mirror of
https://github.com/0xMarcio/cve.git
synced 2025-06-19 17:30:12 +00:00
Update Mon May 27 13:12:02 UTC 2024
This commit is contained in:
parent
2d745dea05
commit
b042ce8188
@ -13,5 +13,6 @@ The Windows 2000 telnet client attempts to perform NTLM authentication by defaul
|
||||
No PoCs from references.
|
||||
|
||||
#### Github
|
||||
- https://github.com/Cruxer8Mech/Idk
|
||||
- https://github.com/ycdxsb/WindowsPrivilegeEscalation
|
||||
|
||||
|
@ -16,6 +16,7 @@ File and Print Sharing service in Windows 95, Windows 98, and Windows Me does no
|
||||
- https://github.com/ARPSyndicate/cvemon
|
||||
- https://github.com/Ascotbe/Kernelhub
|
||||
- https://github.com/CVEDB/PoC-List
|
||||
- https://github.com/Cruxer8Mech/Idk
|
||||
- https://github.com/Z6543/CVE-2000-0979
|
||||
- https://github.com/ycdxsb/WindowsPrivilegeEscalation
|
||||
|
||||
|
@ -16,6 +16,7 @@ No PoCs from references.
|
||||
- https://github.com/ARPSyndicate/cvemon
|
||||
- https://github.com/Al1ex/WindowsElevation
|
||||
- https://github.com/Ascotbe/Kernelhub
|
||||
- https://github.com/Cruxer8Mech/Idk
|
||||
- https://github.com/fei9747/WindowsElevation
|
||||
- https://github.com/lyshark/Windows-exploits
|
||||
- https://github.com/makoto56/penetration-suite-toolkit
|
||||
|
@ -32,6 +32,7 @@ The do_mremap function for the mremap system call in Linux 2.2 to 2.2.25, 2.4 to
|
||||
- https://github.com/Singlea-lyh/linux-kernel-exploits
|
||||
- https://github.com/Snoopy-Sec/Localroot-ALL-CVE
|
||||
- https://github.com/Technoashofficial/kernel-exploitation-linux
|
||||
- https://github.com/ZTK-009/linux-kernel-exploits
|
||||
- https://github.com/albinjoshy03/linux-kernel-exploits
|
||||
- https://github.com/alian87/linux-kernel-exploits
|
||||
- https://github.com/coffee727/linux-exp
|
||||
|
@ -29,6 +29,7 @@ Race condition in the (1) load_elf_library and (2) binfmt_aout function calls fo
|
||||
- https://github.com/Shadowshusky/linux-kernel-exploits
|
||||
- https://github.com/Singlea-lyh/linux-kernel-exploits
|
||||
- https://github.com/Snoopy-Sec/Localroot-ALL-CVE
|
||||
- https://github.com/ZTK-009/linux-kernel-exploits
|
||||
- https://github.com/albinjoshy03/linux-kernel-exploits
|
||||
- https://github.com/alian87/linux-kernel-exploits
|
||||
- https://github.com/coffee727/linux-exp
|
||||
|
@ -14,5 +14,6 @@ The Windows Animated Cursor (ANI) capability in Windows NT, Windows 2000 through
|
||||
- https://docs.microsoft.com/en-us/security-updates/securitybulletins/2005/ms05-002
|
||||
|
||||
#### Github
|
||||
- https://github.com/Cruxer8Mech/Idk
|
||||
- https://github.com/ycdxsb/WindowsPrivilegeEscalation
|
||||
|
||||
|
@ -29,6 +29,7 @@ Integer overflow in sys_epoll_wait in eventpoll.c for Linux kernel 2.6 to 2.6.11
|
||||
- https://github.com/Shadowshusky/linux-kernel-exploits
|
||||
- https://github.com/Singlea-lyh/linux-kernel-exploits
|
||||
- https://github.com/Snoopy-Sec/Localroot-ALL-CVE
|
||||
- https://github.com/ZTK-009/linux-kernel-exploits
|
||||
- https://github.com/albinjoshy03/linux-kernel-exploits
|
||||
- https://github.com/alian87/linux-kernel-exploits
|
||||
- https://github.com/coffee727/linux-exp
|
||||
|
@ -28,6 +28,7 @@ The elf_core_dump function in binfmt_elf.c for Linux kernel 2.x.x to 2.2.27-rc2,
|
||||
- https://github.com/Shadowshusky/linux-kernel-exploits
|
||||
- https://github.com/Singlea-lyh/linux-kernel-exploits
|
||||
- https://github.com/Snoopy-Sec/Localroot-ALL-CVE
|
||||
- https://github.com/ZTK-009/linux-kernel-exploits
|
||||
- https://github.com/albinjoshy03/linux-kernel-exploits
|
||||
- https://github.com/alian87/linux-kernel-exploits
|
||||
- https://github.com/coffee727/linux-exp
|
||||
|
@ -17,6 +17,7 @@ Stack-based buffer overflow in the Plug and Play (PnP) service for Microsoft Win
|
||||
- https://github.com/ARPSyndicate/cvemon
|
||||
- https://github.com/Al1ex/WindowsElevation
|
||||
- https://github.com/Ascotbe/Kernelhub
|
||||
- https://github.com/Cruxer8Mech/Idk
|
||||
- https://github.com/fei9747/WindowsElevation
|
||||
- https://github.com/makoto56/penetration-suite-toolkit
|
||||
- https://github.com/ycdxsb/WindowsPrivilegeEscalation
|
||||
|
@ -13,6 +13,7 @@ Heap-based buffer overflow in the Server Service (SRV.SYS driver) in Microsoft W
|
||||
- https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-035
|
||||
|
||||
#### Github
|
||||
- https://github.com/Cruxer8Mech/Idk
|
||||
- https://github.com/uroboros-security/SMB-CVE
|
||||
- https://github.com/ycdxsb/WindowsPrivilegeEscalation
|
||||
|
||||
|
@ -31,6 +31,7 @@ No PoCs from references.
|
||||
- https://github.com/Shadowshusky/linux-kernel-exploits
|
||||
- https://github.com/Singlea-lyh/linux-kernel-exploits
|
||||
- https://github.com/Snoopy-Sec/Localroot-ALL-CVE
|
||||
- https://github.com/ZTK-009/linux-kernel-exploits
|
||||
- https://github.com/albinjoshy03/linux-kernel-exploits
|
||||
- https://github.com/alian87/linux-kernel-exploits
|
||||
- https://github.com/coffee727/linux-exp
|
||||
|
17
2006/CVE-2006-2822.md
Normal file
17
2006/CVE-2006-2822.md
Normal file
@ -0,0 +1,17 @@
|
||||
### [CVE-2006-2822](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2822)
|
||||

|
||||

|
||||

|
||||
|
||||
### Description
|
||||
|
||||
SQL injection vulnerability in admin/default.asp in Dusan Drobac CodeAvalanche FreeForum (aka CAForum) 1.0 allows remote attackers to execute arbitrary SQL commands via the password parameter.
|
||||
|
||||
### POC
|
||||
|
||||
#### Reference
|
||||
- http://securityreason.com/securityalert/1026
|
||||
|
||||
#### Github
|
||||
No PoCs found on GitHub currently.
|
||||
|
@ -16,6 +16,7 @@ No PoCs from references.
|
||||
- https://github.com/ARPSyndicate/cvemon
|
||||
- https://github.com/Al1ex/WindowsElevation
|
||||
- https://github.com/Ascotbe/Kernelhub
|
||||
- https://github.com/Cruxer8Mech/Idk
|
||||
- https://github.com/fei9747/WindowsElevation
|
||||
- https://github.com/lyshark/Windows-exploits
|
||||
- https://github.com/makoto56/penetration-suite-toolkit
|
||||
|
@ -28,6 +28,7 @@ Race condition in Linux kernel 2.6.17.4 and earlier allows local users to gain r
|
||||
- https://github.com/Shadowshusky/linux-kernel-exploits
|
||||
- https://github.com/Singlea-lyh/linux-kernel-exploits
|
||||
- https://github.com/Snoopy-Sec/Localroot-ALL-CVE
|
||||
- https://github.com/ZTK-009/linux-kernel-exploits
|
||||
- https://github.com/albinjoshy03/linux-kernel-exploits
|
||||
- https://github.com/alian87/linux-kernel-exploits
|
||||
- https://github.com/coffee727/linux-exp
|
||||
|
@ -25,6 +25,7 @@ No PoCs from references.
|
||||
- https://github.com/aulauniversal/Pppwn-Android
|
||||
- https://github.com/aulauniversal/Pppwn.Android
|
||||
- https://github.com/aulauniversal/Ps4-pppwn-Windows
|
||||
- https://github.com/lvca-dev/easyPPPwn
|
||||
- https://github.com/secdev/awesome-scapy
|
||||
- https://github.com/sonicps/pppwn-sonicps
|
||||
- https://github.com/vineshgoyal/SISTR0-PPPwn
|
||||
|
@ -18,5 +18,6 @@ Stack-based buffer overflow in the animated cursor code in Microsoft Windows 200
|
||||
- https://github.com/Axua/CVE-2007-0038
|
||||
- https://github.com/CVEDB/PoC-List
|
||||
- https://github.com/CVEDB/awesome-cve-repo
|
||||
- https://github.com/Cruxer8Mech/Idk
|
||||
- https://github.com/ycdxsb/WindowsPrivilegeEscalation
|
||||
|
||||
|
@ -16,6 +16,7 @@ The ReadDirectoryChangesW API function on Microsoft Windows 2000, XP, Server 200
|
||||
- https://github.com/ARPSyndicate/cvemon
|
||||
- https://github.com/CVEDB/PoC-List
|
||||
- https://github.com/CVEDB/awesome-cve-repo
|
||||
- https://github.com/Cruxer8Mech/Idk
|
||||
- https://github.com/disintegr8te/MonitorFileSystemWatcher
|
||||
- https://github.com/ycdxsb/WindowsPrivilegeEscalation
|
||||
- https://github.com/z3APA3A/spydir
|
||||
|
@ -13,5 +13,6 @@ Unspecified vulnerability in Microsoft Windows 2000 SP4 through Vista allows rem
|
||||
No PoCs from references.
|
||||
|
||||
#### Github
|
||||
- https://github.com/Cruxer8Mech/Idk
|
||||
- https://github.com/ycdxsb/WindowsPrivilegeEscalation
|
||||
|
||||
|
@ -30,6 +30,7 @@ The vmsplice_to_pipe function in Linux kernel 2.6.17 through 2.6.24.1 does not v
|
||||
- https://github.com/Singlea-lyh/linux-kernel-exploits
|
||||
- https://github.com/Snoopy-Sec/Localroot-ALL-CVE
|
||||
- https://github.com/Technoashofficial/kernel-exploitation-linux
|
||||
- https://github.com/ZTK-009/linux-kernel-exploits
|
||||
- https://github.com/albinjoshy03/linux-kernel-exploits
|
||||
- https://github.com/alian87/linux-kernel-exploits
|
||||
- https://github.com/coffee727/linux-exp
|
||||
|
@ -17,6 +17,7 @@ Unspecified vulnerability in the kernel in Microsoft Windows 2000 SP4, XP SP2, S
|
||||
- https://github.com/ARPSyndicate/cvemon
|
||||
- https://github.com/Al1ex/WindowsElevation
|
||||
- https://github.com/Ascotbe/Kernelhub
|
||||
- https://github.com/Cruxer8Mech/Idk
|
||||
- https://github.com/fei9747/WindowsElevation
|
||||
- https://github.com/lyshark/Windows-exploits
|
||||
- https://github.com/makoto56/penetration-suite-toolkit
|
||||
|
@ -16,6 +16,7 @@ afd.sys in the Ancillary Function Driver (AFD) component in Microsoft Windows XP
|
||||
#### Github
|
||||
- https://github.com/Al1ex/WindowsElevation
|
||||
- https://github.com/Ascotbe/Kernelhub
|
||||
- https://github.com/Cruxer8Mech/Idk
|
||||
- https://github.com/fei9747/WindowsElevation
|
||||
- https://github.com/lyshark/Windows-exploits
|
||||
- https://github.com/ycdxsb/WindowsPrivilegeEscalation
|
||||
|
@ -16,6 +16,7 @@ Microsoft Windows 2000 Gold through SP4, XP Gold through SP3, Server 2003 SP1 an
|
||||
#### Github
|
||||
- https://github.com/Al1ex/WindowsElevation
|
||||
- https://github.com/Ascotbe/Kernelhub
|
||||
- https://github.com/Cruxer8Mech/Idk
|
||||
- https://github.com/fei9747/WindowsElevation
|
||||
- https://github.com/lyshark/Windows-exploits
|
||||
- https://github.com/uroboros-security/SMB-CVE
|
||||
|
@ -28,6 +28,7 @@ fs/open.c in the Linux kernel before 2.6.22 does not properly strip setuid and s
|
||||
- https://github.com/Shadowshusky/linux-kernel-exploits
|
||||
- https://github.com/Singlea-lyh/linux-kernel-exploits
|
||||
- https://github.com/Snoopy-Sec/Localroot-ALL-CVE
|
||||
- https://github.com/ZTK-009/linux-kernel-exploits
|
||||
- https://github.com/albinjoshy03/linux-kernel-exploits
|
||||
- https://github.com/alian87/linux-kernel-exploits
|
||||
- https://github.com/coffee727/linux-exp
|
||||
|
@ -27,6 +27,7 @@ The Server service in Microsoft Windows 2000 SP4, XP SP2 and SP3, Server 2003 SP
|
||||
- https://github.com/Ascotbe/Kernelhub
|
||||
- https://github.com/CVEDB/PoC-List
|
||||
- https://github.com/CVEDB/awesome-cve-repo
|
||||
- https://github.com/Cruxer8Mech/Idk
|
||||
- https://github.com/H3xL00m/MS08-067
|
||||
- https://github.com/Jean-Francois-C/Boot2root-CTFs-Writeups
|
||||
- https://github.com/Kuromesi/Py4CSKG
|
||||
|
@ -15,6 +15,7 @@ No PoCs from references.
|
||||
#### Github
|
||||
- https://github.com/Al1ex/WindowsElevation
|
||||
- https://github.com/Ascotbe/Kernelhub
|
||||
- https://github.com/Cruxer8Mech/Idk
|
||||
- https://github.com/fei9747/WindowsElevation
|
||||
- https://github.com/ycdxsb/WindowsPrivilegeEscalation
|
||||
|
||||
|
@ -17,6 +17,7 @@ The Windows Printing Service in Microsoft Windows 2000 SP4, XP SP2 and SP3, Serv
|
||||
- https://github.com/ARPSyndicate/cvemon
|
||||
- https://github.com/CVEDB/PoC-List
|
||||
- https://github.com/CVEDB/awesome-cve-repo
|
||||
- https://github.com/Cruxer8Mech/Idk
|
||||
- https://github.com/clearbluejar/cve-markdown-charts
|
||||
- https://github.com/developer3000S/PoC-in-GitHub
|
||||
- https://github.com/hectorgie/PoC-in-GitHub
|
||||
|
@ -13,5 +13,6 @@ The WebDAV extension in Microsoft Internet Information Services (IIS) 5.0 on Win
|
||||
- https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-020
|
||||
|
||||
#### Github
|
||||
- https://github.com/Cruxer8Mech/Idk
|
||||
- https://github.com/ycdxsb/WindowsPrivilegeEscalation
|
||||
|
||||
|
@ -31,6 +31,7 @@ udev before 1.4.1 does not verify whether a NETLINK message originates from kern
|
||||
- https://github.com/Shadowshusky/linux-kernel-exploits
|
||||
- https://github.com/Singlea-lyh/linux-kernel-exploits
|
||||
- https://github.com/Snoopy-Sec/Localroot-ALL-CVE
|
||||
- https://github.com/ZTK-009/linux-kernel-exploits
|
||||
- https://github.com/albinjoshy03/linux-kernel-exploits
|
||||
- https://github.com/alian87/linux-kernel-exploits
|
||||
- https://github.com/amane312/Linux_menthor
|
||||
|
@ -29,6 +29,7 @@ The exit_notify function in kernel/exit.c in the Linux kernel before 2.6.30-rc1
|
||||
- https://github.com/Shadowshusky/linux-kernel-exploits
|
||||
- https://github.com/Singlea-lyh/linux-kernel-exploits
|
||||
- https://github.com/Snoopy-Sec/Localroot-ALL-CVE
|
||||
- https://github.com/ZTK-009/linux-kernel-exploits
|
||||
- https://github.com/albinjoshy03/linux-kernel-exploits
|
||||
- https://github.com/alian87/linux-kernel-exploits
|
||||
- https://github.com/coffee727/linux-exp
|
||||
|
@ -16,6 +16,7 @@ The WebDAV extension in Microsoft Internet Information Services (IIS) 5.1 and 6.
|
||||
|
||||
#### Github
|
||||
- https://github.com/Al1ex/WindowsElevation
|
||||
- https://github.com/Cruxer8Mech/Idk
|
||||
- https://github.com/fei9747/WindowsElevation
|
||||
- https://github.com/ycdxsb/WindowsPrivilegeEscalation
|
||||
|
||||
|
@ -15,6 +15,7 @@ Microsoft Windows Vista Gold, SP1, and SP2, Windows Server 2008 Gold and SP2, an
|
||||
#### Github
|
||||
- https://github.com/Al1ex/WindowsElevation
|
||||
- https://github.com/Ascotbe/Kernelhub
|
||||
- https://github.com/Cruxer8Mech/Idk
|
||||
- https://github.com/EricwentwithCyber/Vulnerability-Scan-Lab
|
||||
- https://github.com/fei9747/WindowsElevation
|
||||
- https://github.com/lyshark/Windows-exploits
|
||||
|
@ -34,6 +34,7 @@ The Linux kernel 2.6.0 through 2.6.30.4, and 2.4.4 through 2.4.37.4, does not in
|
||||
- https://github.com/Singlea-lyh/linux-kernel-exploits
|
||||
- https://github.com/Snoopy-Sec/Localroot-ALL-CVE
|
||||
- https://github.com/Technoashofficial/kernel-exploitation-linux
|
||||
- https://github.com/ZTK-009/linux-kernel-exploits
|
||||
- https://github.com/albinjoshy03/linux-kernel-exploits
|
||||
- https://github.com/alian87/linux-kernel-exploits
|
||||
- https://github.com/cloudsec/exploit
|
||||
|
@ -34,6 +34,7 @@ The udp_sendmsg function in the UDP implementation in (1) net/ipv4/udp.c and (2)
|
||||
- https://github.com/Snoopy-Sec/Localroot-ALL-CVE
|
||||
- https://github.com/YgorAlberto/Ethical-Hacker
|
||||
- https://github.com/YgorAlberto/ygoralberto.github.io
|
||||
- https://github.com/ZTK-009/linux-kernel-exploits
|
||||
- https://github.com/albinjoshy03/linux-kernel-exploits
|
||||
- https://github.com/alian87/linux-kernel-exploits
|
||||
- https://github.com/cloudsec/exploit
|
||||
|
@ -30,6 +30,7 @@ Multiple race conditions in fs/pipe.c in the Linux kernel before 2.6.32-rc6 allo
|
||||
- https://github.com/Shadowshusky/linux-kernel-exploits
|
||||
- https://github.com/Singlea-lyh/linux-kernel-exploits
|
||||
- https://github.com/Snoopy-Sec/Localroot-ALL-CVE
|
||||
- https://github.com/ZTK-009/linux-kernel-exploits
|
||||
- https://github.com/albinjoshy03/linux-kernel-exploits
|
||||
- https://github.com/alian87/linux-kernel-exploits
|
||||
- https://github.com/coffee727/linux-exp
|
||||
|
@ -16,6 +16,7 @@ No PoCs from references.
|
||||
- https://github.com/Al1ex/WindowsElevation
|
||||
- https://github.com/Amnesthesia/EHAPT-Group-Project
|
||||
- https://github.com/Ascotbe/Kernelhub
|
||||
- https://github.com/Cruxer8Mech/Idk
|
||||
- https://github.com/EricwentwithCyber/Vulnerability-Scan-Lab
|
||||
- https://github.com/fei9747/WindowsElevation
|
||||
- https://github.com/uroboros-security/SMB-CVE
|
||||
|
@ -14,6 +14,7 @@ No PoCs from references.
|
||||
|
||||
#### Github
|
||||
- https://github.com/Ascotbe/Kernelhub
|
||||
- https://github.com/Cruxer8Mech/Idk
|
||||
- https://github.com/lyshark/Windows-exploits
|
||||
- https://github.com/ycdxsb/WindowsPrivilegeEscalation
|
||||
|
||||
|
@ -14,6 +14,7 @@ No PoCs from references.
|
||||
|
||||
#### Github
|
||||
- https://github.com/Ascotbe/Kernelhub
|
||||
- https://github.com/Cruxer8Mech/Idk
|
||||
- https://github.com/aRustyDev/C844
|
||||
- https://github.com/lyshark/Windows-exploits
|
||||
- https://github.com/ycdxsb/WindowsPrivilegeEscalation
|
||||
|
@ -28,6 +28,7 @@ The do_pages_move function in mm/migrate.c in the Linux kernel before 2.6.33-rc7
|
||||
- https://github.com/SecWiki/linux-kernel-exploits
|
||||
- https://github.com/Shadowshusky/linux-kernel-exploits
|
||||
- https://github.com/Singlea-lyh/linux-kernel-exploits
|
||||
- https://github.com/ZTK-009/linux-kernel-exploits
|
||||
- https://github.com/albinjoshy03/linux-kernel-exploits
|
||||
- https://github.com/alian87/linux-kernel-exploits
|
||||
- https://github.com/coffee727/linux-exp
|
||||
|
@ -30,6 +30,7 @@ No PoCs from references.
|
||||
- https://github.com/Shadowshusky/linux-kernel-exploits
|
||||
- https://github.com/Singlea-lyh/linux-kernel-exploits
|
||||
- https://github.com/Snoopy-Sec/Localroot-ALL-CVE
|
||||
- https://github.com/ZTK-009/linux-kernel-exploits
|
||||
- https://github.com/albinjoshy03/linux-kernel-exploits
|
||||
- https://github.com/alian87/linux-kernel-exploits
|
||||
- https://github.com/coffee727/linux-exp
|
||||
|
@ -14,6 +14,7 @@ The Windows kernel-mode drivers in win32k.sys in Microsoft Windows XP SP2 and SP
|
||||
|
||||
#### Github
|
||||
- https://github.com/Al1ex/WindowsElevation
|
||||
- https://github.com/Cruxer8Mech/Idk
|
||||
- https://github.com/fei9747/WindowsElevation
|
||||
- https://github.com/ycdxsb/WindowsPrivilegeEscalation
|
||||
|
||||
|
@ -14,6 +14,7 @@ The Windows kernel-mode drivers in win32k.sys in Microsoft Windows XP SP2 and SP
|
||||
|
||||
#### Github
|
||||
- https://github.com/Ascotbe/Kernelhub
|
||||
- https://github.com/Cruxer8Mech/Idk
|
||||
- https://github.com/lyshark/Windows-exploits
|
||||
- https://github.com/ycdxsb/WindowsPrivilegeEscalation
|
||||
|
||||
|
@ -15,6 +15,7 @@ No PoCs from references.
|
||||
#### Github
|
||||
- https://github.com/Al1ex/WindowsElevation
|
||||
- https://github.com/Ascotbe/Kernelhub
|
||||
- https://github.com/Cruxer8Mech/Idk
|
||||
- https://github.com/fei9747/WindowsElevation
|
||||
- https://github.com/ycdxsb/WindowsPrivilegeEscalation
|
||||
|
||||
|
@ -13,6 +13,7 @@ Buffer overflow in Microsoft Internet Information Services (IIS) 7.5, when FastC
|
||||
No PoCs from references.
|
||||
|
||||
#### Github
|
||||
- https://github.com/Cruxer8Mech/Idk
|
||||
- https://github.com/Romulus968/copycat
|
||||
- https://github.com/bioly230/THM_Alfred
|
||||
- https://github.com/dominicporter/shodan-playing
|
||||
|
@ -1,6 +1,6 @@
|
||||
### [CVE-2010-2954](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2954)
|
||||

|
||||

|
||||

|
||||

|
||||
|
||||
### Description
|
||||
|
@ -1,6 +1,6 @@
|
||||
### [CVE-2010-2955](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2955)
|
||||

|
||||

|
||||

|
||||

|
||||
|
||||
### Description
|
||||
|
@ -45,6 +45,7 @@ No PoCs from references.
|
||||
- https://github.com/Skixie/OSCP-Journey
|
||||
- https://github.com/Snoopy-Sec/Localroot-ALL-CVE
|
||||
- https://github.com/Technoashofficial/kernel-exploitation-linux
|
||||
- https://github.com/ZTK-009/linux-kernel-exploits
|
||||
- https://github.com/akr3ch/OSCP-Survival-Guide
|
||||
- https://github.com/aktechnohacker/OSCP-Notes
|
||||
- https://github.com/albinjoshy03/linux-kernel-exploits
|
||||
|
@ -34,6 +34,7 @@ The compat_alloc_user_space functions in include/asm/compat.h files in the Linux
|
||||
- https://github.com/Snoopy-Sec/Localroot-ALL-CVE
|
||||
- https://github.com/SteinsGatep001/Binary
|
||||
- https://github.com/Technoashofficial/kernel-exploitation-linux
|
||||
- https://github.com/ZTK-009/linux-kernel-exploits
|
||||
- https://github.com/albinjoshy03/linux-kernel-exploits
|
||||
- https://github.com/alian87/linux-kernel-exploits
|
||||
- https://github.com/coffee727/linux-exp
|
||||
|
@ -33,6 +33,7 @@ The IA32 system call emulation functionality in arch/x86/ia32/ia32entry.S in the
|
||||
- https://github.com/Singlea-lyh/linux-kernel-exploits
|
||||
- https://github.com/Snoopy-Sec/Localroot-ALL-CVE
|
||||
- https://github.com/Technoashofficial/kernel-exploitation-linux
|
||||
- https://github.com/ZTK-009/linux-kernel-exploits
|
||||
- https://github.com/albinjoshy03/linux-kernel-exploits
|
||||
- https://github.com/alian87/linux-kernel-exploits
|
||||
- https://github.com/coffee727/linux-exp
|
||||
|
@ -15,6 +15,7 @@ The Windows Task Scheduler in Microsoft Windows Vista SP1 and SP2, Windows Serve
|
||||
#### Github
|
||||
- https://github.com/Al1ex/WindowsElevation
|
||||
- https://github.com/Ascotbe/Kernelhub
|
||||
- https://github.com/Cruxer8Mech/Idk
|
||||
- https://github.com/fei9747/WindowsElevation
|
||||
- https://github.com/lyshark/Windows-exploits
|
||||
- https://github.com/ycdxsb/WindowsPrivilegeEscalation
|
||||
|
@ -32,6 +32,7 @@ No PoCs from references.
|
||||
- https://github.com/Singlea-lyh/linux-kernel-exploits
|
||||
- https://github.com/Snoopy-Sec/Localroot-ALL-CVE
|
||||
- https://github.com/Technoashofficial/kernel-exploitation-linux
|
||||
- https://github.com/ZTK-009/linux-kernel-exploits
|
||||
- https://github.com/albinjoshy03/linux-kernel-exploits
|
||||
- https://github.com/alian87/linux-kernel-exploits
|
||||
- https://github.com/coffee727/linux-exp
|
||||
|
@ -1,6 +1,6 @@
|
||||
### [CVE-2010-3705](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3705)
|
||||

|
||||

|
||||

|
||||

|
||||
|
||||
### Description
|
||||
|
@ -1,6 +1,6 @@
|
||||
### [CVE-2010-3873](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3873)
|
||||

|
||||

|
||||

|
||||

|
||||
|
||||
### Description
|
||||
|
@ -1,6 +1,6 @@
|
||||
### [CVE-2010-3875](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3875)
|
||||

|
||||

|
||||

|
||||

|
||||
|
||||
### Description
|
||||
|
@ -14,5 +14,6 @@ Unspecified vulnerability in Microsoft Windows on 32-bit platforms allows local
|
||||
- http://www.symantec.com/connect/blogs/stuxnet-using-three-additional-zero-day-vulnerabilities
|
||||
|
||||
#### Github
|
||||
- https://github.com/Cruxer8Mech/Idk
|
||||
- https://github.com/ycdxsb/WindowsPrivilegeEscalation
|
||||
|
||||
|
@ -53,6 +53,7 @@ The rds_page_copy_user function in net/rds/page.c in the Reliable Datagram Socke
|
||||
- https://github.com/Skixie/OSCP-Journey
|
||||
- https://github.com/Snoopy-Sec/Localroot-ALL-CVE
|
||||
- https://github.com/T3b0g025/PWK-CheatSheet
|
||||
- https://github.com/ZTK-009/linux-kernel-exploits
|
||||
- https://github.com/akr3ch/OSCP-Survival-Guide
|
||||
- https://github.com/aktechnohacker/OSCP-Notes
|
||||
- https://github.com/albinjoshy03/linux-kernel-exploits
|
||||
|
@ -32,6 +32,7 @@ The ipc subsystem in the Linux kernel before 2.6.37-rc1 does not initialize cert
|
||||
- https://github.com/Shadowshusky/linux-kernel-exploits
|
||||
- https://github.com/Singlea-lyh/linux-kernel-exploits
|
||||
- https://github.com/Snoopy-Sec/Localroot-ALL-CVE
|
||||
- https://github.com/ZTK-009/linux-kernel-exploits
|
||||
- https://github.com/albinjoshy03/linux-kernel-exploits
|
||||
- https://github.com/alian87/linux-kernel-exploits
|
||||
- https://github.com/coffee727/linux-exp
|
||||
|
@ -1,6 +1,6 @@
|
||||
### [CVE-2010-4164](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4164)
|
||||

|
||||

|
||||

|
||||

|
||||
|
||||
### Description
|
||||
|
@ -32,6 +32,7 @@ The do_exit function in kernel/exit.c in the Linux kernel before 2.6.36.2 does n
|
||||
- https://github.com/Singlea-lyh/linux-kernel-exploits
|
||||
- https://github.com/Snoopy-Sec/Localroot-ALL-CVE
|
||||
- https://github.com/Technoashofficial/kernel-exploitation-linux
|
||||
- https://github.com/ZTK-009/linux-kernel-exploits
|
||||
- https://github.com/albinjoshy03/linux-kernel-exploits
|
||||
- https://github.com/alian87/linux-kernel-exploits
|
||||
- https://github.com/coffee727/linux-exp
|
||||
|
@ -1,6 +1,6 @@
|
||||
### [CVE-2010-4342](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4342)
|
||||

|
||||

|
||||

|
||||

|
||||
|
||||
### Description
|
||||
|
@ -30,6 +30,7 @@ No PoCs from references.
|
||||
- https://github.com/Shadowshusky/linux-kernel-exploits
|
||||
- https://github.com/Singlea-lyh/linux-kernel-exploits
|
||||
- https://github.com/Snoopy-Sec/Localroot-ALL-CVE
|
||||
- https://github.com/ZTK-009/linux-kernel-exploits
|
||||
- https://github.com/albinjoshy03/linux-kernel-exploits
|
||||
- https://github.com/alian87/linux-kernel-exploits
|
||||
- https://github.com/coffee727/linux-exp
|
||||
|
@ -1,6 +1,6 @@
|
||||
### [CVE-2010-4527](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4527)
|
||||

|
||||

|
||||

|
||||

|
||||
|
||||
### Description
|
||||
|
@ -14,5 +14,6 @@ The Trace Events functionality in the kernel in Microsoft Windows XP SP3 does no
|
||||
|
||||
#### Github
|
||||
- https://github.com/Ascotbe/Kernelhub
|
||||
- https://github.com/Cruxer8Mech/Idk
|
||||
- https://github.com/ycdxsb/WindowsPrivilegeEscalation
|
||||
|
||||
|
17
2011/CVE-2011-0615.md
Normal file
17
2011/CVE-2011-0615.md
Normal file
@ -0,0 +1,17 @@
|
||||
### [CVE-2011-0615](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0615)
|
||||

|
||||

|
||||

|
||||
|
||||
### Description
|
||||
|
||||
Multiple buffer overflows in Adobe Audition 3.0.1 and earlier allow remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via crafted data in unspecified fields in the TRKM chunk in an Audition Session (aka .ses) file, related to inconsistent use of character data types.
|
||||
|
||||
### POC
|
||||
|
||||
#### Reference
|
||||
- http://www.coresecurity.com/content/Adobe-Audition-malformed-SES-file
|
||||
|
||||
#### Github
|
||||
No PoCs found on GitHub currently.
|
||||
|
@ -18,5 +18,6 @@ No PoCs from references.
|
||||
- https://github.com/BrunoPujos/CVE-2011-1237
|
||||
- https://github.com/CVEDB/PoC-List
|
||||
- https://github.com/CVEDB/awesome-cve-repo
|
||||
- https://github.com/Cruxer8Mech/Idk
|
||||
- https://github.com/ycdxsb/WindowsPrivilegeEscalation
|
||||
|
||||
|
@ -19,6 +19,7 @@ The Ancillary Function Driver (AFD) in afd.sys in Microsoft Windows XP SP2 and S
|
||||
- https://github.com/Ascotbe/Kernelhub
|
||||
- https://github.com/CVEDB/PoC-List
|
||||
- https://github.com/CVEDB/awesome-cve-repo
|
||||
- https://github.com/Cruxer8Mech/Idk
|
||||
- https://github.com/H3xL00m/CVE-2011-1249
|
||||
- https://github.com/Madusanka99/OHTS
|
||||
- https://github.com/c0d3cr4f73r/CVE-2011-1249
|
||||
|
@ -11,6 +11,7 @@ The encryptPassword function in Login.js in ManageEngine ServiceDesk Plus (SDP)
|
||||
|
||||
#### Reference
|
||||
- http://securityreason.com/securityalert/8385
|
||||
- http://www.coresecurity.com/content/multiples-vulnerabilities-manageengine-sdp
|
||||
|
||||
#### Github
|
||||
No PoCs found on GitHub currently.
|
||||
|
@ -11,6 +11,7 @@ Cross-site scripting (XSS) vulnerability in SolutionSearch.do in ManageEngine Se
|
||||
|
||||
#### Reference
|
||||
- http://securityreason.com/securityalert/8385
|
||||
- http://www.coresecurity.com/content/multiples-vulnerabilities-manageengine-sdp
|
||||
|
||||
#### Github
|
||||
No PoCs found on GitHub currently.
|
||||
|
@ -11,6 +11,7 @@ Heap-based buffer overflow in xlssr.dll in Autonomy KeyView, as used in IBM Lotu
|
||||
|
||||
#### Reference
|
||||
- http://securityreason.com/securityalert/8263
|
||||
- http://www.coresecurity.com/content/LotusNotes-XLS-viewer-heap-overflow
|
||||
|
||||
#### Github
|
||||
No PoCs found on GitHub currently.
|
||||
|
17
2011/CVE-2011-1513.md
Normal file
17
2011/CVE-2011-1513.md
Normal file
@ -0,0 +1,17 @@
|
||||
### [CVE-2011-1513](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1513)
|
||||

|
||||

|
||||

|
||||
|
||||
### Description
|
||||
|
||||
Static code injection vulnerability in install_.php in e107 CMS 0.7.24 and probably earlier versions, when the installation script is not removed, allows remote attackers to inject arbitrary PHP code into e107_config.php via a crafted MySQL server name.
|
||||
|
||||
### POC
|
||||
|
||||
#### Reference
|
||||
- http://www.coresecurity.com/content/e107-cms-script-command-injection
|
||||
|
||||
#### Github
|
||||
No PoCs found on GitHub currently.
|
||||
|
17
2011/CVE-2011-1514.md
Normal file
17
2011/CVE-2011-1514.md
Normal file
@ -0,0 +1,17 @@
|
||||
### [CVE-2011-1514](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1514)
|
||||

|
||||

|
||||

|
||||
|
||||
### Description
|
||||
|
||||
The inet service in HP OpenView Storage Data Protector 6.00 through 6.20 allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via a request containing crafted parameters.
|
||||
|
||||
### POC
|
||||
|
||||
#### Reference
|
||||
- http://www.coresecurity.com/content/HP-Data-Protector-multiple-vulnerabilities
|
||||
|
||||
#### Github
|
||||
No PoCs found on GitHub currently.
|
||||
|
17
2011/CVE-2011-1515.md
Normal file
17
2011/CVE-2011-1515.md
Normal file
@ -0,0 +1,17 @@
|
||||
### [CVE-2011-1515](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1515)
|
||||

|
||||

|
||||

|
||||
|
||||
### Description
|
||||
|
||||
The inet service in HP OpenView Storage Data Protector 6.00 through 6.20 allows remote attackers to cause a denial of service (daemon exit) via a request containing crafted parameters.
|
||||
|
||||
### POC
|
||||
|
||||
#### Reference
|
||||
- http://www.coresecurity.com/content/HP-Data-Protector-multiple-vulnerabilities
|
||||
|
||||
#### Github
|
||||
No PoCs found on GitHub currently.
|
||||
|
@ -11,6 +11,7 @@ Multiple stack-based buffer overflows in the inet service in HP OpenView Storage
|
||||
|
||||
#### Reference
|
||||
- http://securityreason.com/securityalert/8288
|
||||
- http://www.coresecurity.com/content/HP-Data-Protector-multiple-vulnerabilities
|
||||
- http://www.exploit-db.com/exploits/17458
|
||||
- http://www.exploit-db.com/exploits/17490
|
||||
|
||||
|
@ -11,6 +11,7 @@ Buffer overflow in omniinet.exe in the inet service in HP OpenView Storage Data
|
||||
|
||||
#### Reference
|
||||
- http://securityreason.com/securityalert/8289
|
||||
- http://www.coresecurity.com/content/HP-Data-Protector-EXECCMD-Vulnerability
|
||||
- http://www.exploit-db.com/exploits/17461
|
||||
|
||||
#### Github
|
||||
|
@ -17,6 +17,7 @@ NDISTAPI.sys in the NDISTAPI driver in Remote Access Service (RAS) in Microsoft
|
||||
- https://github.com/Al1ex/WindowsElevation
|
||||
- https://github.com/Ascotbe/Kernelhub
|
||||
- https://github.com/CVEDB/PoC-List
|
||||
- https://github.com/Cruxer8Mech/Idk
|
||||
- https://github.com/fei9747/WindowsElevation
|
||||
- https://github.com/lyshark/Windows-exploits
|
||||
- https://github.com/ycdxsb/WindowsPrivilegeEscalation
|
||||
|
@ -17,6 +17,7 @@ No PoCs from references.
|
||||
- https://github.com/Al1ex/WindowsElevation
|
||||
- https://github.com/Ascotbe/Kernelhub
|
||||
- https://github.com/BLACKHAT-SSG/EXP-401-OSEE
|
||||
- https://github.com/Cruxer8Mech/Idk
|
||||
- https://github.com/DotSight7/Cheatsheet
|
||||
- https://github.com/Ostorlab/KEV
|
||||
- https://github.com/Ostorlab/known_exploited_vulnerbilities_detectors
|
||||
|
@ -16,6 +16,7 @@ No PoCs from references.
|
||||
- https://github.com/ARPSyndicate/cvemon
|
||||
- https://github.com/Al1ex/WindowsElevation
|
||||
- https://github.com/Ascotbe/Kernelhub
|
||||
- https://github.com/Cruxer8Mech/Idk
|
||||
- https://github.com/Juba0x4355/Blue-THM
|
||||
- https://github.com/Juba0x4355/Blue-Writeup
|
||||
- https://github.com/TesterCC/exp_poc_library
|
||||
|
@ -55,6 +55,7 @@ No PoCs from references.
|
||||
- https://github.com/Snoopy-Sec/Localroot-ALL-CVE
|
||||
- https://github.com/T3b0g025/PWK-CheatSheet
|
||||
- https://github.com/Technoashofficial/kernel-exploitation-linux
|
||||
- https://github.com/ZTK-009/linux-kernel-exploits
|
||||
- https://github.com/akr3ch/OSCP-Survival-Guide
|
||||
- https://github.com/aktechnohacker/OSCP-Notes
|
||||
- https://github.com/albinjoshy03/linux-kernel-exploits
|
||||
|
@ -16,6 +16,7 @@ No PoCs from references.
|
||||
- https://github.com/ARPSyndicate/cvemon
|
||||
- https://github.com/CVEDB/PoC-List
|
||||
- https://github.com/CVEDB/awesome-cve-repo
|
||||
- https://github.com/Cruxer8Mech/Idk
|
||||
- https://github.com/Juba0x4355/Blue-THM
|
||||
- https://github.com/Juba0x4355/Blue-Writeup
|
||||
- https://github.com/anmolksachan/MS12-020
|
||||
|
@ -21,6 +21,7 @@ The x86-64 kernel system-call functionality in Xen 4.1.2 and earlier, as used in
|
||||
- https://github.com/Al1ex/Red-Team
|
||||
- https://github.com/Apri1y/Red-Team-links
|
||||
- https://github.com/Ascotbe/Kernelhub
|
||||
- https://github.com/Cruxer8Mech/Idk
|
||||
- https://github.com/Echocipher/Resource-list
|
||||
- https://github.com/Flerov/WindowsExploitDev
|
||||
- https://github.com/Ondrik8/RED-Team
|
||||
|
@ -29,6 +29,7 @@ libdbus 1.5.x and earlier, when used in setuid or other privileged programs in X
|
||||
- https://github.com/Shadowshusky/linux-kernel-exploits
|
||||
- https://github.com/Singlea-lyh/linux-kernel-exploits
|
||||
- https://github.com/Snoopy-Sec/Localroot-ALL-CVE
|
||||
- https://github.com/ZTK-009/linux-kernel-exploits
|
||||
- https://github.com/albinjoshy03/linux-kernel-exploits
|
||||
- https://github.com/alian87/linux-kernel-exploits
|
||||
- https://github.com/coffee727/linux-exp
|
||||
|
@ -17,6 +17,7 @@ win32k.sys in the kernel-mode drivers in Microsoft Windows Vista SP2, Windows Se
|
||||
- https://github.com/Al1ex/WindowsElevation
|
||||
- https://github.com/Ascotbe/Kernelhub
|
||||
- https://github.com/Crunchy0/Win_exploits
|
||||
- https://github.com/Cruxer8Mech/Idk
|
||||
- https://github.com/fei9747/WindowsElevation
|
||||
- https://github.com/nitishbadole/oscp-note-2
|
||||
- https://github.com/rmsbpro/rmsbpro
|
||||
|
@ -28,6 +28,7 @@ No PoCs from references.
|
||||
- https://github.com/Shadowshusky/linux-kernel-exploits
|
||||
- https://github.com/Singlea-lyh/linux-kernel-exploits
|
||||
- https://github.com/Snoopy-Sec/Localroot-ALL-CVE
|
||||
- https://github.com/ZTK-009/linux-kernel-exploits
|
||||
- https://github.com/albinjoshy03/linux-kernel-exploits
|
||||
- https://github.com/alian87/linux-kernel-exploits
|
||||
- https://github.com/coffee727/linux-exp
|
||||
|
@ -18,6 +18,7 @@ win32k.sys in the kernel-mode drivers in Microsoft Windows XP SP2 and SP3, Windo
|
||||
- https://github.com/Ascotbe/Kernelhub
|
||||
- https://github.com/CVEDB/PoC-List
|
||||
- https://github.com/CVEDB/awesome-cve-repo
|
||||
- https://github.com/Cruxer8Mech/Idk
|
||||
- https://github.com/JERRY123S/all-poc
|
||||
- https://github.com/Meatballs1/cve-2013-1300
|
||||
- https://github.com/cyberanand1337x/bug-bounty-2022
|
||||
|
@ -15,6 +15,7 @@ No PoCs from references.
|
||||
#### Github
|
||||
- https://github.com/Al1ex/WindowsElevation
|
||||
- https://github.com/Ascotbe/Kernelhub
|
||||
- https://github.com/Cruxer8Mech/Idk
|
||||
- https://github.com/fei9747/WindowsElevation
|
||||
- https://github.com/lyshark/Windows-exploits
|
||||
- https://github.com/ycdxsb/WindowsPrivilegeEscalation
|
||||
|
@ -14,6 +14,7 @@ win32k.sys in the kernel-mode drivers in Microsoft Windows XP SP2 and SP3, Windo
|
||||
|
||||
#### Github
|
||||
- https://github.com/Ascotbe/Kernelhub
|
||||
- https://github.com/Cruxer8Mech/Idk
|
||||
- https://github.com/lyshark/Windows-exploits
|
||||
- https://github.com/ycdxsb/WindowsPrivilegeEscalation
|
||||
|
||||
|
@ -32,6 +32,7 @@ Array index error in the __sock_diag_rcv_msg function in net/core/sock_diag.c in
|
||||
- https://github.com/Singlea-lyh/linux-kernel-exploits
|
||||
- https://github.com/Snoopy-Sec/Localroot-ALL-CVE
|
||||
- https://github.com/Technoashofficial/kernel-exploitation-linux
|
||||
- https://github.com/ZTK-009/linux-kernel-exploits
|
||||
- https://github.com/albinjoshy03/linux-kernel-exploits
|
||||
- https://github.com/alian87/linux-kernel-exploits
|
||||
- https://github.com/anoaghost/Localroot_Compile
|
||||
|
@ -28,6 +28,7 @@ The clone system-call implementation in the Linux kernel before 3.8.3 does not p
|
||||
- https://github.com/Shadowshusky/linux-kernel-exploits
|
||||
- https://github.com/Singlea-lyh/linux-kernel-exploits
|
||||
- https://github.com/Snoopy-Sec/Localroot-ALL-CVE
|
||||
- https://github.com/ZTK-009/linux-kernel-exploits
|
||||
- https://github.com/albinjoshy03/linux-kernel-exploits
|
||||
- https://github.com/alian87/linux-kernel-exploits
|
||||
- https://github.com/coffee727/linux-exp
|
||||
|
@ -45,6 +45,7 @@ The perf_swevent_init function in kernel/events/core.c in the Linux kernel befor
|
||||
- https://github.com/Singlea-lyh/linux-kernel-exploits
|
||||
- https://github.com/Snoopy-Sec/Localroot-ALL-CVE
|
||||
- https://github.com/Technoashofficial/kernel-exploitation-linux
|
||||
- https://github.com/ZTK-009/linux-kernel-exploits
|
||||
- https://github.com/albinjoshy03/linux-kernel-exploits
|
||||
- https://github.com/alian87/linux-kernel-exploits
|
||||
- https://github.com/amane312/Linux_menthor
|
||||
|
@ -15,6 +15,7 @@ NDProxy.sys in the kernel in Microsoft Windows XP SP2 and SP3 and Server 2003 SP
|
||||
#### Github
|
||||
- https://github.com/Al1ex/WindowsElevation
|
||||
- https://github.com/Ascotbe/Kernelhub
|
||||
- https://github.com/Cruxer8Mech/Idk
|
||||
- https://github.com/Friarfukd/RobbinHood
|
||||
- https://github.com/Ostorlab/KEV
|
||||
- https://github.com/Ostorlab/known_exploited_vulnerbilities_detectors
|
||||
|
@ -15,6 +15,7 @@ Directory traversal vulnerability in /res/I18nMsg,AjxMsg,ZMsg,ZmMsg,AjxKeys,ZmKe
|
||||
|
||||
#### Github
|
||||
- https://github.com/ARPSyndicate/kenzer-templates
|
||||
- https://github.com/ZTK-009/RedTeamer
|
||||
- https://github.com/fengjixuchui/RedTeamer
|
||||
- https://github.com/fnmsd/zimbra_poc
|
||||
- https://github.com/password520/RedTeamer
|
||||
|
@ -38,6 +38,7 @@ The compat_sys_recvmmsg function in net/compat.c in the Linux kernel before 3.13
|
||||
- https://github.com/Singlea-lyh/linux-kernel-exploits
|
||||
- https://github.com/Snoopy-Sec/Localroot-ALL-CVE
|
||||
- https://github.com/Technoashofficial/kernel-exploitation-linux
|
||||
- https://github.com/ZTK-009/linux-kernel-exploits
|
||||
- https://github.com/albinjoshy03/linux-kernel-exploits
|
||||
- https://github.com/alian87/linux-kernel-exploits
|
||||
- https://github.com/ambynotcoder/C-libraries
|
||||
|
@ -36,6 +36,7 @@ The n_tty_write function in drivers/tty/n_tty.c in the Linux kernel through 3.14
|
||||
- https://github.com/Snoopy-Sec/Localroot-ALL-CVE
|
||||
- https://github.com/SunRain/CVE-2014-0196
|
||||
- https://github.com/Technoashofficial/kernel-exploitation-linux
|
||||
- https://github.com/ZTK-009/linux-kernel-exploits
|
||||
- https://github.com/albinjoshy03/linux-kernel-exploits
|
||||
- https://github.com/alian87/linux-kernel-exploits
|
||||
- https://github.com/anoaghost/Localroot_Compile
|
||||
|
@ -16,6 +16,7 @@ Double free vulnerability in the Ancillary Function Driver (AFD) in afd.sys in t
|
||||
#### Github
|
||||
- https://github.com/Al1ex/WindowsElevation
|
||||
- https://github.com/Ascotbe/Kernelhub
|
||||
- https://github.com/Cruxer8Mech/Idk
|
||||
- https://github.com/ExploitCN/CVE-2014-1767-EXP-PAPER
|
||||
- https://github.com/LegendSaber/exp
|
||||
- https://github.com/ThunderJie/CVE
|
||||
|
@ -45,6 +45,7 @@ The default configuration in Elasticsearch before 1.2 enables dynamic scripting,
|
||||
- https://github.com/SexyBeast233/SecBooks
|
||||
- https://github.com/ToonyLoony/OpenVAS_Project
|
||||
- https://github.com/Z0fhack/Goby_POC
|
||||
- https://github.com/ZTK-009/RedTeamer
|
||||
- https://github.com/ahm3dhany/IDS-Evasion
|
||||
- https://github.com/akusilvennoinen/cybersecuritybase-project-2
|
||||
- https://github.com/amcai/myscan
|
||||
|
@ -43,6 +43,7 @@ No PoCs from references.
|
||||
- https://github.com/Singlea-lyh/linux-kernel-exploits
|
||||
- https://github.com/Snoopy-Sec/Localroot-ALL-CVE
|
||||
- https://github.com/Technoashofficial/kernel-exploitation-linux
|
||||
- https://github.com/ZTK-009/linux-kernel-exploits
|
||||
- https://github.com/albinjoshy03/linux-kernel-exploits
|
||||
- https://github.com/alian87/linux-kernel-exploits
|
||||
- https://github.com/ambynotcoder/C-libraries
|
||||
|
@ -30,6 +30,7 @@ The capabilities implementation in the Linux kernel before 3.14.8 does not prope
|
||||
- https://github.com/Singlea-lyh/linux-kernel-exploits
|
||||
- https://github.com/Snoopy-Sec/Localroot-ALL-CVE
|
||||
- https://github.com/Technoashofficial/kernel-exploitation-linux
|
||||
- https://github.com/ZTK-009/linux-kernel-exploits
|
||||
- https://github.com/albinjoshy03/linux-kernel-exploits
|
||||
- https://github.com/alian87/linux-kernel-exploits
|
||||
- https://github.com/anoaghost/Localroot_Compile
|
||||
|
@ -16,6 +16,7 @@ Microsoft Windows Server 2003 SP2 allows local users to gain privileges via a cr
|
||||
#### Github
|
||||
- https://github.com/Al1ex/WindowsElevation
|
||||
- https://github.com/Ascotbe/Kernelhub
|
||||
- https://github.com/Cruxer8Mech/Idk
|
||||
- https://github.com/fei9747/WindowsElevation
|
||||
- https://github.com/fungoshacks/CVE-2014-4076
|
||||
- https://github.com/lyshark/Windows-exploits
|
||||
|
@ -33,6 +33,7 @@ win32k.sys in the kernel-mode drivers in Microsoft Windows Server 2003 SP2, Wind
|
||||
- https://github.com/CVEDB/awesome-cve-repo
|
||||
- https://github.com/CVEDB/top
|
||||
- https://github.com/CrackerCat/Kernel-Security-Development
|
||||
- https://github.com/Cruxer8Mech/Idk
|
||||
- https://github.com/Echocipher/Resource-list
|
||||
- https://github.com/ExpLife0011/awesome-windows-kernel-security-development
|
||||
- https://github.com/FULLSHADE/WindowsExploitationResources
|
||||
|
@ -53,6 +53,7 @@ Unspecified vulnerability in the Oracle WebLogic Server component in Oracle Fusi
|
||||
- https://github.com/WingsSec/Meppo
|
||||
- https://github.com/Z0fhack/Goby_POC
|
||||
- https://github.com/ZH3FENG/Weblogic_SSRF
|
||||
- https://github.com/ZTK-009/RedTeamer
|
||||
- https://github.com/Zero094/Vulnerability-verification
|
||||
- https://github.com/assetnote/blind-ssrf-chains
|
||||
- https://github.com/asw3asw/SSRF
|
||||
|
@ -34,6 +34,7 @@ The Linux kernel before 3.15.4 on Intel processors does not properly restrict us
|
||||
- https://github.com/Singlea-lyh/linux-kernel-exploits
|
||||
- https://github.com/Snoopy-Sec/Localroot-ALL-CVE
|
||||
- https://github.com/Technoashofficial/kernel-exploitation-linux
|
||||
- https://github.com/ZTK-009/linux-kernel-exploits
|
||||
- https://github.com/albinjoshy03/linux-kernel-exploits
|
||||
- https://github.com/alian87/linux-kernel-exploits
|
||||
- https://github.com/anoaghost/Localroot_Compile
|
||||
|
Some files were not shown because too many files have changed in this diff Show More
Loading…
x
Reference in New Issue
Block a user