Update Mon May 27 13:12:02 UTC 2024

This commit is contained in:
0xMarcio 2024-05-27 13:12:02 +00:00
parent 2d745dea05
commit b042ce8188
523 changed files with 1925 additions and 51 deletions

View File

@ -13,5 +13,6 @@ The Windows 2000 telnet client attempts to perform NTLM authentication by defaul
No PoCs from references. No PoCs from references.
#### Github #### Github
- https://github.com/Cruxer8Mech/Idk
- https://github.com/ycdxsb/WindowsPrivilegeEscalation - https://github.com/ycdxsb/WindowsPrivilegeEscalation

View File

@ -16,6 +16,7 @@ File and Print Sharing service in Windows 95, Windows 98, and Windows Me does no
- https://github.com/ARPSyndicate/cvemon - https://github.com/ARPSyndicate/cvemon
- https://github.com/Ascotbe/Kernelhub - https://github.com/Ascotbe/Kernelhub
- https://github.com/CVEDB/PoC-List - https://github.com/CVEDB/PoC-List
- https://github.com/Cruxer8Mech/Idk
- https://github.com/Z6543/CVE-2000-0979 - https://github.com/Z6543/CVE-2000-0979
- https://github.com/ycdxsb/WindowsPrivilegeEscalation - https://github.com/ycdxsb/WindowsPrivilegeEscalation

View File

@ -16,6 +16,7 @@ No PoCs from references.
- https://github.com/ARPSyndicate/cvemon - https://github.com/ARPSyndicate/cvemon
- https://github.com/Al1ex/WindowsElevation - https://github.com/Al1ex/WindowsElevation
- https://github.com/Ascotbe/Kernelhub - https://github.com/Ascotbe/Kernelhub
- https://github.com/Cruxer8Mech/Idk
- https://github.com/fei9747/WindowsElevation - https://github.com/fei9747/WindowsElevation
- https://github.com/lyshark/Windows-exploits - https://github.com/lyshark/Windows-exploits
- https://github.com/makoto56/penetration-suite-toolkit - https://github.com/makoto56/penetration-suite-toolkit

View File

@ -32,6 +32,7 @@ The do_mremap function for the mremap system call in Linux 2.2 to 2.2.25, 2.4 to
- https://github.com/Singlea-lyh/linux-kernel-exploits - https://github.com/Singlea-lyh/linux-kernel-exploits
- https://github.com/Snoopy-Sec/Localroot-ALL-CVE - https://github.com/Snoopy-Sec/Localroot-ALL-CVE
- https://github.com/Technoashofficial/kernel-exploitation-linux - https://github.com/Technoashofficial/kernel-exploitation-linux
- https://github.com/ZTK-009/linux-kernel-exploits
- https://github.com/albinjoshy03/linux-kernel-exploits - https://github.com/albinjoshy03/linux-kernel-exploits
- https://github.com/alian87/linux-kernel-exploits - https://github.com/alian87/linux-kernel-exploits
- https://github.com/coffee727/linux-exp - https://github.com/coffee727/linux-exp

View File

@ -29,6 +29,7 @@ Race condition in the (1) load_elf_library and (2) binfmt_aout function calls fo
- https://github.com/Shadowshusky/linux-kernel-exploits - https://github.com/Shadowshusky/linux-kernel-exploits
- https://github.com/Singlea-lyh/linux-kernel-exploits - https://github.com/Singlea-lyh/linux-kernel-exploits
- https://github.com/Snoopy-Sec/Localroot-ALL-CVE - https://github.com/Snoopy-Sec/Localroot-ALL-CVE
- https://github.com/ZTK-009/linux-kernel-exploits
- https://github.com/albinjoshy03/linux-kernel-exploits - https://github.com/albinjoshy03/linux-kernel-exploits
- https://github.com/alian87/linux-kernel-exploits - https://github.com/alian87/linux-kernel-exploits
- https://github.com/coffee727/linux-exp - https://github.com/coffee727/linux-exp

View File

@ -14,5 +14,6 @@ The Windows Animated Cursor (ANI) capability in Windows NT, Windows 2000 through
- https://docs.microsoft.com/en-us/security-updates/securitybulletins/2005/ms05-002 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2005/ms05-002
#### Github #### Github
- https://github.com/Cruxer8Mech/Idk
- https://github.com/ycdxsb/WindowsPrivilegeEscalation - https://github.com/ycdxsb/WindowsPrivilegeEscalation

View File

@ -29,6 +29,7 @@ Integer overflow in sys_epoll_wait in eventpoll.c for Linux kernel 2.6 to 2.6.11
- https://github.com/Shadowshusky/linux-kernel-exploits - https://github.com/Shadowshusky/linux-kernel-exploits
- https://github.com/Singlea-lyh/linux-kernel-exploits - https://github.com/Singlea-lyh/linux-kernel-exploits
- https://github.com/Snoopy-Sec/Localroot-ALL-CVE - https://github.com/Snoopy-Sec/Localroot-ALL-CVE
- https://github.com/ZTK-009/linux-kernel-exploits
- https://github.com/albinjoshy03/linux-kernel-exploits - https://github.com/albinjoshy03/linux-kernel-exploits
- https://github.com/alian87/linux-kernel-exploits - https://github.com/alian87/linux-kernel-exploits
- https://github.com/coffee727/linux-exp - https://github.com/coffee727/linux-exp

View File

@ -28,6 +28,7 @@ The elf_core_dump function in binfmt_elf.c for Linux kernel 2.x.x to 2.2.27-rc2,
- https://github.com/Shadowshusky/linux-kernel-exploits - https://github.com/Shadowshusky/linux-kernel-exploits
- https://github.com/Singlea-lyh/linux-kernel-exploits - https://github.com/Singlea-lyh/linux-kernel-exploits
- https://github.com/Snoopy-Sec/Localroot-ALL-CVE - https://github.com/Snoopy-Sec/Localroot-ALL-CVE
- https://github.com/ZTK-009/linux-kernel-exploits
- https://github.com/albinjoshy03/linux-kernel-exploits - https://github.com/albinjoshy03/linux-kernel-exploits
- https://github.com/alian87/linux-kernel-exploits - https://github.com/alian87/linux-kernel-exploits
- https://github.com/coffee727/linux-exp - https://github.com/coffee727/linux-exp

View File

@ -17,6 +17,7 @@ Stack-based buffer overflow in the Plug and Play (PnP) service for Microsoft Win
- https://github.com/ARPSyndicate/cvemon - https://github.com/ARPSyndicate/cvemon
- https://github.com/Al1ex/WindowsElevation - https://github.com/Al1ex/WindowsElevation
- https://github.com/Ascotbe/Kernelhub - https://github.com/Ascotbe/Kernelhub
- https://github.com/Cruxer8Mech/Idk
- https://github.com/fei9747/WindowsElevation - https://github.com/fei9747/WindowsElevation
- https://github.com/makoto56/penetration-suite-toolkit - https://github.com/makoto56/penetration-suite-toolkit
- https://github.com/ycdxsb/WindowsPrivilegeEscalation - https://github.com/ycdxsb/WindowsPrivilegeEscalation

View File

@ -13,6 +13,7 @@ Heap-based buffer overflow in the Server Service (SRV.SYS driver) in Microsoft W
- https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-035 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-035
#### Github #### Github
- https://github.com/Cruxer8Mech/Idk
- https://github.com/uroboros-security/SMB-CVE - https://github.com/uroboros-security/SMB-CVE
- https://github.com/ycdxsb/WindowsPrivilegeEscalation - https://github.com/ycdxsb/WindowsPrivilegeEscalation

View File

@ -31,6 +31,7 @@ No PoCs from references.
- https://github.com/Shadowshusky/linux-kernel-exploits - https://github.com/Shadowshusky/linux-kernel-exploits
- https://github.com/Singlea-lyh/linux-kernel-exploits - https://github.com/Singlea-lyh/linux-kernel-exploits
- https://github.com/Snoopy-Sec/Localroot-ALL-CVE - https://github.com/Snoopy-Sec/Localroot-ALL-CVE
- https://github.com/ZTK-009/linux-kernel-exploits
- https://github.com/albinjoshy03/linux-kernel-exploits - https://github.com/albinjoshy03/linux-kernel-exploits
- https://github.com/alian87/linux-kernel-exploits - https://github.com/alian87/linux-kernel-exploits
- https://github.com/coffee727/linux-exp - https://github.com/coffee727/linux-exp

17
2006/CVE-2006-2822.md Normal file
View File

@ -0,0 +1,17 @@
### [CVE-2006-2822](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2822)
![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen)
### Description
SQL injection vulnerability in admin/default.asp in Dusan Drobac CodeAvalanche FreeForum (aka CAForum) 1.0 allows remote attackers to execute arbitrary SQL commands via the password parameter.
### POC
#### Reference
- http://securityreason.com/securityalert/1026
#### Github
No PoCs found on GitHub currently.

View File

@ -16,6 +16,7 @@ No PoCs from references.
- https://github.com/ARPSyndicate/cvemon - https://github.com/ARPSyndicate/cvemon
- https://github.com/Al1ex/WindowsElevation - https://github.com/Al1ex/WindowsElevation
- https://github.com/Ascotbe/Kernelhub - https://github.com/Ascotbe/Kernelhub
- https://github.com/Cruxer8Mech/Idk
- https://github.com/fei9747/WindowsElevation - https://github.com/fei9747/WindowsElevation
- https://github.com/lyshark/Windows-exploits - https://github.com/lyshark/Windows-exploits
- https://github.com/makoto56/penetration-suite-toolkit - https://github.com/makoto56/penetration-suite-toolkit

View File

@ -28,6 +28,7 @@ Race condition in Linux kernel 2.6.17.4 and earlier allows local users to gain r
- https://github.com/Shadowshusky/linux-kernel-exploits - https://github.com/Shadowshusky/linux-kernel-exploits
- https://github.com/Singlea-lyh/linux-kernel-exploits - https://github.com/Singlea-lyh/linux-kernel-exploits
- https://github.com/Snoopy-Sec/Localroot-ALL-CVE - https://github.com/Snoopy-Sec/Localroot-ALL-CVE
- https://github.com/ZTK-009/linux-kernel-exploits
- https://github.com/albinjoshy03/linux-kernel-exploits - https://github.com/albinjoshy03/linux-kernel-exploits
- https://github.com/alian87/linux-kernel-exploits - https://github.com/alian87/linux-kernel-exploits
- https://github.com/coffee727/linux-exp - https://github.com/coffee727/linux-exp

View File

@ -25,6 +25,7 @@ No PoCs from references.
- https://github.com/aulauniversal/Pppwn-Android - https://github.com/aulauniversal/Pppwn-Android
- https://github.com/aulauniversal/Pppwn.Android - https://github.com/aulauniversal/Pppwn.Android
- https://github.com/aulauniversal/Ps4-pppwn-Windows - https://github.com/aulauniversal/Ps4-pppwn-Windows
- https://github.com/lvca-dev/easyPPPwn
- https://github.com/secdev/awesome-scapy - https://github.com/secdev/awesome-scapy
- https://github.com/sonicps/pppwn-sonicps - https://github.com/sonicps/pppwn-sonicps
- https://github.com/vineshgoyal/SISTR0-PPPwn - https://github.com/vineshgoyal/SISTR0-PPPwn

View File

@ -18,5 +18,6 @@ Stack-based buffer overflow in the animated cursor code in Microsoft Windows 200
- https://github.com/Axua/CVE-2007-0038 - https://github.com/Axua/CVE-2007-0038
- https://github.com/CVEDB/PoC-List - https://github.com/CVEDB/PoC-List
- https://github.com/CVEDB/awesome-cve-repo - https://github.com/CVEDB/awesome-cve-repo
- https://github.com/Cruxer8Mech/Idk
- https://github.com/ycdxsb/WindowsPrivilegeEscalation - https://github.com/ycdxsb/WindowsPrivilegeEscalation

View File

@ -16,6 +16,7 @@ The ReadDirectoryChangesW API function on Microsoft Windows 2000, XP, Server 200
- https://github.com/ARPSyndicate/cvemon - https://github.com/ARPSyndicate/cvemon
- https://github.com/CVEDB/PoC-List - https://github.com/CVEDB/PoC-List
- https://github.com/CVEDB/awesome-cve-repo - https://github.com/CVEDB/awesome-cve-repo
- https://github.com/Cruxer8Mech/Idk
- https://github.com/disintegr8te/MonitorFileSystemWatcher - https://github.com/disintegr8te/MonitorFileSystemWatcher
- https://github.com/ycdxsb/WindowsPrivilegeEscalation - https://github.com/ycdxsb/WindowsPrivilegeEscalation
- https://github.com/z3APA3A/spydir - https://github.com/z3APA3A/spydir

View File

@ -13,5 +13,6 @@ Unspecified vulnerability in Microsoft Windows 2000 SP4 through Vista allows rem
No PoCs from references. No PoCs from references.
#### Github #### Github
- https://github.com/Cruxer8Mech/Idk
- https://github.com/ycdxsb/WindowsPrivilegeEscalation - https://github.com/ycdxsb/WindowsPrivilegeEscalation

View File

@ -30,6 +30,7 @@ The vmsplice_to_pipe function in Linux kernel 2.6.17 through 2.6.24.1 does not v
- https://github.com/Singlea-lyh/linux-kernel-exploits - https://github.com/Singlea-lyh/linux-kernel-exploits
- https://github.com/Snoopy-Sec/Localroot-ALL-CVE - https://github.com/Snoopy-Sec/Localroot-ALL-CVE
- https://github.com/Technoashofficial/kernel-exploitation-linux - https://github.com/Technoashofficial/kernel-exploitation-linux
- https://github.com/ZTK-009/linux-kernel-exploits
- https://github.com/albinjoshy03/linux-kernel-exploits - https://github.com/albinjoshy03/linux-kernel-exploits
- https://github.com/alian87/linux-kernel-exploits - https://github.com/alian87/linux-kernel-exploits
- https://github.com/coffee727/linux-exp - https://github.com/coffee727/linux-exp

View File

@ -17,6 +17,7 @@ Unspecified vulnerability in the kernel in Microsoft Windows 2000 SP4, XP SP2, S
- https://github.com/ARPSyndicate/cvemon - https://github.com/ARPSyndicate/cvemon
- https://github.com/Al1ex/WindowsElevation - https://github.com/Al1ex/WindowsElevation
- https://github.com/Ascotbe/Kernelhub - https://github.com/Ascotbe/Kernelhub
- https://github.com/Cruxer8Mech/Idk
- https://github.com/fei9747/WindowsElevation - https://github.com/fei9747/WindowsElevation
- https://github.com/lyshark/Windows-exploits - https://github.com/lyshark/Windows-exploits
- https://github.com/makoto56/penetration-suite-toolkit - https://github.com/makoto56/penetration-suite-toolkit

View File

@ -16,6 +16,7 @@ afd.sys in the Ancillary Function Driver (AFD) component in Microsoft Windows XP
#### Github #### Github
- https://github.com/Al1ex/WindowsElevation - https://github.com/Al1ex/WindowsElevation
- https://github.com/Ascotbe/Kernelhub - https://github.com/Ascotbe/Kernelhub
- https://github.com/Cruxer8Mech/Idk
- https://github.com/fei9747/WindowsElevation - https://github.com/fei9747/WindowsElevation
- https://github.com/lyshark/Windows-exploits - https://github.com/lyshark/Windows-exploits
- https://github.com/ycdxsb/WindowsPrivilegeEscalation - https://github.com/ycdxsb/WindowsPrivilegeEscalation

View File

@ -16,6 +16,7 @@ Microsoft Windows 2000 Gold through SP4, XP Gold through SP3, Server 2003 SP1 an
#### Github #### Github
- https://github.com/Al1ex/WindowsElevation - https://github.com/Al1ex/WindowsElevation
- https://github.com/Ascotbe/Kernelhub - https://github.com/Ascotbe/Kernelhub
- https://github.com/Cruxer8Mech/Idk
- https://github.com/fei9747/WindowsElevation - https://github.com/fei9747/WindowsElevation
- https://github.com/lyshark/Windows-exploits - https://github.com/lyshark/Windows-exploits
- https://github.com/uroboros-security/SMB-CVE - https://github.com/uroboros-security/SMB-CVE

View File

@ -28,6 +28,7 @@ fs/open.c in the Linux kernel before 2.6.22 does not properly strip setuid and s
- https://github.com/Shadowshusky/linux-kernel-exploits - https://github.com/Shadowshusky/linux-kernel-exploits
- https://github.com/Singlea-lyh/linux-kernel-exploits - https://github.com/Singlea-lyh/linux-kernel-exploits
- https://github.com/Snoopy-Sec/Localroot-ALL-CVE - https://github.com/Snoopy-Sec/Localroot-ALL-CVE
- https://github.com/ZTK-009/linux-kernel-exploits
- https://github.com/albinjoshy03/linux-kernel-exploits - https://github.com/albinjoshy03/linux-kernel-exploits
- https://github.com/alian87/linux-kernel-exploits - https://github.com/alian87/linux-kernel-exploits
- https://github.com/coffee727/linux-exp - https://github.com/coffee727/linux-exp

View File

@ -27,6 +27,7 @@ The Server service in Microsoft Windows 2000 SP4, XP SP2 and SP3, Server 2003 SP
- https://github.com/Ascotbe/Kernelhub - https://github.com/Ascotbe/Kernelhub
- https://github.com/CVEDB/PoC-List - https://github.com/CVEDB/PoC-List
- https://github.com/CVEDB/awesome-cve-repo - https://github.com/CVEDB/awesome-cve-repo
- https://github.com/Cruxer8Mech/Idk
- https://github.com/H3xL00m/MS08-067 - https://github.com/H3xL00m/MS08-067
- https://github.com/Jean-Francois-C/Boot2root-CTFs-Writeups - https://github.com/Jean-Francois-C/Boot2root-CTFs-Writeups
- https://github.com/Kuromesi/Py4CSKG - https://github.com/Kuromesi/Py4CSKG

View File

@ -15,6 +15,7 @@ No PoCs from references.
#### Github #### Github
- https://github.com/Al1ex/WindowsElevation - https://github.com/Al1ex/WindowsElevation
- https://github.com/Ascotbe/Kernelhub - https://github.com/Ascotbe/Kernelhub
- https://github.com/Cruxer8Mech/Idk
- https://github.com/fei9747/WindowsElevation - https://github.com/fei9747/WindowsElevation
- https://github.com/ycdxsb/WindowsPrivilegeEscalation - https://github.com/ycdxsb/WindowsPrivilegeEscalation

View File

@ -17,6 +17,7 @@ The Windows Printing Service in Microsoft Windows 2000 SP4, XP SP2 and SP3, Serv
- https://github.com/ARPSyndicate/cvemon - https://github.com/ARPSyndicate/cvemon
- https://github.com/CVEDB/PoC-List - https://github.com/CVEDB/PoC-List
- https://github.com/CVEDB/awesome-cve-repo - https://github.com/CVEDB/awesome-cve-repo
- https://github.com/Cruxer8Mech/Idk
- https://github.com/clearbluejar/cve-markdown-charts - https://github.com/clearbluejar/cve-markdown-charts
- https://github.com/developer3000S/PoC-in-GitHub - https://github.com/developer3000S/PoC-in-GitHub
- https://github.com/hectorgie/PoC-in-GitHub - https://github.com/hectorgie/PoC-in-GitHub

View File

@ -13,5 +13,6 @@ The WebDAV extension in Microsoft Internet Information Services (IIS) 5.0 on Win
- https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-020 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-020
#### Github #### Github
- https://github.com/Cruxer8Mech/Idk
- https://github.com/ycdxsb/WindowsPrivilegeEscalation - https://github.com/ycdxsb/WindowsPrivilegeEscalation

View File

@ -31,6 +31,7 @@ udev before 1.4.1 does not verify whether a NETLINK message originates from kern
- https://github.com/Shadowshusky/linux-kernel-exploits - https://github.com/Shadowshusky/linux-kernel-exploits
- https://github.com/Singlea-lyh/linux-kernel-exploits - https://github.com/Singlea-lyh/linux-kernel-exploits
- https://github.com/Snoopy-Sec/Localroot-ALL-CVE - https://github.com/Snoopy-Sec/Localroot-ALL-CVE
- https://github.com/ZTK-009/linux-kernel-exploits
- https://github.com/albinjoshy03/linux-kernel-exploits - https://github.com/albinjoshy03/linux-kernel-exploits
- https://github.com/alian87/linux-kernel-exploits - https://github.com/alian87/linux-kernel-exploits
- https://github.com/amane312/Linux_menthor - https://github.com/amane312/Linux_menthor

View File

@ -29,6 +29,7 @@ The exit_notify function in kernel/exit.c in the Linux kernel before 2.6.30-rc1
- https://github.com/Shadowshusky/linux-kernel-exploits - https://github.com/Shadowshusky/linux-kernel-exploits
- https://github.com/Singlea-lyh/linux-kernel-exploits - https://github.com/Singlea-lyh/linux-kernel-exploits
- https://github.com/Snoopy-Sec/Localroot-ALL-CVE - https://github.com/Snoopy-Sec/Localroot-ALL-CVE
- https://github.com/ZTK-009/linux-kernel-exploits
- https://github.com/albinjoshy03/linux-kernel-exploits - https://github.com/albinjoshy03/linux-kernel-exploits
- https://github.com/alian87/linux-kernel-exploits - https://github.com/alian87/linux-kernel-exploits
- https://github.com/coffee727/linux-exp - https://github.com/coffee727/linux-exp

View File

@ -16,6 +16,7 @@ The WebDAV extension in Microsoft Internet Information Services (IIS) 5.1 and 6.
#### Github #### Github
- https://github.com/Al1ex/WindowsElevation - https://github.com/Al1ex/WindowsElevation
- https://github.com/Cruxer8Mech/Idk
- https://github.com/fei9747/WindowsElevation - https://github.com/fei9747/WindowsElevation
- https://github.com/ycdxsb/WindowsPrivilegeEscalation - https://github.com/ycdxsb/WindowsPrivilegeEscalation

View File

@ -15,6 +15,7 @@ Microsoft Windows Vista Gold, SP1, and SP2, Windows Server 2008 Gold and SP2, an
#### Github #### Github
- https://github.com/Al1ex/WindowsElevation - https://github.com/Al1ex/WindowsElevation
- https://github.com/Ascotbe/Kernelhub - https://github.com/Ascotbe/Kernelhub
- https://github.com/Cruxer8Mech/Idk
- https://github.com/EricwentwithCyber/Vulnerability-Scan-Lab - https://github.com/EricwentwithCyber/Vulnerability-Scan-Lab
- https://github.com/fei9747/WindowsElevation - https://github.com/fei9747/WindowsElevation
- https://github.com/lyshark/Windows-exploits - https://github.com/lyshark/Windows-exploits

View File

@ -34,6 +34,7 @@ The Linux kernel 2.6.0 through 2.6.30.4, and 2.4.4 through 2.4.37.4, does not in
- https://github.com/Singlea-lyh/linux-kernel-exploits - https://github.com/Singlea-lyh/linux-kernel-exploits
- https://github.com/Snoopy-Sec/Localroot-ALL-CVE - https://github.com/Snoopy-Sec/Localroot-ALL-CVE
- https://github.com/Technoashofficial/kernel-exploitation-linux - https://github.com/Technoashofficial/kernel-exploitation-linux
- https://github.com/ZTK-009/linux-kernel-exploits
- https://github.com/albinjoshy03/linux-kernel-exploits - https://github.com/albinjoshy03/linux-kernel-exploits
- https://github.com/alian87/linux-kernel-exploits - https://github.com/alian87/linux-kernel-exploits
- https://github.com/cloudsec/exploit - https://github.com/cloudsec/exploit

View File

@ -34,6 +34,7 @@ The udp_sendmsg function in the UDP implementation in (1) net/ipv4/udp.c and (2)
- https://github.com/Snoopy-Sec/Localroot-ALL-CVE - https://github.com/Snoopy-Sec/Localroot-ALL-CVE
- https://github.com/YgorAlberto/Ethical-Hacker - https://github.com/YgorAlberto/Ethical-Hacker
- https://github.com/YgorAlberto/ygoralberto.github.io - https://github.com/YgorAlberto/ygoralberto.github.io
- https://github.com/ZTK-009/linux-kernel-exploits
- https://github.com/albinjoshy03/linux-kernel-exploits - https://github.com/albinjoshy03/linux-kernel-exploits
- https://github.com/alian87/linux-kernel-exploits - https://github.com/alian87/linux-kernel-exploits
- https://github.com/cloudsec/exploit - https://github.com/cloudsec/exploit

View File

@ -30,6 +30,7 @@ Multiple race conditions in fs/pipe.c in the Linux kernel before 2.6.32-rc6 allo
- https://github.com/Shadowshusky/linux-kernel-exploits - https://github.com/Shadowshusky/linux-kernel-exploits
- https://github.com/Singlea-lyh/linux-kernel-exploits - https://github.com/Singlea-lyh/linux-kernel-exploits
- https://github.com/Snoopy-Sec/Localroot-ALL-CVE - https://github.com/Snoopy-Sec/Localroot-ALL-CVE
- https://github.com/ZTK-009/linux-kernel-exploits
- https://github.com/albinjoshy03/linux-kernel-exploits - https://github.com/albinjoshy03/linux-kernel-exploits
- https://github.com/alian87/linux-kernel-exploits - https://github.com/alian87/linux-kernel-exploits
- https://github.com/coffee727/linux-exp - https://github.com/coffee727/linux-exp

View File

@ -16,6 +16,7 @@ No PoCs from references.
- https://github.com/Al1ex/WindowsElevation - https://github.com/Al1ex/WindowsElevation
- https://github.com/Amnesthesia/EHAPT-Group-Project - https://github.com/Amnesthesia/EHAPT-Group-Project
- https://github.com/Ascotbe/Kernelhub - https://github.com/Ascotbe/Kernelhub
- https://github.com/Cruxer8Mech/Idk
- https://github.com/EricwentwithCyber/Vulnerability-Scan-Lab - https://github.com/EricwentwithCyber/Vulnerability-Scan-Lab
- https://github.com/fei9747/WindowsElevation - https://github.com/fei9747/WindowsElevation
- https://github.com/uroboros-security/SMB-CVE - https://github.com/uroboros-security/SMB-CVE

View File

@ -14,6 +14,7 @@ No PoCs from references.
#### Github #### Github
- https://github.com/Ascotbe/Kernelhub - https://github.com/Ascotbe/Kernelhub
- https://github.com/Cruxer8Mech/Idk
- https://github.com/lyshark/Windows-exploits - https://github.com/lyshark/Windows-exploits
- https://github.com/ycdxsb/WindowsPrivilegeEscalation - https://github.com/ycdxsb/WindowsPrivilegeEscalation

View File

@ -14,6 +14,7 @@ No PoCs from references.
#### Github #### Github
- https://github.com/Ascotbe/Kernelhub - https://github.com/Ascotbe/Kernelhub
- https://github.com/Cruxer8Mech/Idk
- https://github.com/aRustyDev/C844 - https://github.com/aRustyDev/C844
- https://github.com/lyshark/Windows-exploits - https://github.com/lyshark/Windows-exploits
- https://github.com/ycdxsb/WindowsPrivilegeEscalation - https://github.com/ycdxsb/WindowsPrivilegeEscalation

View File

@ -28,6 +28,7 @@ The do_pages_move function in mm/migrate.c in the Linux kernel before 2.6.33-rc7
- https://github.com/SecWiki/linux-kernel-exploits - https://github.com/SecWiki/linux-kernel-exploits
- https://github.com/Shadowshusky/linux-kernel-exploits - https://github.com/Shadowshusky/linux-kernel-exploits
- https://github.com/Singlea-lyh/linux-kernel-exploits - https://github.com/Singlea-lyh/linux-kernel-exploits
- https://github.com/ZTK-009/linux-kernel-exploits
- https://github.com/albinjoshy03/linux-kernel-exploits - https://github.com/albinjoshy03/linux-kernel-exploits
- https://github.com/alian87/linux-kernel-exploits - https://github.com/alian87/linux-kernel-exploits
- https://github.com/coffee727/linux-exp - https://github.com/coffee727/linux-exp

View File

@ -30,6 +30,7 @@ No PoCs from references.
- https://github.com/Shadowshusky/linux-kernel-exploits - https://github.com/Shadowshusky/linux-kernel-exploits
- https://github.com/Singlea-lyh/linux-kernel-exploits - https://github.com/Singlea-lyh/linux-kernel-exploits
- https://github.com/Snoopy-Sec/Localroot-ALL-CVE - https://github.com/Snoopy-Sec/Localroot-ALL-CVE
- https://github.com/ZTK-009/linux-kernel-exploits
- https://github.com/albinjoshy03/linux-kernel-exploits - https://github.com/albinjoshy03/linux-kernel-exploits
- https://github.com/alian87/linux-kernel-exploits - https://github.com/alian87/linux-kernel-exploits
- https://github.com/coffee727/linux-exp - https://github.com/coffee727/linux-exp

View File

@ -14,6 +14,7 @@ The Windows kernel-mode drivers in win32k.sys in Microsoft Windows XP SP2 and SP
#### Github #### Github
- https://github.com/Al1ex/WindowsElevation - https://github.com/Al1ex/WindowsElevation
- https://github.com/Cruxer8Mech/Idk
- https://github.com/fei9747/WindowsElevation - https://github.com/fei9747/WindowsElevation
- https://github.com/ycdxsb/WindowsPrivilegeEscalation - https://github.com/ycdxsb/WindowsPrivilegeEscalation

View File

@ -14,6 +14,7 @@ The Windows kernel-mode drivers in win32k.sys in Microsoft Windows XP SP2 and SP
#### Github #### Github
- https://github.com/Ascotbe/Kernelhub - https://github.com/Ascotbe/Kernelhub
- https://github.com/Cruxer8Mech/Idk
- https://github.com/lyshark/Windows-exploits - https://github.com/lyshark/Windows-exploits
- https://github.com/ycdxsb/WindowsPrivilegeEscalation - https://github.com/ycdxsb/WindowsPrivilegeEscalation

View File

@ -15,6 +15,7 @@ No PoCs from references.
#### Github #### Github
- https://github.com/Al1ex/WindowsElevation - https://github.com/Al1ex/WindowsElevation
- https://github.com/Ascotbe/Kernelhub - https://github.com/Ascotbe/Kernelhub
- https://github.com/Cruxer8Mech/Idk
- https://github.com/fei9747/WindowsElevation - https://github.com/fei9747/WindowsElevation
- https://github.com/ycdxsb/WindowsPrivilegeEscalation - https://github.com/ycdxsb/WindowsPrivilegeEscalation

View File

@ -13,6 +13,7 @@ Buffer overflow in Microsoft Internet Information Services (IIS) 7.5, when FastC
No PoCs from references. No PoCs from references.
#### Github #### Github
- https://github.com/Cruxer8Mech/Idk
- https://github.com/Romulus968/copycat - https://github.com/Romulus968/copycat
- https://github.com/bioly230/THM_Alfred - https://github.com/bioly230/THM_Alfred
- https://github.com/dominicporter/shodan-playing - https://github.com/dominicporter/shodan-playing

View File

@ -1,6 +1,6 @@
### [CVE-2010-2954](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2954) ### [CVE-2010-2954](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2954)
![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=%3D%20n%2Fa%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen) ![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen)
### Description ### Description

View File

@ -1,6 +1,6 @@
### [CVE-2010-2955](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2955) ### [CVE-2010-2955](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2955)
![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=%3D%20n%2Fa%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen) ![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen)
### Description ### Description

View File

@ -45,6 +45,7 @@ No PoCs from references.
- https://github.com/Skixie/OSCP-Journey - https://github.com/Skixie/OSCP-Journey
- https://github.com/Snoopy-Sec/Localroot-ALL-CVE - https://github.com/Snoopy-Sec/Localroot-ALL-CVE
- https://github.com/Technoashofficial/kernel-exploitation-linux - https://github.com/Technoashofficial/kernel-exploitation-linux
- https://github.com/ZTK-009/linux-kernel-exploits
- https://github.com/akr3ch/OSCP-Survival-Guide - https://github.com/akr3ch/OSCP-Survival-Guide
- https://github.com/aktechnohacker/OSCP-Notes - https://github.com/aktechnohacker/OSCP-Notes
- https://github.com/albinjoshy03/linux-kernel-exploits - https://github.com/albinjoshy03/linux-kernel-exploits

View File

@ -34,6 +34,7 @@ The compat_alloc_user_space functions in include/asm/compat.h files in the Linux
- https://github.com/Snoopy-Sec/Localroot-ALL-CVE - https://github.com/Snoopy-Sec/Localroot-ALL-CVE
- https://github.com/SteinsGatep001/Binary - https://github.com/SteinsGatep001/Binary
- https://github.com/Technoashofficial/kernel-exploitation-linux - https://github.com/Technoashofficial/kernel-exploitation-linux
- https://github.com/ZTK-009/linux-kernel-exploits
- https://github.com/albinjoshy03/linux-kernel-exploits - https://github.com/albinjoshy03/linux-kernel-exploits
- https://github.com/alian87/linux-kernel-exploits - https://github.com/alian87/linux-kernel-exploits
- https://github.com/coffee727/linux-exp - https://github.com/coffee727/linux-exp

View File

@ -33,6 +33,7 @@ The IA32 system call emulation functionality in arch/x86/ia32/ia32entry.S in the
- https://github.com/Singlea-lyh/linux-kernel-exploits - https://github.com/Singlea-lyh/linux-kernel-exploits
- https://github.com/Snoopy-Sec/Localroot-ALL-CVE - https://github.com/Snoopy-Sec/Localroot-ALL-CVE
- https://github.com/Technoashofficial/kernel-exploitation-linux - https://github.com/Technoashofficial/kernel-exploitation-linux
- https://github.com/ZTK-009/linux-kernel-exploits
- https://github.com/albinjoshy03/linux-kernel-exploits - https://github.com/albinjoshy03/linux-kernel-exploits
- https://github.com/alian87/linux-kernel-exploits - https://github.com/alian87/linux-kernel-exploits
- https://github.com/coffee727/linux-exp - https://github.com/coffee727/linux-exp

View File

@ -15,6 +15,7 @@ The Windows Task Scheduler in Microsoft Windows Vista SP1 and SP2, Windows Serve
#### Github #### Github
- https://github.com/Al1ex/WindowsElevation - https://github.com/Al1ex/WindowsElevation
- https://github.com/Ascotbe/Kernelhub - https://github.com/Ascotbe/Kernelhub
- https://github.com/Cruxer8Mech/Idk
- https://github.com/fei9747/WindowsElevation - https://github.com/fei9747/WindowsElevation
- https://github.com/lyshark/Windows-exploits - https://github.com/lyshark/Windows-exploits
- https://github.com/ycdxsb/WindowsPrivilegeEscalation - https://github.com/ycdxsb/WindowsPrivilegeEscalation

View File

@ -32,6 +32,7 @@ No PoCs from references.
- https://github.com/Singlea-lyh/linux-kernel-exploits - https://github.com/Singlea-lyh/linux-kernel-exploits
- https://github.com/Snoopy-Sec/Localroot-ALL-CVE - https://github.com/Snoopy-Sec/Localroot-ALL-CVE
- https://github.com/Technoashofficial/kernel-exploitation-linux - https://github.com/Technoashofficial/kernel-exploitation-linux
- https://github.com/ZTK-009/linux-kernel-exploits
- https://github.com/albinjoshy03/linux-kernel-exploits - https://github.com/albinjoshy03/linux-kernel-exploits
- https://github.com/alian87/linux-kernel-exploits - https://github.com/alian87/linux-kernel-exploits
- https://github.com/coffee727/linux-exp - https://github.com/coffee727/linux-exp

View File

@ -1,6 +1,6 @@
### [CVE-2010-3705](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3705) ### [CVE-2010-3705](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3705)
![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=%3D%20n%2Fa%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen) ![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen)
### Description ### Description

View File

@ -1,6 +1,6 @@
### [CVE-2010-3873](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3873) ### [CVE-2010-3873](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3873)
![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=%3D%20n%2Fa%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen) ![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen)
### Description ### Description

View File

@ -1,6 +1,6 @@
### [CVE-2010-3875](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3875) ### [CVE-2010-3875](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3875)
![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=%3D%20n%2Fa%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen) ![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen)
### Description ### Description

View File

@ -14,5 +14,6 @@ Unspecified vulnerability in Microsoft Windows on 32-bit platforms allows local
- http://www.symantec.com/connect/blogs/stuxnet-using-three-additional-zero-day-vulnerabilities - http://www.symantec.com/connect/blogs/stuxnet-using-three-additional-zero-day-vulnerabilities
#### Github #### Github
- https://github.com/Cruxer8Mech/Idk
- https://github.com/ycdxsb/WindowsPrivilegeEscalation - https://github.com/ycdxsb/WindowsPrivilegeEscalation

View File

@ -53,6 +53,7 @@ The rds_page_copy_user function in net/rds/page.c in the Reliable Datagram Socke
- https://github.com/Skixie/OSCP-Journey - https://github.com/Skixie/OSCP-Journey
- https://github.com/Snoopy-Sec/Localroot-ALL-CVE - https://github.com/Snoopy-Sec/Localroot-ALL-CVE
- https://github.com/T3b0g025/PWK-CheatSheet - https://github.com/T3b0g025/PWK-CheatSheet
- https://github.com/ZTK-009/linux-kernel-exploits
- https://github.com/akr3ch/OSCP-Survival-Guide - https://github.com/akr3ch/OSCP-Survival-Guide
- https://github.com/aktechnohacker/OSCP-Notes - https://github.com/aktechnohacker/OSCP-Notes
- https://github.com/albinjoshy03/linux-kernel-exploits - https://github.com/albinjoshy03/linux-kernel-exploits

View File

@ -32,6 +32,7 @@ The ipc subsystem in the Linux kernel before 2.6.37-rc1 does not initialize cert
- https://github.com/Shadowshusky/linux-kernel-exploits - https://github.com/Shadowshusky/linux-kernel-exploits
- https://github.com/Singlea-lyh/linux-kernel-exploits - https://github.com/Singlea-lyh/linux-kernel-exploits
- https://github.com/Snoopy-Sec/Localroot-ALL-CVE - https://github.com/Snoopy-Sec/Localroot-ALL-CVE
- https://github.com/ZTK-009/linux-kernel-exploits
- https://github.com/albinjoshy03/linux-kernel-exploits - https://github.com/albinjoshy03/linux-kernel-exploits
- https://github.com/alian87/linux-kernel-exploits - https://github.com/alian87/linux-kernel-exploits
- https://github.com/coffee727/linux-exp - https://github.com/coffee727/linux-exp

View File

@ -1,6 +1,6 @@
### [CVE-2010-4164](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4164) ### [CVE-2010-4164](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4164)
![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=%3D%20n%2Fa%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen) ![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen)
### Description ### Description

View File

@ -32,6 +32,7 @@ The do_exit function in kernel/exit.c in the Linux kernel before 2.6.36.2 does n
- https://github.com/Singlea-lyh/linux-kernel-exploits - https://github.com/Singlea-lyh/linux-kernel-exploits
- https://github.com/Snoopy-Sec/Localroot-ALL-CVE - https://github.com/Snoopy-Sec/Localroot-ALL-CVE
- https://github.com/Technoashofficial/kernel-exploitation-linux - https://github.com/Technoashofficial/kernel-exploitation-linux
- https://github.com/ZTK-009/linux-kernel-exploits
- https://github.com/albinjoshy03/linux-kernel-exploits - https://github.com/albinjoshy03/linux-kernel-exploits
- https://github.com/alian87/linux-kernel-exploits - https://github.com/alian87/linux-kernel-exploits
- https://github.com/coffee727/linux-exp - https://github.com/coffee727/linux-exp

View File

@ -1,6 +1,6 @@
### [CVE-2010-4342](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4342) ### [CVE-2010-4342](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4342)
![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=%3D%20n%2Fa%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen) ![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen)
### Description ### Description

View File

@ -30,6 +30,7 @@ No PoCs from references.
- https://github.com/Shadowshusky/linux-kernel-exploits - https://github.com/Shadowshusky/linux-kernel-exploits
- https://github.com/Singlea-lyh/linux-kernel-exploits - https://github.com/Singlea-lyh/linux-kernel-exploits
- https://github.com/Snoopy-Sec/Localroot-ALL-CVE - https://github.com/Snoopy-Sec/Localroot-ALL-CVE
- https://github.com/ZTK-009/linux-kernel-exploits
- https://github.com/albinjoshy03/linux-kernel-exploits - https://github.com/albinjoshy03/linux-kernel-exploits
- https://github.com/alian87/linux-kernel-exploits - https://github.com/alian87/linux-kernel-exploits
- https://github.com/coffee727/linux-exp - https://github.com/coffee727/linux-exp

View File

@ -1,6 +1,6 @@
### [CVE-2010-4527](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4527) ### [CVE-2010-4527](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4527)
![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=%3D%20n%2Fa%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen) ![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen)
### Description ### Description

View File

@ -14,5 +14,6 @@ The Trace Events functionality in the kernel in Microsoft Windows XP SP3 does no
#### Github #### Github
- https://github.com/Ascotbe/Kernelhub - https://github.com/Ascotbe/Kernelhub
- https://github.com/Cruxer8Mech/Idk
- https://github.com/ycdxsb/WindowsPrivilegeEscalation - https://github.com/ycdxsb/WindowsPrivilegeEscalation

17
2011/CVE-2011-0615.md Normal file
View File

@ -0,0 +1,17 @@
### [CVE-2011-0615](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0615)
![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen)
### Description
Multiple buffer overflows in Adobe Audition 3.0.1 and earlier allow remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via crafted data in unspecified fields in the TRKM chunk in an Audition Session (aka .ses) file, related to inconsistent use of character data types.
### POC
#### Reference
- http://www.coresecurity.com/content/Adobe-Audition-malformed-SES-file
#### Github
No PoCs found on GitHub currently.

View File

@ -18,5 +18,6 @@ No PoCs from references.
- https://github.com/BrunoPujos/CVE-2011-1237 - https://github.com/BrunoPujos/CVE-2011-1237
- https://github.com/CVEDB/PoC-List - https://github.com/CVEDB/PoC-List
- https://github.com/CVEDB/awesome-cve-repo - https://github.com/CVEDB/awesome-cve-repo
- https://github.com/Cruxer8Mech/Idk
- https://github.com/ycdxsb/WindowsPrivilegeEscalation - https://github.com/ycdxsb/WindowsPrivilegeEscalation

View File

@ -19,6 +19,7 @@ The Ancillary Function Driver (AFD) in afd.sys in Microsoft Windows XP SP2 and S
- https://github.com/Ascotbe/Kernelhub - https://github.com/Ascotbe/Kernelhub
- https://github.com/CVEDB/PoC-List - https://github.com/CVEDB/PoC-List
- https://github.com/CVEDB/awesome-cve-repo - https://github.com/CVEDB/awesome-cve-repo
- https://github.com/Cruxer8Mech/Idk
- https://github.com/H3xL00m/CVE-2011-1249 - https://github.com/H3xL00m/CVE-2011-1249
- https://github.com/Madusanka99/OHTS - https://github.com/Madusanka99/OHTS
- https://github.com/c0d3cr4f73r/CVE-2011-1249 - https://github.com/c0d3cr4f73r/CVE-2011-1249

View File

@ -11,6 +11,7 @@ The encryptPassword function in Login.js in ManageEngine ServiceDesk Plus (SDP)
#### Reference #### Reference
- http://securityreason.com/securityalert/8385 - http://securityreason.com/securityalert/8385
- http://www.coresecurity.com/content/multiples-vulnerabilities-manageengine-sdp
#### Github #### Github
No PoCs found on GitHub currently. No PoCs found on GitHub currently.

View File

@ -11,6 +11,7 @@ Cross-site scripting (XSS) vulnerability in SolutionSearch.do in ManageEngine Se
#### Reference #### Reference
- http://securityreason.com/securityalert/8385 - http://securityreason.com/securityalert/8385
- http://www.coresecurity.com/content/multiples-vulnerabilities-manageengine-sdp
#### Github #### Github
No PoCs found on GitHub currently. No PoCs found on GitHub currently.

View File

@ -11,6 +11,7 @@ Heap-based buffer overflow in xlssr.dll in Autonomy KeyView, as used in IBM Lotu
#### Reference #### Reference
- http://securityreason.com/securityalert/8263 - http://securityreason.com/securityalert/8263
- http://www.coresecurity.com/content/LotusNotes-XLS-viewer-heap-overflow
#### Github #### Github
No PoCs found on GitHub currently. No PoCs found on GitHub currently.

17
2011/CVE-2011-1513.md Normal file
View File

@ -0,0 +1,17 @@
### [CVE-2011-1513](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1513)
![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen)
### Description
Static code injection vulnerability in install_.php in e107 CMS 0.7.24 and probably earlier versions, when the installation script is not removed, allows remote attackers to inject arbitrary PHP code into e107_config.php via a crafted MySQL server name.
### POC
#### Reference
- http://www.coresecurity.com/content/e107-cms-script-command-injection
#### Github
No PoCs found on GitHub currently.

17
2011/CVE-2011-1514.md Normal file
View File

@ -0,0 +1,17 @@
### [CVE-2011-1514](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1514)
![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen)
### Description
The inet service in HP OpenView Storage Data Protector 6.00 through 6.20 allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via a request containing crafted parameters.
### POC
#### Reference
- http://www.coresecurity.com/content/HP-Data-Protector-multiple-vulnerabilities
#### Github
No PoCs found on GitHub currently.

17
2011/CVE-2011-1515.md Normal file
View File

@ -0,0 +1,17 @@
### [CVE-2011-1515](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1515)
![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen)
### Description
The inet service in HP OpenView Storage Data Protector 6.00 through 6.20 allows remote attackers to cause a denial of service (daemon exit) via a request containing crafted parameters.
### POC
#### Reference
- http://www.coresecurity.com/content/HP-Data-Protector-multiple-vulnerabilities
#### Github
No PoCs found on GitHub currently.

View File

@ -11,6 +11,7 @@ Multiple stack-based buffer overflows in the inet service in HP OpenView Storage
#### Reference #### Reference
- http://securityreason.com/securityalert/8288 - http://securityreason.com/securityalert/8288
- http://www.coresecurity.com/content/HP-Data-Protector-multiple-vulnerabilities
- http://www.exploit-db.com/exploits/17458 - http://www.exploit-db.com/exploits/17458
- http://www.exploit-db.com/exploits/17490 - http://www.exploit-db.com/exploits/17490

View File

@ -11,6 +11,7 @@ Buffer overflow in omniinet.exe in the inet service in HP OpenView Storage Data
#### Reference #### Reference
- http://securityreason.com/securityalert/8289 - http://securityreason.com/securityalert/8289
- http://www.coresecurity.com/content/HP-Data-Protector-EXECCMD-Vulnerability
- http://www.exploit-db.com/exploits/17461 - http://www.exploit-db.com/exploits/17461
#### Github #### Github

View File

@ -17,6 +17,7 @@ NDISTAPI.sys in the NDISTAPI driver in Remote Access Service (RAS) in Microsoft
- https://github.com/Al1ex/WindowsElevation - https://github.com/Al1ex/WindowsElevation
- https://github.com/Ascotbe/Kernelhub - https://github.com/Ascotbe/Kernelhub
- https://github.com/CVEDB/PoC-List - https://github.com/CVEDB/PoC-List
- https://github.com/Cruxer8Mech/Idk
- https://github.com/fei9747/WindowsElevation - https://github.com/fei9747/WindowsElevation
- https://github.com/lyshark/Windows-exploits - https://github.com/lyshark/Windows-exploits
- https://github.com/ycdxsb/WindowsPrivilegeEscalation - https://github.com/ycdxsb/WindowsPrivilegeEscalation

View File

@ -17,6 +17,7 @@ No PoCs from references.
- https://github.com/Al1ex/WindowsElevation - https://github.com/Al1ex/WindowsElevation
- https://github.com/Ascotbe/Kernelhub - https://github.com/Ascotbe/Kernelhub
- https://github.com/BLACKHAT-SSG/EXP-401-OSEE - https://github.com/BLACKHAT-SSG/EXP-401-OSEE
- https://github.com/Cruxer8Mech/Idk
- https://github.com/DotSight7/Cheatsheet - https://github.com/DotSight7/Cheatsheet
- https://github.com/Ostorlab/KEV - https://github.com/Ostorlab/KEV
- https://github.com/Ostorlab/known_exploited_vulnerbilities_detectors - https://github.com/Ostorlab/known_exploited_vulnerbilities_detectors

View File

@ -16,6 +16,7 @@ No PoCs from references.
- https://github.com/ARPSyndicate/cvemon - https://github.com/ARPSyndicate/cvemon
- https://github.com/Al1ex/WindowsElevation - https://github.com/Al1ex/WindowsElevation
- https://github.com/Ascotbe/Kernelhub - https://github.com/Ascotbe/Kernelhub
- https://github.com/Cruxer8Mech/Idk
- https://github.com/Juba0x4355/Blue-THM - https://github.com/Juba0x4355/Blue-THM
- https://github.com/Juba0x4355/Blue-Writeup - https://github.com/Juba0x4355/Blue-Writeup
- https://github.com/TesterCC/exp_poc_library - https://github.com/TesterCC/exp_poc_library

View File

@ -55,6 +55,7 @@ No PoCs from references.
- https://github.com/Snoopy-Sec/Localroot-ALL-CVE - https://github.com/Snoopy-Sec/Localroot-ALL-CVE
- https://github.com/T3b0g025/PWK-CheatSheet - https://github.com/T3b0g025/PWK-CheatSheet
- https://github.com/Technoashofficial/kernel-exploitation-linux - https://github.com/Technoashofficial/kernel-exploitation-linux
- https://github.com/ZTK-009/linux-kernel-exploits
- https://github.com/akr3ch/OSCP-Survival-Guide - https://github.com/akr3ch/OSCP-Survival-Guide
- https://github.com/aktechnohacker/OSCP-Notes - https://github.com/aktechnohacker/OSCP-Notes
- https://github.com/albinjoshy03/linux-kernel-exploits - https://github.com/albinjoshy03/linux-kernel-exploits

View File

@ -16,6 +16,7 @@ No PoCs from references.
- https://github.com/ARPSyndicate/cvemon - https://github.com/ARPSyndicate/cvemon
- https://github.com/CVEDB/PoC-List - https://github.com/CVEDB/PoC-List
- https://github.com/CVEDB/awesome-cve-repo - https://github.com/CVEDB/awesome-cve-repo
- https://github.com/Cruxer8Mech/Idk
- https://github.com/Juba0x4355/Blue-THM - https://github.com/Juba0x4355/Blue-THM
- https://github.com/Juba0x4355/Blue-Writeup - https://github.com/Juba0x4355/Blue-Writeup
- https://github.com/anmolksachan/MS12-020 - https://github.com/anmolksachan/MS12-020

View File

@ -21,6 +21,7 @@ The x86-64 kernel system-call functionality in Xen 4.1.2 and earlier, as used in
- https://github.com/Al1ex/Red-Team - https://github.com/Al1ex/Red-Team
- https://github.com/Apri1y/Red-Team-links - https://github.com/Apri1y/Red-Team-links
- https://github.com/Ascotbe/Kernelhub - https://github.com/Ascotbe/Kernelhub
- https://github.com/Cruxer8Mech/Idk
- https://github.com/Echocipher/Resource-list - https://github.com/Echocipher/Resource-list
- https://github.com/Flerov/WindowsExploitDev - https://github.com/Flerov/WindowsExploitDev
- https://github.com/Ondrik8/RED-Team - https://github.com/Ondrik8/RED-Team

View File

@ -29,6 +29,7 @@ libdbus 1.5.x and earlier, when used in setuid or other privileged programs in X
- https://github.com/Shadowshusky/linux-kernel-exploits - https://github.com/Shadowshusky/linux-kernel-exploits
- https://github.com/Singlea-lyh/linux-kernel-exploits - https://github.com/Singlea-lyh/linux-kernel-exploits
- https://github.com/Snoopy-Sec/Localroot-ALL-CVE - https://github.com/Snoopy-Sec/Localroot-ALL-CVE
- https://github.com/ZTK-009/linux-kernel-exploits
- https://github.com/albinjoshy03/linux-kernel-exploits - https://github.com/albinjoshy03/linux-kernel-exploits
- https://github.com/alian87/linux-kernel-exploits - https://github.com/alian87/linux-kernel-exploits
- https://github.com/coffee727/linux-exp - https://github.com/coffee727/linux-exp

View File

@ -17,6 +17,7 @@ win32k.sys in the kernel-mode drivers in Microsoft Windows Vista SP2, Windows Se
- https://github.com/Al1ex/WindowsElevation - https://github.com/Al1ex/WindowsElevation
- https://github.com/Ascotbe/Kernelhub - https://github.com/Ascotbe/Kernelhub
- https://github.com/Crunchy0/Win_exploits - https://github.com/Crunchy0/Win_exploits
- https://github.com/Cruxer8Mech/Idk
- https://github.com/fei9747/WindowsElevation - https://github.com/fei9747/WindowsElevation
- https://github.com/nitishbadole/oscp-note-2 - https://github.com/nitishbadole/oscp-note-2
- https://github.com/rmsbpro/rmsbpro - https://github.com/rmsbpro/rmsbpro

View File

@ -28,6 +28,7 @@ No PoCs from references.
- https://github.com/Shadowshusky/linux-kernel-exploits - https://github.com/Shadowshusky/linux-kernel-exploits
- https://github.com/Singlea-lyh/linux-kernel-exploits - https://github.com/Singlea-lyh/linux-kernel-exploits
- https://github.com/Snoopy-Sec/Localroot-ALL-CVE - https://github.com/Snoopy-Sec/Localroot-ALL-CVE
- https://github.com/ZTK-009/linux-kernel-exploits
- https://github.com/albinjoshy03/linux-kernel-exploits - https://github.com/albinjoshy03/linux-kernel-exploits
- https://github.com/alian87/linux-kernel-exploits - https://github.com/alian87/linux-kernel-exploits
- https://github.com/coffee727/linux-exp - https://github.com/coffee727/linux-exp

View File

@ -18,6 +18,7 @@ win32k.sys in the kernel-mode drivers in Microsoft Windows XP SP2 and SP3, Windo
- https://github.com/Ascotbe/Kernelhub - https://github.com/Ascotbe/Kernelhub
- https://github.com/CVEDB/PoC-List - https://github.com/CVEDB/PoC-List
- https://github.com/CVEDB/awesome-cve-repo - https://github.com/CVEDB/awesome-cve-repo
- https://github.com/Cruxer8Mech/Idk
- https://github.com/JERRY123S/all-poc - https://github.com/JERRY123S/all-poc
- https://github.com/Meatballs1/cve-2013-1300 - https://github.com/Meatballs1/cve-2013-1300
- https://github.com/cyberanand1337x/bug-bounty-2022 - https://github.com/cyberanand1337x/bug-bounty-2022

View File

@ -15,6 +15,7 @@ No PoCs from references.
#### Github #### Github
- https://github.com/Al1ex/WindowsElevation - https://github.com/Al1ex/WindowsElevation
- https://github.com/Ascotbe/Kernelhub - https://github.com/Ascotbe/Kernelhub
- https://github.com/Cruxer8Mech/Idk
- https://github.com/fei9747/WindowsElevation - https://github.com/fei9747/WindowsElevation
- https://github.com/lyshark/Windows-exploits - https://github.com/lyshark/Windows-exploits
- https://github.com/ycdxsb/WindowsPrivilegeEscalation - https://github.com/ycdxsb/WindowsPrivilegeEscalation

View File

@ -14,6 +14,7 @@ win32k.sys in the kernel-mode drivers in Microsoft Windows XP SP2 and SP3, Windo
#### Github #### Github
- https://github.com/Ascotbe/Kernelhub - https://github.com/Ascotbe/Kernelhub
- https://github.com/Cruxer8Mech/Idk
- https://github.com/lyshark/Windows-exploits - https://github.com/lyshark/Windows-exploits
- https://github.com/ycdxsb/WindowsPrivilegeEscalation - https://github.com/ycdxsb/WindowsPrivilegeEscalation

View File

@ -32,6 +32,7 @@ Array index error in the __sock_diag_rcv_msg function in net/core/sock_diag.c in
- https://github.com/Singlea-lyh/linux-kernel-exploits - https://github.com/Singlea-lyh/linux-kernel-exploits
- https://github.com/Snoopy-Sec/Localroot-ALL-CVE - https://github.com/Snoopy-Sec/Localroot-ALL-CVE
- https://github.com/Technoashofficial/kernel-exploitation-linux - https://github.com/Technoashofficial/kernel-exploitation-linux
- https://github.com/ZTK-009/linux-kernel-exploits
- https://github.com/albinjoshy03/linux-kernel-exploits - https://github.com/albinjoshy03/linux-kernel-exploits
- https://github.com/alian87/linux-kernel-exploits - https://github.com/alian87/linux-kernel-exploits
- https://github.com/anoaghost/Localroot_Compile - https://github.com/anoaghost/Localroot_Compile

View File

@ -28,6 +28,7 @@ The clone system-call implementation in the Linux kernel before 3.8.3 does not p
- https://github.com/Shadowshusky/linux-kernel-exploits - https://github.com/Shadowshusky/linux-kernel-exploits
- https://github.com/Singlea-lyh/linux-kernel-exploits - https://github.com/Singlea-lyh/linux-kernel-exploits
- https://github.com/Snoopy-Sec/Localroot-ALL-CVE - https://github.com/Snoopy-Sec/Localroot-ALL-CVE
- https://github.com/ZTK-009/linux-kernel-exploits
- https://github.com/albinjoshy03/linux-kernel-exploits - https://github.com/albinjoshy03/linux-kernel-exploits
- https://github.com/alian87/linux-kernel-exploits - https://github.com/alian87/linux-kernel-exploits
- https://github.com/coffee727/linux-exp - https://github.com/coffee727/linux-exp

View File

@ -45,6 +45,7 @@ The perf_swevent_init function in kernel/events/core.c in the Linux kernel befor
- https://github.com/Singlea-lyh/linux-kernel-exploits - https://github.com/Singlea-lyh/linux-kernel-exploits
- https://github.com/Snoopy-Sec/Localroot-ALL-CVE - https://github.com/Snoopy-Sec/Localroot-ALL-CVE
- https://github.com/Technoashofficial/kernel-exploitation-linux - https://github.com/Technoashofficial/kernel-exploitation-linux
- https://github.com/ZTK-009/linux-kernel-exploits
- https://github.com/albinjoshy03/linux-kernel-exploits - https://github.com/albinjoshy03/linux-kernel-exploits
- https://github.com/alian87/linux-kernel-exploits - https://github.com/alian87/linux-kernel-exploits
- https://github.com/amane312/Linux_menthor - https://github.com/amane312/Linux_menthor

View File

@ -15,6 +15,7 @@ NDProxy.sys in the kernel in Microsoft Windows XP SP2 and SP3 and Server 2003 SP
#### Github #### Github
- https://github.com/Al1ex/WindowsElevation - https://github.com/Al1ex/WindowsElevation
- https://github.com/Ascotbe/Kernelhub - https://github.com/Ascotbe/Kernelhub
- https://github.com/Cruxer8Mech/Idk
- https://github.com/Friarfukd/RobbinHood - https://github.com/Friarfukd/RobbinHood
- https://github.com/Ostorlab/KEV - https://github.com/Ostorlab/KEV
- https://github.com/Ostorlab/known_exploited_vulnerbilities_detectors - https://github.com/Ostorlab/known_exploited_vulnerbilities_detectors

View File

@ -15,6 +15,7 @@ Directory traversal vulnerability in /res/I18nMsg,AjxMsg,ZMsg,ZmMsg,AjxKeys,ZmKe
#### Github #### Github
- https://github.com/ARPSyndicate/kenzer-templates - https://github.com/ARPSyndicate/kenzer-templates
- https://github.com/ZTK-009/RedTeamer
- https://github.com/fengjixuchui/RedTeamer - https://github.com/fengjixuchui/RedTeamer
- https://github.com/fnmsd/zimbra_poc - https://github.com/fnmsd/zimbra_poc
- https://github.com/password520/RedTeamer - https://github.com/password520/RedTeamer

View File

@ -38,6 +38,7 @@ The compat_sys_recvmmsg function in net/compat.c in the Linux kernel before 3.13
- https://github.com/Singlea-lyh/linux-kernel-exploits - https://github.com/Singlea-lyh/linux-kernel-exploits
- https://github.com/Snoopy-Sec/Localroot-ALL-CVE - https://github.com/Snoopy-Sec/Localroot-ALL-CVE
- https://github.com/Technoashofficial/kernel-exploitation-linux - https://github.com/Technoashofficial/kernel-exploitation-linux
- https://github.com/ZTK-009/linux-kernel-exploits
- https://github.com/albinjoshy03/linux-kernel-exploits - https://github.com/albinjoshy03/linux-kernel-exploits
- https://github.com/alian87/linux-kernel-exploits - https://github.com/alian87/linux-kernel-exploits
- https://github.com/ambynotcoder/C-libraries - https://github.com/ambynotcoder/C-libraries

View File

@ -36,6 +36,7 @@ The n_tty_write function in drivers/tty/n_tty.c in the Linux kernel through 3.14
- https://github.com/Snoopy-Sec/Localroot-ALL-CVE - https://github.com/Snoopy-Sec/Localroot-ALL-CVE
- https://github.com/SunRain/CVE-2014-0196 - https://github.com/SunRain/CVE-2014-0196
- https://github.com/Technoashofficial/kernel-exploitation-linux - https://github.com/Technoashofficial/kernel-exploitation-linux
- https://github.com/ZTK-009/linux-kernel-exploits
- https://github.com/albinjoshy03/linux-kernel-exploits - https://github.com/albinjoshy03/linux-kernel-exploits
- https://github.com/alian87/linux-kernel-exploits - https://github.com/alian87/linux-kernel-exploits
- https://github.com/anoaghost/Localroot_Compile - https://github.com/anoaghost/Localroot_Compile

View File

@ -16,6 +16,7 @@ Double free vulnerability in the Ancillary Function Driver (AFD) in afd.sys in t
#### Github #### Github
- https://github.com/Al1ex/WindowsElevation - https://github.com/Al1ex/WindowsElevation
- https://github.com/Ascotbe/Kernelhub - https://github.com/Ascotbe/Kernelhub
- https://github.com/Cruxer8Mech/Idk
- https://github.com/ExploitCN/CVE-2014-1767-EXP-PAPER - https://github.com/ExploitCN/CVE-2014-1767-EXP-PAPER
- https://github.com/LegendSaber/exp - https://github.com/LegendSaber/exp
- https://github.com/ThunderJie/CVE - https://github.com/ThunderJie/CVE

View File

@ -45,6 +45,7 @@ The default configuration in Elasticsearch before 1.2 enables dynamic scripting,
- https://github.com/SexyBeast233/SecBooks - https://github.com/SexyBeast233/SecBooks
- https://github.com/ToonyLoony/OpenVAS_Project - https://github.com/ToonyLoony/OpenVAS_Project
- https://github.com/Z0fhack/Goby_POC - https://github.com/Z0fhack/Goby_POC
- https://github.com/ZTK-009/RedTeamer
- https://github.com/ahm3dhany/IDS-Evasion - https://github.com/ahm3dhany/IDS-Evasion
- https://github.com/akusilvennoinen/cybersecuritybase-project-2 - https://github.com/akusilvennoinen/cybersecuritybase-project-2
- https://github.com/amcai/myscan - https://github.com/amcai/myscan

View File

@ -43,6 +43,7 @@ No PoCs from references.
- https://github.com/Singlea-lyh/linux-kernel-exploits - https://github.com/Singlea-lyh/linux-kernel-exploits
- https://github.com/Snoopy-Sec/Localroot-ALL-CVE - https://github.com/Snoopy-Sec/Localroot-ALL-CVE
- https://github.com/Technoashofficial/kernel-exploitation-linux - https://github.com/Technoashofficial/kernel-exploitation-linux
- https://github.com/ZTK-009/linux-kernel-exploits
- https://github.com/albinjoshy03/linux-kernel-exploits - https://github.com/albinjoshy03/linux-kernel-exploits
- https://github.com/alian87/linux-kernel-exploits - https://github.com/alian87/linux-kernel-exploits
- https://github.com/ambynotcoder/C-libraries - https://github.com/ambynotcoder/C-libraries

View File

@ -30,6 +30,7 @@ The capabilities implementation in the Linux kernel before 3.14.8 does not prope
- https://github.com/Singlea-lyh/linux-kernel-exploits - https://github.com/Singlea-lyh/linux-kernel-exploits
- https://github.com/Snoopy-Sec/Localroot-ALL-CVE - https://github.com/Snoopy-Sec/Localroot-ALL-CVE
- https://github.com/Technoashofficial/kernel-exploitation-linux - https://github.com/Technoashofficial/kernel-exploitation-linux
- https://github.com/ZTK-009/linux-kernel-exploits
- https://github.com/albinjoshy03/linux-kernel-exploits - https://github.com/albinjoshy03/linux-kernel-exploits
- https://github.com/alian87/linux-kernel-exploits - https://github.com/alian87/linux-kernel-exploits
- https://github.com/anoaghost/Localroot_Compile - https://github.com/anoaghost/Localroot_Compile

View File

@ -16,6 +16,7 @@ Microsoft Windows Server 2003 SP2 allows local users to gain privileges via a cr
#### Github #### Github
- https://github.com/Al1ex/WindowsElevation - https://github.com/Al1ex/WindowsElevation
- https://github.com/Ascotbe/Kernelhub - https://github.com/Ascotbe/Kernelhub
- https://github.com/Cruxer8Mech/Idk
- https://github.com/fei9747/WindowsElevation - https://github.com/fei9747/WindowsElevation
- https://github.com/fungoshacks/CVE-2014-4076 - https://github.com/fungoshacks/CVE-2014-4076
- https://github.com/lyshark/Windows-exploits - https://github.com/lyshark/Windows-exploits

View File

@ -33,6 +33,7 @@ win32k.sys in the kernel-mode drivers in Microsoft Windows Server 2003 SP2, Wind
- https://github.com/CVEDB/awesome-cve-repo - https://github.com/CVEDB/awesome-cve-repo
- https://github.com/CVEDB/top - https://github.com/CVEDB/top
- https://github.com/CrackerCat/Kernel-Security-Development - https://github.com/CrackerCat/Kernel-Security-Development
- https://github.com/Cruxer8Mech/Idk
- https://github.com/Echocipher/Resource-list - https://github.com/Echocipher/Resource-list
- https://github.com/ExpLife0011/awesome-windows-kernel-security-development - https://github.com/ExpLife0011/awesome-windows-kernel-security-development
- https://github.com/FULLSHADE/WindowsExploitationResources - https://github.com/FULLSHADE/WindowsExploitationResources

View File

@ -53,6 +53,7 @@ Unspecified vulnerability in the Oracle WebLogic Server component in Oracle Fusi
- https://github.com/WingsSec/Meppo - https://github.com/WingsSec/Meppo
- https://github.com/Z0fhack/Goby_POC - https://github.com/Z0fhack/Goby_POC
- https://github.com/ZH3FENG/Weblogic_SSRF - https://github.com/ZH3FENG/Weblogic_SSRF
- https://github.com/ZTK-009/RedTeamer
- https://github.com/Zero094/Vulnerability-verification - https://github.com/Zero094/Vulnerability-verification
- https://github.com/assetnote/blind-ssrf-chains - https://github.com/assetnote/blind-ssrf-chains
- https://github.com/asw3asw/SSRF - https://github.com/asw3asw/SSRF

View File

@ -34,6 +34,7 @@ The Linux kernel before 3.15.4 on Intel processors does not properly restrict us
- https://github.com/Singlea-lyh/linux-kernel-exploits - https://github.com/Singlea-lyh/linux-kernel-exploits
- https://github.com/Snoopy-Sec/Localroot-ALL-CVE - https://github.com/Snoopy-Sec/Localroot-ALL-CVE
- https://github.com/Technoashofficial/kernel-exploitation-linux - https://github.com/Technoashofficial/kernel-exploitation-linux
- https://github.com/ZTK-009/linux-kernel-exploits
- https://github.com/albinjoshy03/linux-kernel-exploits - https://github.com/albinjoshy03/linux-kernel-exploits
- https://github.com/alian87/linux-kernel-exploits - https://github.com/alian87/linux-kernel-exploits
- https://github.com/anoaghost/Localroot_Compile - https://github.com/anoaghost/Localroot_Compile

Some files were not shown because too many files have changed in this diff Show More