mirror of
https://github.com/0xMarcio/cve.git
synced 2025-05-06 02:31:38 +00:00
42 lines
1.8 KiB
Markdown
42 lines
1.8 KiB
Markdown
### [CVE-2023-0179](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0179)
|
|

|
|

|
|

|
|
|
|
### Description
|
|
|
|
A buffer overflow vulnerability was found in the Netfilter subsystem in the Linux Kernel. This issue could allow the leakage of both stack and heap addresses, and potentially allow Local Privilege Escalation to the root user via arbitrary code execution.
|
|
|
|
### POC
|
|
|
|
#### Reference
|
|
- http://packetstormsecurity.com/files/171601/Kernel-Live-Patch-Security-Notice-LNS-0093-1.html
|
|
- https://seclists.org/oss-sec/2023/q1/20
|
|
|
|
#### Github
|
|
- https://github.com/44maker/Linux-Privilege
|
|
- https://github.com/ARPSyndicate/cvemon
|
|
- https://github.com/Awrrays/Pentest-Tips
|
|
- https://github.com/CVEDB/awesome-cve-repo
|
|
- https://github.com/CVEDB/top
|
|
- https://github.com/EGI-Federation/SVG-advisories
|
|
- https://github.com/GhostTroops/TOP
|
|
- https://github.com/H4K6/CVE-2023-0179-PoC
|
|
- https://github.com/Mr-xn/Penetration_Testing_POC
|
|
- https://github.com/TurtleARM/CVE-2023-0179-PoC
|
|
- https://github.com/aneasystone/github-trending
|
|
- https://github.com/h0pe-ay/Vulnerability-Reproduction
|
|
- https://github.com/hktalent/TOP
|
|
- https://github.com/johe123qwe/github-trending
|
|
- https://github.com/k0mi-tg/CVE-POC
|
|
- https://github.com/lions2012/Penetration_Testing_POC
|
|
- https://github.com/manas3c/CVE-POC
|
|
- https://github.com/nomi-sec/PoC-in-GitHub
|
|
- https://github.com/taielab/awesome-hacking-lists
|
|
- https://github.com/tanjiti/sec_profile
|
|
- https://github.com/wechicken456/Linux-kernel
|
|
- https://github.com/whoforget/CVE-POC
|
|
- https://github.com/xairy/linux-kernel-exploitation
|
|
- https://github.com/youwizard/CVE-POC
|
|
|