||||
|
- http://www.coresecurity.com/content/HP-Data-Protector-multiple-vulnerabilities
|
||||||
|
|
||||||
|
#### Github
|
||||||
|
No PoCs found on GitHub currently.
|
||||||
|
|
17
2011/CVE-2011-1515.md
Normal file
17
2011/CVE-2011-1515.md
Normal file
@ -0,0 +1,17 @@
|
|||||||
|
### [CVE-2011-1515](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1515)
|
||||||
|

|
||||||
|

|
||||||
|

|
||||||
|
|
||||||
|
### Description
|
||||||
|
|
||||||
|
The inet service in HP OpenView Storage Data Protector 6.00 through 6.20 allows remote attackers to cause a denial of service (daemon exit) via a request containing crafted parameters.
|
||||||
|
|
||||||
|
### POC
|
||||||
|
|
||||||
|
#### Reference
|
||||||
|
- http://www.coresecurity.com/content/HP-Data-Protector-multiple-vulnerabilities
|
||||||
|
|
||||||
|
#### Github
|
||||||
|
No PoCs found on GitHub currently.
|
||||||
|
|
@ -11,6 +11,7 @@ Multiple stack-based buffer overflows in the inet service in HP OpenView Storage
|
|||||||
|
|
||||||
#### Reference
|
#### Reference
|
||||||
- http://securityreason.com/securityalert/8288
|
- http://securityreason.com/securityalert/8288
|
||||||
|
- http://www.coresecurity.com/content/HP-Data-Protector-multiple-vulnerabilities
|
||||||
- http://www.exploit-db.com/exploits/17458
|
- http://www.exploit-db.com/exploits/17458
|
||||||
- http://www.exploit-db.com/exploits/17490
|
- http://www.exploit-db.com/exploits/17490
|
||||||
|
|
||||||
|
@ -11,6 +11,7 @@ Buffer overflow in omniinet.exe in the inet service in HP OpenView Storage Data
|
|||||||
|
|
||||||
#### Reference
|
#### Reference
|
||||||
- http://securityreason.com/securityalert/8289
|
- http://securityreason.com/securityalert/8289
|
||||||
|
- http://www.coresecurity.com/content/HP-Data-Protector-EXECCMD-Vulnerability
|
||||||
- http://www.exploit-db.com/exploits/17461
|
- http://www.exploit-db.com/exploits/17461
|
||||||
|
|
||||||
#### Github
|
#### Github
|
||||||
|
@ -17,6 +17,7 @@ NDISTAPI.sys in the NDISTAPI driver in Remote Access Service (RAS) in Microsoft
|
|||||||
- https://github.com/Al1ex/WindowsElevation
|
- https://github.com/Al1ex/WindowsElevation
|
||||||
- https://github.com/Ascotbe/Kernelhub
|
- https://github.com/Ascotbe/Kernelhub
|
||||||
- https://github.com/CVEDB/PoC-List
|
- https://github.com/CVEDB/PoC-List
|
||||||
|
- https://github.com/Cruxer8Mech/Idk
|
||||||
- https://github.com/fei9747/WindowsElevation
|
- https://github.com/fei9747/WindowsElevation
|
||||||
- https://github.com/lyshark/Windows-exploits
|
- https://github.com/lyshark/Windows-exploits
|
||||||
- https://github.com/ycdxsb/WindowsPrivilegeEscalation
|
- https://github.com/ycdxsb/WindowsPrivilegeEscalation
|
||||||
|
@ -17,6 +17,7 @@ No PoCs from references.
|
|||||||
- https://github.com/Al1ex/WindowsElevation
|
- https://github.com/Al1ex/WindowsElevation
|
||||||
- https://github.com/Ascotbe/Kernelhub
|
- https://github.com/Ascotbe/Kernelhub
|
||||||
- https://github.com/BLACKHAT-SSG/EXP-401-OSEE
|
- https://github.com/BLACKHAT-SSG/EXP-401-OSEE
|
||||||
|
- https://github.com/Cruxer8Mech/Idk
|
||||||
- https://github.com/DotSight7/Cheatsheet
|
- https://github.com/DotSight7/Cheatsheet
|
||||||
- https://github.com/Ostorlab/KEV
|
- https://github.com/Ostorlab/KEV
|
||||||
- https://github.com/Ostorlab/known_exploited_vulnerbilities_detectors
|
- https://github.com/Ostorlab/known_exploited_vulnerbilities_detectors
|
||||||
|
@ -16,6 +16,7 @@ No PoCs from references.
|
|||||||
- https://github.com/ARPSyndicate/cvemon
|
- https://github.com/ARPSyndicate/cvemon
|
||||||
- https://github.com/Al1ex/WindowsElevation
|
- https://github.com/Al1ex/WindowsElevation
|
||||||
- https://github.com/Ascotbe/Kernelhub
|
- https://github.com/Ascotbe/Kernelhub
|
||||||
|
- https://github.com/Cruxer8Mech/Idk
|
||||||
- https://github.com/Juba0x4355/Blue-THM
|
- https://github.com/Juba0x4355/Blue-THM
|
||||||
- https://github.com/Juba0x4355/Blue-Writeup
|
- https://github.com/Juba0x4355/Blue-Writeup
|
||||||
- https://github.com/TesterCC/exp_poc_library
|
- https://github.com/TesterCC/exp_poc_library
|
||||||
|
@ -55,6 +55,7 @@ No PoCs from references.
|
|||||||
- https://github.com/Snoopy-Sec/Localroot-ALL-CVE
|
- https://github.com/Snoopy-Sec/Localroot-ALL-CVE
|
||||||
- https://github.com/T3b0g025/PWK-CheatSheet
|
- https://github.com/T3b0g025/PWK-CheatSheet
|
||||||
- https://github.com/Technoashofficial/kernel-exploitation-linux
|
- https://github.com/Technoashofficial/kernel-exploitation-linux
|
||||||
|
- https://github.com/ZTK-009/linux-kernel-exploits
|
||||||
- https://github.com/akr3ch/OSCP-Survival-Guide
|
- https://github.com/akr3ch/OSCP-Survival-Guide
|
||||||
- https://github.com/aktechnohacker/OSCP-Notes
|
- https://github.com/aktechnohacker/OSCP-Notes
|
||||||
- https://github.com/albinjoshy03/linux-kernel-exploits
|
- https://github.com/albinjoshy03/linux-kernel-exploits
|
||||||
|
@ -16,6 +16,7 @@ No PoCs from references.
|
|||||||
- https://github.com/ARPSyndicate/cvemon
|
- https://github.com/ARPSyndicate/cvemon
|
||||||
- https://github.com/CVEDB/PoC-List
|
- https://github.com/CVEDB/PoC-List
|
||||||
- https://github.com/CVEDB/awesome-cve-repo
|
- https://github.com/CVEDB/awesome-cve-repo
|
||||||
|
- https://github.com/Cruxer8Mech/Idk
|
||||||
- https://github.com/Juba0x4355/Blue-THM
|
- https://github.com/Juba0x4355/Blue-THM
|
||||||
- https://github.com/Juba0x4355/Blue-Writeup
|
- https://github.com/Juba0x4355/Blue-Writeup
|
||||||
- https://github.com/anmolksachan/MS12-020
|
- https://github.com/anmolksachan/MS12-020
|
||||||
|
@ -21,6 +21,7 @@ The x86-64 kernel system-call functionality in Xen 4.1.2 and earlier, as used in
|
|||||||
- https://github.com/Al1ex/Red-Team
|
- https://github.com/Al1ex/Red-Team
|
||||||
- https://github.com/Apri1y/Red-Team-links
|
- https://github.com/Apri1y/Red-Team-links
|
||||||
- https://github.com/Ascotbe/Kernelhub
|
- https://github.com/Ascotbe/Kernelhub
|
||||||
|
- https://github.com/Cruxer8Mech/Idk
|
||||||
- https://github.com/Echocipher/Resource-list
|
- https://github.com/Echocipher/Resource-list
|
||||||
- https://github.com/Flerov/WindowsExploitDev
|
- https://github.com/Flerov/WindowsExploitDev
|
||||||
- https://github.com/Ondrik8/RED-Team
|
- https://github.com/Ondrik8/RED-Team
|
||||||
|
@ -29,6 +29,7 @@ libdbus 1.5.x and earlier, when used in setuid or other privileged programs in X
|
|||||||
- https://github.com/Shadowshusky/linux-kernel-exploits
|
- https://github.com/Shadowshusky/linux-kernel-exploits
|
||||||
- https://github.com/Singlea-lyh/linux-kernel-exploits
|
- https://github.com/Singlea-lyh/linux-kernel-exploits
|
||||||
- https://github.com/Snoopy-Sec/Localroot-ALL-CVE
|
- https://github.com/Snoopy-Sec/Localroot-ALL-CVE
|
||||||
|
- https://github.com/ZTK-009/linux-kernel-exploits
|
||||||
- https://github.com/albinjoshy03/linux-kernel-exploits
|
- https://github.com/albinjoshy03/linux-kernel-exploits
|
||||||
- https://github.com/alian87/linux-kernel-exploits
|
- https://github.com/alian87/linux-kernel-exploits
|
||||||
- https://github.com/coffee727/linux-exp
|
- https://github.com/coffee727/linux-exp
|
||||||
|
@ -17,6 +17,7 @@ win32k.sys in the kernel-mode drivers in Microsoft Windows Vista SP2, Windows Se
|
|||||||
- https://github.com/Al1ex/WindowsElevation
|
- https://github.com/Al1ex/WindowsElevation
|
||||||
- https://github.com/Ascotbe/Kernelhub
|
- https://github.com/Ascotbe/Kernelhub
|
||||||
- https://github.com/Crunchy0/Win_exploits
|
- https://github.com/Crunchy0/Win_exploits
|
||||||
|
- https://github.com/Cruxer8Mech/Idk
|
||||||
- https://github.com/fei9747/WindowsElevation
|
- https://github.com/fei9747/WindowsElevation
|
||||||
- https://github.com/nitishbadole/oscp-note-2
|
- https://github.com/nitishbadole/oscp-note-2
|
||||||
- https://github.com/rmsbpro/rmsbpro
|
- https://github.com/rmsbpro/rmsbpro
|
||||||
|
@ -28,6 +28,7 @@ No PoCs from references.
|
|||||||
- https://github.com/Shadowshusky/linux-kernel-exploits
|
- https://github.com/Shadowshusky/linux-kernel-exploits
|
||||||
- https://github.com/Singlea-lyh/linux-kernel-exploits
|
- https://github.com/Singlea-lyh/linux-kernel-exploits
|
||||||
- https://github.com/Snoopy-Sec/Localroot-ALL-CVE
|
- https://github.com/Snoopy-Sec/Localroot-ALL-CVE
|
||||||
|
- https://github.com/ZTK-009/linux-kernel-exploits
|
||||||
- https://github.com/albinjoshy03/linux-kernel-exploits
|
- https://github.com/albinjoshy03/linux-kernel-exploits
|
||||||
- https://github.com/alian87/linux-kernel-exploits
|
- https://github.com/alian87/linux-kernel-exploits
|
||||||
- https://github.com/coffee727/linux-exp
|
- https://github.com/coffee727/linux-exp
|
||||||
|
@ -18,6 +18,7 @@ win32k.sys in the kernel-mode drivers in Microsoft Windows XP SP2 and SP3, Windo
|
|||||||
- https://github.com/Ascotbe/Kernelhub
|
- https://github.com/Ascotbe/Kernelhub
|
||||||
- https://github.com/CVEDB/PoC-List
|
- https://github.com/CVEDB/PoC-List
|
||||||
- https://github.com/CVEDB/awesome-cve-repo
|
- https://github.com/CVEDB/awesome-cve-repo
|
||||||
|
- https://github.com/Cruxer8Mech/Idk
|
||||||
- https://github.com/JERRY123S/all-poc
|
- https://github.com/JERRY123S/all-poc
|
||||||
- https://github.com/Meatballs1/cve-2013-1300
|
- https://github.com/Meatballs1/cve-2013-1300
|
||||||
- https://github.com/cyberanand1337x/bug-bounty-2022
|
- https://github.com/cyberanand1337x/bug-bounty-2022
|
||||||
|
@ -15,6 +15,7 @@ No PoCs from references.
|
|||||||
#### Github
|
#### Github
|
||||||
- https://github.com/Al1ex/WindowsElevation
|
- https://github.com/Al1ex/WindowsElevation
|
||||||
- https://github.com/Ascotbe/Kernelhub
|
- https://github.com/Ascotbe/Kernelhub
|
||||||
|
- https://github.com/Cruxer8Mech/Idk
|
||||||
- https://github.com/fei9747/WindowsElevation
|
- https://github.com/fei9747/WindowsElevation
|
||||||
- https://github.com/lyshark/Windows-exploits
|
- https://github.com/lyshark/Windows-exploits
|
||||||
- https://github.com/ycdxsb/WindowsPrivilegeEscalation
|
- https://github.com/ycdxsb/WindowsPrivilegeEscalation
|
||||||
|
@ -14,6 +14,7 @@ win32k.sys in the kernel-mode drivers in Microsoft Windows XP SP2 and SP3, Windo
|
|||||||
|
|
||||||
#### Github
|
#### Github
|
||||||
- https://github.com/Ascotbe/Kernelhub
|
- https://github.com/Ascotbe/Kernelhub
|
||||||
|
- https://github.com/Cruxer8Mech/Idk
|
||||||
- https://github.com/lyshark/Windows-exploits
|
- https://github.com/lyshark/Windows-exploits
|
||||||
- https://github.com/ycdxsb/WindowsPrivilegeEscalation
|
- https://github.com/ycdxsb/WindowsPrivilegeEscalation
|
||||||
|
|
||||||
|
@ -32,6 +32,7 @@ Array index error in the __sock_diag_rcv_msg function in net/core/sock_diag.c in
|
|||||||
- https://github.com/Singlea-lyh/linux-kernel-exploits
|
- https://github.com/Singlea-lyh/linux-kernel-exploits
|
||||||
- https://github.com/Snoopy-Sec/Localroot-ALL-CVE
|
- https://github.com/Snoopy-Sec/Localroot-ALL-CVE
|
||||||
- https://github.com/Technoashofficial/kernel-exploitation-linux
|
- https://github.com/Technoashofficial/kernel-exploitation-linux
|
||||||
|
- https://github.com/ZTK-009/linux-kernel-exploits
|
||||||
- https://github.com/albinjoshy03/linux-kernel-exploits
|
- https://github.com/albinjoshy03/linux-kernel-exploits
|
||||||
- https://github.com/alian87/linux-kernel-exploits
|
- https://github.com/alian87/linux-kernel-exploits
|
||||||
- https://github.com/anoaghost/Localroot_Compile
|
- https://github.com/anoaghost/Localroot_Compile
|
||||||
|
@ -28,6 +28,7 @@ The clone system-call implementation in the Linux kernel before 3.8.3 does not p
|
|||||||
- https://github.com/Shadowshusky/linux-kernel-exploits
|
- https://github.com/Shadowshusky/linux-kernel-exploits
|
||||||
- https://github.com/Singlea-lyh/linux-kernel-exploits
|
- https://github.com/Singlea-lyh/linux-kernel-exploits
|
||||||
- https://github.com/Snoopy-Sec/Localroot-ALL-CVE
|
- https://github.com/Snoopy-Sec/Localroot-ALL-CVE
|
||||||
|
- https://github.com/ZTK-009/linux-kernel-exploits
|
||||||
- https://github.com/albinjoshy03/linux-kernel-exploits
|
- https://github.com/albinjoshy03/linux-kernel-exploits
|
||||||
- https://github.com/alian87/linux-kernel-exploits
|
- https://github.com/alian87/linux-kernel-exploits
|
||||||
- https://github.com/coffee727/linux-exp
|
- https://github.com/coffee727/linux-exp
|
||||||
|
@ -45,6 +45,7 @@ The perf_swevent_init function in kernel/events/core.c in the Linux kernel befor
|
|||||||
- https://github.com/Singlea-lyh/linux-kernel-exploits
|
- https://github.com/Singlea-lyh/linux-kernel-exploits
|
||||||
- https://github.com/Snoopy-Sec/Localroot-ALL-CVE
|
- https://github.com/Snoopy-Sec/Localroot-ALL-CVE
|
||||||
- https://github.com/Technoashofficial/kernel-exploitation-linux
|
- https://github.com/Technoashofficial/kernel-exploitation-linux
|
||||||
|
- https://github.com/ZTK-009/linux-kernel-exploits
|
||||||
- https://github.com/albinjoshy03/linux-kernel-exploits
|
- https://github.com/albinjoshy03/linux-kernel-exploits
|
||||||
- https://github.com/alian87/linux-kernel-exploits
|
- https://github.com/alian87/linux-kernel-exploits
|
||||||
- https://github.com/amane312/Linux_menthor
|
- https://github.com/amane312/Linux_menthor
|
||||||
|
@ -15,6 +15,7 @@ NDProxy.sys in the kernel in Microsoft Windows XP SP2 and SP3 and Server 2003 SP
|
|||||||
#### Github
|
#### Github
|
||||||
- https://github.com/Al1ex/WindowsElevation
|
- https://github.com/Al1ex/WindowsElevation
|
||||||
- https://github.com/Ascotbe/Kernelhub
|
- https://github.com/Ascotbe/Kernelhub
|
||||||
|
- https://github.com/Cruxer8Mech/Idk
|
||||||
- https://github.com/Friarfukd/RobbinHood
|
- https://github.com/Friarfukd/RobbinHood
|
||||||
- https://github.com/Ostorlab/KEV
|
- https://github.com/Ostorlab/KEV
|
||||||
- https://github.com/Ostorlab/known_exploited_vulnerbilities_detectors
|
- https://github.com/Ostorlab/known_exploited_vulnerbilities_detectors
|
||||||
|
@ -15,6 +15,7 @@ Directory traversal vulnerability in /res/I18nMsg,AjxMsg,ZMsg,ZmMsg,AjxKeys,ZmKe
|
|||||||
|
|
||||||
#### Github
|
#### Github
|
||||||
- https://github.com/ARPSyndicate/kenzer-templates
|
- https://github.com/ARPSyndicate/kenzer-templates
|
||||||
|
- https://github.com/ZTK-009/RedTeamer
|
||||||
- https://github.com/fengjixuchui/RedTeamer
|
- https://github.com/fengjixuchui/RedTeamer
|
||||||
- https://github.com/fnmsd/zimbra_poc
|
- https://github.com/fnmsd/zimbra_poc
|
||||||
- https://github.com/password520/RedTeamer
|
- https://github.com/password520/RedTeamer
|
||||||
|
@ -38,6 +38,7 @@ The compat_sys_recvmmsg function in net/compat.c in the Linux kernel before 3.13
|
|||||||
- https://github.com/Singlea-lyh/linux-kernel-exploits
|
- https://github.com/Singlea-lyh/linux-kernel-exploits
|
||||||
- https://github.com/Snoopy-Sec/Localroot-ALL-CVE
|
- https://github.com/Snoopy-Sec/Localroot-ALL-CVE
|
||||||
- https://github.com/Technoashofficial/kernel-exploitation-linux
|
- https://github.com/Technoashofficial/kernel-exploitation-linux
|
||||||
|
- https://github.com/ZTK-009/linux-kernel-exploits
|
||||||
- https://github.com/albinjoshy03/linux-kernel-exploits
|
- https://github.com/albinjoshy03/linux-kernel-exploits
|
||||||
- https://github.com/alian87/linux-kernel-exploits
|
- https://github.com/alian87/linux-kernel-exploits
|
||||||
- https://github.com/ambynotcoder/C-libraries
|
- https://github.com/ambynotcoder/C-libraries
|
||||||
|
@ -36,6 +36,7 @@ The n_tty_write function in drivers/tty/n_tty.c in the Linux kernel through 3.14
|
|||||||
- https://github.com/Snoopy-Sec/Localroot-ALL-CVE
|
- https://github.com/Snoopy-Sec/Localroot-ALL-CVE
|
||||||
- https://github.com/SunRain/CVE-2014-0196
|
- https://github.com/SunRain/CVE-2014-0196
|
||||||
- https://github.com/Technoashofficial/kernel-exploitation-linux
|
- https://github.com/Technoashofficial/kernel-exploitation-linux
|
||||||
|
- https://github.com/ZTK-009/linux-kernel-exploits
|
||||||
- https://github.com/albinjoshy03/linux-kernel-exploits
|
- https://github.com/albinjoshy03/linux-kernel-exploits
|
||||||
- https://github.com/alian87/linux-kernel-exploits
|
- https://github.com/alian87/linux-kernel-exploits
|
||||||
- https://github.com/anoaghost/Localroot_Compile
|
- https://github.com/anoaghost/Localroot_Compile
|
||||||
|
@ -16,6 +16,7 @@ Double free vulnerability in the Ancillary Function Driver (AFD) in afd.sys in t
|
|||||||
#### Github
|
#### Github
|
||||||
- https://github.com/Al1ex/WindowsElevation
|
- https://github.com/Al1ex/WindowsElevation
|
||||||
- https://github.com/Ascotbe/Kernelhub
|
- https://github.com/Ascotbe/Kernelhub
|
||||||
|
- https://github.com/Cruxer8Mech/Idk
|
||||||
- https://github.com/ExploitCN/CVE-2014-1767-EXP-PAPER
|
- https://github.com/ExploitCN/CVE-2014-1767-EXP-PAPER
|
||||||
- https://github.com/LegendSaber/exp
|
- https://github.com/LegendSaber/exp
|
||||||
- https://github.com/ThunderJie/CVE
|
- https://github.com/ThunderJie/CVE
|
||||||
|
@ -45,6 +45,7 @@ The default configuration in Elasticsearch before 1.2 enables dynamic scripting,
|
|||||||
- https://github.com/SexyBeast233/SecBooks
|
- https://github.com/SexyBeast233/SecBooks
|
||||||
- https://github.com/ToonyLoony/OpenVAS_Project
|
- https://github.com/ToonyLoony/OpenVAS_Project
|
||||||
- https://github.com/Z0fhack/Goby_POC
|
- https://github.com/Z0fhack/Goby_POC
|
||||||
|
- https://github.com/ZTK-009/RedTeamer
|
||||||
- https://github.com/ahm3dhany/IDS-Evasion
|
- https://github.com/ahm3dhany/IDS-Evasion
|
||||||
- https://github.com/akusilvennoinen/cybersecuritybase-project-2
|
- https://github.com/akusilvennoinen/cybersecuritybase-project-2
|
||||||
- https://github.com/amcai/myscan
|
- https://github.com/amcai/myscan
|
||||||
|
@ -43,6 +43,7 @@ No PoCs from references.
|
|||||||
- https://github.com/Singlea-lyh/linux-kernel-exploits
|
- https://github.com/Singlea-lyh/linux-kernel-exploits
|
||||||
- https://github.com/Snoopy-Sec/Localroot-ALL-CVE
|
- https://github.com/Snoopy-Sec/Localroot-ALL-CVE
|
||||||
- https://github.com/Technoashofficial/kernel-exploitation-linux
|
- https://github.com/Technoashofficial/kernel-exploitation-linux
|
||||||
|
- https://github.com/ZTK-009/linux-kernel-exploits
|
||||||
- https://github.com/albinjoshy03/linux-kernel-exploits
|
- https://github.com/albinjoshy03/linux-kernel-exploits
|
||||||
- https://github.com/alian87/linux-kernel-exploits
|
- https://github.com/alian87/linux-kernel-exploits
|
||||||
- https://github.com/ambynotcoder/C-libraries
|
- https://github.com/ambynotcoder/C-libraries
|
||||||
|
@ -30,6 +30,7 @@ The capabilities implementation in the Linux kernel before 3.14.8 does not prope
|
|||||||
- https://github.com/Singlea-lyh/linux-kernel-exploits
|
- https://github.com/Singlea-lyh/linux-kernel-exploits
|
||||||
- https://github.com/Snoopy-Sec/Localroot-ALL-CVE
|
- https://github.com/Snoopy-Sec/Localroot-ALL-CVE
|
||||||
- https://github.com/Technoashofficial/kernel-exploitation-linux
|
- https://github.com/Technoashofficial/kernel-exploitation-linux
|
||||||
|
- https://github.com/ZTK-009/linux-kernel-exploits
|
||||||
- https://github.com/albinjoshy03/linux-kernel-exploits
|
- https://github.com/albinjoshy03/linux-kernel-exploits
|
||||||
- https://github.com/alian87/linux-kernel-exploits
|
- https://github.com/alian87/linux-kernel-exploits
|
||||||
- https://github.com/anoaghost/Localroot_Compile
|
- https://github.com/anoaghost/Localroot_Compile
|
||||||
|
@ -16,6 +16,7 @@ Microsoft Windows Server 2003 SP2 allows local users to gain privileges via a cr
|
|||||||
#### Github
|
#### Github
|
||||||
- https://github.com/Al1ex/WindowsElevation
|
- https://github.com/Al1ex/WindowsElevation
|
||||||
- https://github.com/Ascotbe/Kernelhub
|
- https://github.com/Ascotbe/Kernelhub
|
||||||
|
- https://github.com/Cruxer8Mech/Idk
|
||||||
- https://github.com/fei9747/WindowsElevation
|
- https://github.com/fei9747/WindowsElevation
|
||||||
- https://github.com/fungoshacks/CVE-2014-4076
|
- https://github.com/fungoshacks/CVE-2014-4076
|
||||||
- https://github.com/lyshark/Windows-exploits
|
- https://github.com/lyshark/Windows-exploits
|
||||||
|
@ -33,6 +33,7 @@ win32k.sys in the kernel-mode drivers in Microsoft Windows Server 2003 SP2, Wind
|
|||||||
- https://github.com/CVEDB/awesome-cve-repo
|
- https://github.com/CVEDB/awesome-cve-repo
|
||||||
- https://github.com/CVEDB/top
|
- https://github.com/CVEDB/top
|
||||||
- https://github.com/CrackerCat/Kernel-Security-Development
|
- https://github.com/CrackerCat/Kernel-Security-Development
|
||||||
|
- https://github.com/Cruxer8Mech/Idk
|
||||||
- https://github.com/Echocipher/Resource-list
|
- https://github.com/Echocipher/Resource-list
|
||||||
- https://github.com/ExpLife0011/awesome-windows-kernel-security-development
|
- https://github.com/ExpLife0011/awesome-windows-kernel-security-development
|
||||||
- https://github.com/FULLSHADE/WindowsExploitationResources
|
- https://github.com/FULLSHADE/WindowsExploitationResources
|
||||||
|
@ -53,6 +53,7 @@ Unspecified vulnerability in the Oracle WebLogic Server component in Oracle Fusi
|
|||||||
- https://github.com/WingsSec/Meppo
|
- https://github.com/WingsSec/Meppo
|
||||||
- https://github.com/Z0fhack/Goby_POC
|
- https://github.com/Z0fhack/Goby_POC
|
||||||
- https://github.com/ZH3FENG/Weblogic_SSRF
|
- https://github.com/ZH3FENG/Weblogic_SSRF
|
||||||
|
- https://github.com/ZTK-009/RedTeamer
|
||||||
- https://github.com/Zero094/Vulnerability-verification
|
- https://github.com/Zero094/Vulnerability-verification
|
||||||
- https://github.com/assetnote/blind-ssrf-chains
|
- https://github.com/assetnote/blind-ssrf-chains
|
||||||
- https://github.com/asw3asw/SSRF
|
- https://github.com/asw3asw/SSRF
|
||||||
|
@ -34,6 +34,7 @@ The Linux kernel before 3.15.4 on Intel processors does not properly restrict us
|
|||||||
- https://github.com/Singlea-lyh/linux-kernel-exploits
|
- https://github.com/Singlea-lyh/linux-kernel-exploits
|
||||||
- https://github.com/Snoopy-Sec/Localroot-ALL-CVE
|
- https://github.com/Snoopy-Sec/Localroot-ALL-CVE
|
||||||
- https://github.com/Technoashofficial/kernel-exploitation-linux
|
- https://github.com/Technoashofficial/kernel-exploitation-linux
|
||||||
|
- https://github.com/ZTK-009/linux-kernel-exploits
|
||||||
- https://github.com/albinjoshy03/linux-kernel-exploits
|
- https://github.com/albinjoshy03/linux-kernel-exploits
|
||||||
- https://github.com/alian87/linux-kernel-exploits
|
- https://github.com/alian87/linux-kernel-exploits
|
||||||
- https://github.com/anoaghost/Localroot_Compile
|
- https://github.com/anoaghost/Localroot_Compile
|
||||||
|
Some files were not shown because too many files have changed in this diff Show More
Loading…
x
Reference in New Issue
Block a user