Update CVE sources 2024-08-11 18:44

This commit is contained in:
0xMarcio
2024-08-11 18:44:53 +00:00
parent d527075578
commit 8654f5abb7
298 changed files with 1171 additions and 54 deletions
+1
View File
@@ -53,6 +53,7 @@ The do_mremap function for the mremap system call in Linux 2.2 to 2.2.25, 2.4 to
- https://github.com/knd06/linux-kernel-exploitation
- https://github.com/kumardineshwar/linux-kernel-exploits
- https://github.com/m0mkris/linux-kernel-exploits
- https://github.com/ndk06/linux-kernel-exploitation
- https://github.com/ndk191/linux-kernel-exploitation
- https://github.com/ozkanbilge/Linux-Kernel-Exploits
- https://github.com/p00h00/linux-exploits
+1
View File
@@ -24,6 +24,7 @@ The IA32 system call emulation functionality in Linux kernel 2.4.x and 2.6.x bef
- https://github.com/khanhhdz06/linux-kernel-exploitation
- https://github.com/khanhnd123/linux-kernel-exploitation
- https://github.com/knd06/linux-kernel-exploitation
- https://github.com/ndk06/linux-kernel-exploitation
- https://github.com/ndk191/linux-kernel-exploitation
- https://github.com/skbasava/Linux-Kernel-exploit
- https://github.com/ssr-111/linux-kernel-exploitation
+1
View File
@@ -10,6 +10,7 @@ The SNMP agent (snmp_agent.c) in net-snmp before 5.4.1 allows remote attackers t
### POC
#### Reference
- http://www.ubuntu.com/usn/usn-564-1
- https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA43730
#### Github
+1
View File
@@ -24,6 +24,7 @@ No PoCs from references.
- https://github.com/khanhhdz06/linux-kernel-exploitation
- https://github.com/khanhnd123/linux-kernel-exploitation
- https://github.com/knd06/linux-kernel-exploitation
- https://github.com/ndk06/linux-kernel-exploitation
- https://github.com/ndk191/linux-kernel-exploitation
- https://github.com/skbasava/Linux-Kernel-exploit
- https://github.com/ssr-111/linux-kernel-exploitation
+1
View File
@@ -24,6 +24,7 @@ The copy_from_user_mmap_sem function in fs/splice.c in the Linux kernel 2.6.22 t
- https://github.com/khanhhdz06/linux-kernel-exploitation
- https://github.com/khanhnd123/linux-kernel-exploitation
- https://github.com/knd06/linux-kernel-exploitation
- https://github.com/ndk06/linux-kernel-exploitation
- https://github.com/ndk191/linux-kernel-exploitation
- https://github.com/skbasava/Linux-Kernel-exploit
- https://github.com/ssr-111/linux-kernel-exploitation
+1
View File
@@ -51,6 +51,7 @@ The vmsplice_to_pipe function in Linux kernel 2.6.17 through 2.6.24.1 does not v
- https://github.com/knd06/linux-kernel-exploitation
- https://github.com/kumardineshwar/linux-kernel-exploits
- https://github.com/m0mkris/linux-kernel-exploits
- https://github.com/ndk06/linux-kernel-exploitation
- https://github.com/ndk191/linux-kernel-exploitation
- https://github.com/ozkanbilge/Linux-Kernel-Exploits
- https://github.com/p00h00/linux-exploits
+1
View File
@@ -24,6 +24,7 @@ No PoCs from references.
- https://github.com/khanhhdz06/linux-kernel-exploitation
- https://github.com/khanhnd123/linux-kernel-exploitation
- https://github.com/knd06/linux-kernel-exploitation
- https://github.com/ndk06/linux-kernel-exploitation
- https://github.com/ndk191/linux-kernel-exploitation
- https://github.com/skbasava/Linux-Kernel-exploit
- https://github.com/ssr-111/linux-kernel-exploitation
+1
View File
@@ -24,6 +24,7 @@ No PoCs from references.
- https://github.com/khanhhdz06/linux-kernel-exploitation
- https://github.com/khanhnd123/linux-kernel-exploitation
- https://github.com/knd06/linux-kernel-exploitation
- https://github.com/ndk06/linux-kernel-exploitation
- https://github.com/ndk191/linux-kernel-exploitation
- https://github.com/skbasava/Linux-Kernel-exploit
- https://github.com/ssr-111/linux-kernel-exploitation
+1
View File
@@ -59,6 +59,7 @@ The Linux kernel 2.6.0 through 2.6.30.4, and 2.4.4 through 2.4.37.4, does not in
- https://github.com/kumardineshwar/linux-kernel-exploits
- https://github.com/m0mkris/linux-kernel-exploits
- https://github.com/moshekaplan/pentesting_notes
- https://github.com/ndk06/linux-kernel-exploitation
- https://github.com/ndk191/linux-kernel-exploitation
- https://github.com/ozkanbilge/Linux-Kernel-Exploits
- https://github.com/p00h00/linux-exploits
+1
View File
@@ -24,6 +24,7 @@ No PoCs from references.
- https://github.com/khanhhdz06/linux-kernel-exploitation
- https://github.com/khanhnd123/linux-kernel-exploitation
- https://github.com/knd06/linux-kernel-exploitation
- https://github.com/ndk06/linux-kernel-exploitation
- https://github.com/ndk191/linux-kernel-exploitation
- https://github.com/skbasava/Linux-Kernel-exploit
- https://github.com/ssr-111/linux-kernel-exploitation
+1
View File
@@ -24,6 +24,7 @@ No PoCs from references.
- https://github.com/khanhhdz06/linux-kernel-exploitation
- https://github.com/khanhnd123/linux-kernel-exploitation
- https://github.com/knd06/linux-kernel-exploitation
- https://github.com/ndk06/linux-kernel-exploitation
- https://github.com/ndk191/linux-kernel-exploitation
- https://github.com/skbasava/Linux-Kernel-exploit
- https://github.com/ssr-111/linux-kernel-exploitation
+1
View File
@@ -24,6 +24,7 @@ The do_anonymous_page function in mm/memory.c in the Linux kernel before 2.6.27.
- https://github.com/khanhhdz06/linux-kernel-exploitation
- https://github.com/khanhnd123/linux-kernel-exploitation
- https://github.com/knd06/linux-kernel-exploitation
- https://github.com/ndk06/linux-kernel-exploitation
- https://github.com/ndk191/linux-kernel-exploitation
- https://github.com/ssr-111/linux-kernel-exploitation
- https://github.com/wkhnh06/linux-kernel-exploitation
+1
View File
@@ -84,6 +84,7 @@ No PoCs from references.
- https://github.com/mmt55/kalilinux
- https://github.com/monkeysm8/OSCP_HELP
- https://github.com/mudongliang/LinuxFlaw
- https://github.com/ndk06/linux-kernel-exploitation
- https://github.com/ndk191/linux-kernel-exploitation
- https://github.com/nitishbadole/hacking_30
- https://github.com/oneoy/cve-
+1
View File
@@ -24,6 +24,7 @@ drivers/media/video/v4l2-compat-ioctl32.c in the Video4Linux (V4L) implementatio
- https://github.com/khanhhdz06/linux-kernel-exploitation
- https://github.com/khanhnd123/linux-kernel-exploitation
- https://github.com/knd06/linux-kernel-exploitation
- https://github.com/ndk06/linux-kernel-exploitation
- https://github.com/ndk191/linux-kernel-exploitation
- https://github.com/skbasava/Linux-Kernel-exploit
- https://github.com/ssr-111/linux-kernel-exploitation
+1
View File
@@ -55,6 +55,7 @@ The compat_alloc_user_space functions in include/asm/compat.h files in the Linux
- https://github.com/knd06/linux-kernel-exploitation
- https://github.com/kumardineshwar/linux-kernel-exploits
- https://github.com/m0mkris/linux-kernel-exploits
- https://github.com/ndk06/linux-kernel-exploitation
- https://github.com/ndk191/linux-kernel-exploitation
- https://github.com/ozkanbilge/Linux-Kernel-Exploits
- https://github.com/p00h00/linux-exploits
+1
View File
@@ -54,6 +54,7 @@ The IA32 system call emulation functionality in arch/x86/ia32/ia32entry.S in the
- https://github.com/knd06/linux-kernel-exploitation
- https://github.com/kumardineshwar/linux-kernel-exploits
- https://github.com/m0mkris/linux-kernel-exploits
- https://github.com/ndk06/linux-kernel-exploitation
- https://github.com/ndk191/linux-kernel-exploitation
- https://github.com/ozkanbilge/Linux-Kernel-Exploits
- https://github.com/p00h00/linux-exploits
+1
View File
@@ -52,6 +52,7 @@ Integer signedness error in the pkt_find_dev_from_minor function in drivers/bloc
- https://github.com/knd06/linux-kernel-exploitation
- https://github.com/kumardineshwar/linux-kernel-exploits
- https://github.com/m0mkris/linux-kernel-exploits
- https://github.com/ndk06/linux-kernel-exploitation
- https://github.com/ndk191/linux-kernel-exploitation
- https://github.com/ozkanbilge/Linux-Kernel-Exploits
- https://github.com/p00h00/linux-exploits
+1
View File
@@ -57,6 +57,7 @@ The do_exit function in kernel/exit.c in the Linux kernel before 2.6.36.2 does n
- https://github.com/knd06/linux-kernel-exploitation
- https://github.com/kumardineshwar/linux-kernel-exploits
- https://github.com/m0mkris/linux-kernel-exploits
- https://github.com/ndk06/linux-kernel-exploitation
- https://github.com/ndk191/linux-kernel-exploitation
- https://github.com/ozkanbilge/Linux-Kernel-Exploits
- https://github.com/p00h00/linux-exploits
+1
View File
@@ -24,6 +24,7 @@ No PoCs from references.
- https://github.com/khanhhdz06/linux-kernel-exploitation
- https://github.com/khanhnd123/linux-kernel-exploitation
- https://github.com/knd06/linux-kernel-exploitation
- https://github.com/ndk06/linux-kernel-exploitation
- https://github.com/ndk191/linux-kernel-exploitation
- https://github.com/skbasava/Linux-Kernel-exploit
- https://github.com/ssr-111/linux-kernel-exploitation
+1
View File
@@ -114,6 +114,7 @@ No PoCs from references.
- https://github.com/mjutsu/OSCP
- https://github.com/mmt55/kalilinux
- https://github.com/monkeysm8/OSCP_HELP
- https://github.com/ndk06/linux-kernel-exploitation
- https://github.com/ndk191/linux-kernel-exploitation
- https://github.com/nitishbadole/hacking_30
- https://github.com/nmvuonginfosec/linux
+17
View File
@@ -0,0 +1,17 @@
### [CVE-2013-10024](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-10024)
![](https://img.shields.io/static/v1?label=Product&message=Exit%20Strategy%20Plugin&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=%3D%201.55%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-200%20Information%20Disclosure&color=brighgreen)
### Description
A vulnerability has been found in Exit Strategy Plugin 1.55 on WordPress and classified as problematic. Affected by this vulnerability is an unknown functionality of the file exitpage.php. The manipulation leads to information disclosure. The attack can be launched remotely. Upgrading to version 1.59 is able to address this issue. The identifier of the patch is d964b8e961b2634158719f3328f16eda16ce93ac. It is recommended to upgrade the affected component. The identifier VDB-225265 was assigned to this vulnerability.
### POC
#### Reference
No PoCs from references.
#### Github
- https://github.com/20142995/nuclei-templates
+1
View File
@@ -55,6 +55,7 @@ Array index error in the __sock_diag_rcv_msg function in net/core/sock_diag.c in
- https://github.com/knd06/linux-kernel-exploitation
- https://github.com/kumardineshwar/linux-kernel-exploits
- https://github.com/m0mkris/linux-kernel-exploits
- https://github.com/ndk06/linux-kernel-exploitation
- https://github.com/ndk191/linux-kernel-exploitation
- https://github.com/ozkanbilge/Linux-Kernel-Exploits
- https://github.com/password520/linux-kernel-exploits
+1
View File
@@ -80,6 +80,7 @@ The perf_swevent_init function in kernel/events/core.c in the Linux kernel befor
- https://github.com/lushtree-cn-honeyzhao/awesome-c
- https://github.com/m0mkris/linux-kernel-exploits
- https://github.com/maririn312/Linux_menthor
- https://github.com/ndk06/linux-kernel-exploitation
- https://github.com/ndk191/linux-kernel-exploitation
- https://github.com/nmvuonginfosec/linux
- https://github.com/ozkanbilge/Linux-Kernel-Exploits
+1
View File
@@ -67,6 +67,7 @@ The compat_sys_recvmmsg function in net/compat.c in the Linux kernel before 3.13
- https://github.com/kumardineshwar/linux-kernel-exploits
- https://github.com/lushtree-cn-honeyzhao/awesome-c
- https://github.com/m0mkris/linux-kernel-exploits
- https://github.com/ndk06/linux-kernel-exploitation
- https://github.com/ndk191/linux-kernel-exploitation
- https://github.com/ozkanbilge/Linux-Kernel-Exploits
- https://github.com/p00h00/linux-exploits
+1
View File
@@ -61,6 +61,7 @@ The n_tty_write function in drivers/tty/n_tty.c in the Linux kernel through 3.14
- https://github.com/knd06/linux-kernel-exploitation
- https://github.com/kumardineshwar/linux-kernel-exploits
- https://github.com/m0mkris/linux-kernel-exploits
- https://github.com/ndk06/linux-kernel-exploitation
- https://github.com/ndk191/linux-kernel-exploitation
- https://github.com/ozkanbilge/Linux-Kernel-Exploits
- https://github.com/p00h00/linux-exploits
+1
View File
@@ -25,6 +25,7 @@ No PoCs from references.
- https://github.com/khanhnd123/linux-kernel-exploitation
- https://github.com/knd06/linux-kernel-exploitation
- https://github.com/mudongliang/LinuxFlaw
- https://github.com/ndk06/linux-kernel-exploitation
- https://github.com/ndk191/linux-kernel-exploitation
- https://github.com/oneoy/cve-
- https://github.com/skbasava/Linux-Kernel-exploit
+1
View File
@@ -82,6 +82,7 @@ No PoCs from references.
- https://github.com/lieanu/CVE-2014-3153
- https://github.com/lushtree-cn-honeyzhao/awesome-c
- https://github.com/m0mkris/linux-kernel-exploits
- https://github.com/ndk06/linux-kernel-exploitation
- https://github.com/ndk191/linux-kernel-exploitation
- https://github.com/ozkanbilge/Linux-Kernel-Exploits
- https://github.com/password520/linux-kernel-exploits
+1
View File
@@ -53,6 +53,7 @@ The capabilities implementation in the Linux kernel before 3.14.8 does not prope
- https://github.com/knd06/linux-kernel-exploitation
- https://github.com/kumardineshwar/linux-kernel-exploits
- https://github.com/m0mkris/linux-kernel-exploits
- https://github.com/ndk06/linux-kernel-exploitation
- https://github.com/ndk191/linux-kernel-exploitation
- https://github.com/ozkanbilge/Linux-Kernel-Exploits
- https://github.com/password520/linux-kernel-exploits
+1
View File
@@ -40,6 +40,7 @@ No PoCs from references.
- https://github.com/koozxcv/CVE-2014-7911-CVE-2014-4322_get_root_privilege
- https://github.com/laginimaineb/cve-2014-4322
- https://github.com/lushtree-cn-honeyzhao/awesome-c
- https://github.com/ndk06/linux-kernel-exploitation
- https://github.com/ndk191/linux-kernel-exploitation
- https://github.com/retme7/CVE-2014-4322_poc
- https://github.com/retme7/CVE-2014-7911_poc
+1
View File
@@ -59,6 +59,7 @@ The Linux kernel before 3.15.4 on Intel processors does not properly restrict us
- https://github.com/kumardineshwar/linux-kernel-exploits
- https://github.com/m0mkris/linux-kernel-exploits
- https://github.com/msecrist-couchbase/smallcb-training-capella
- https://github.com/ndk06/linux-kernel-exploitation
- https://github.com/ndk191/linux-kernel-exploitation
- https://github.com/ozkanbilge/Linux-Kernel-Exploits
- https://github.com/password520/linux-kernel-exploits
+1
View File
@@ -24,6 +24,7 @@ The PPPoL2TP feature in net/l2tp/l2tp_ppp.c in the Linux kernel through 3.15.6 a
- https://github.com/khanhhdz06/linux-kernel-exploitation
- https://github.com/khanhnd123/linux-kernel-exploitation
- https://github.com/knd06/linux-kernel-exploitation
- https://github.com/ndk06/linux-kernel-exploitation
- https://github.com/ndk191/linux-kernel-exploitation
- https://github.com/redes-2015/l2tp-socket-bug
- https://github.com/skbasava/Linux-Kernel-exploit
+1
View File
@@ -31,6 +31,7 @@ arch/x86/kernel/entry_64.S in the Linux kernel before 3.17.5 does not properly h
- https://github.com/khanhhdz06/linux-kernel-exploitation
- https://github.com/khanhnd123/linux-kernel-exploitation
- https://github.com/knd06/linux-kernel-exploitation
- https://github.com/ndk06/linux-kernel-exploitation
- https://github.com/ndk191/linux-kernel-exploitation
- https://github.com/paulveillard/cybersecurity-exploit-development
- https://github.com/skbasava/Linux-Kernel-exploit
+1
View File
@@ -23,6 +23,7 @@ No PoCs from references.
- https://github.com/khanhhdz06/linux-kernel-exploitation
- https://github.com/khanhnd123/linux-kernel-exploitation
- https://github.com/knd06/linux-kernel-exploitation
- https://github.com/ndk06/linux-kernel-exploitation
- https://github.com/ndk191/linux-kernel-exploitation
- https://github.com/ssr-111/linux-kernel-exploitation
- https://github.com/wkhnh06/linux-kernel-exploitation
+1
View File
@@ -24,6 +24,7 @@ No PoCs from references.
- https://github.com/khanhhdz06/linux-kernel-exploitation
- https://github.com/khanhnd123/linux-kernel-exploitation
- https://github.com/knd06/linux-kernel-exploitation
- https://github.com/ndk06/linux-kernel-exploitation
- https://github.com/ndk191/linux-kernel-exploitation
- https://github.com/skbasava/Linux-Kernel-exploit
- https://github.com/ssr-111/linux-kernel-exploitation
+1
View File
@@ -41,6 +41,7 @@ The (1) pipe_read and (2) pipe_write implementations in fs/pipe.c in the Linux k
- https://github.com/knd06/linux-kernel-exploitation
- https://github.com/makaitoushi/iovyroot_kyv37
- https://github.com/mobilelinux/iovy_root_research
- https://github.com/ndk06/linux-kernel-exploitation
- https://github.com/ndk191/linux-kernel-exploitation
- https://github.com/panyu6325/CVE-2015-1805
- https://github.com/skbasava/Linux-Kernel-exploit
+1
View File
@@ -43,6 +43,7 @@ The ping_unhash function in net/ipv4/ping.c in the Linux kernel before 4.0.3 doe
- https://github.com/khanhnd123/linux-kernel-exploitation
- https://github.com/knd06/linux-kernel-exploitation
- https://github.com/ludongxu/cve-2015-3636
- https://github.com/ndk06/linux-kernel-exploitation
- https://github.com/ndk191/linux-kernel-exploitation
- https://github.com/ne2der/AKLab
- https://github.com/skbasava/Linux-Kernel-exploit
+1
View File
@@ -74,6 +74,7 @@ The join_session_keyring function in security/keys/process_keys.c in the Linux k
- https://github.com/mfer/cve_2016_0728
- https://github.com/mudongliang/LinuxFlaw
- https://github.com/nardholio/cve-2016-0728
- https://github.com/ndk06/linux-kernel-exploitation
- https://github.com/ndk191/linux-kernel-exploitation
- https://github.com/neuschaefer/cve-2016-0728-testbed
- https://github.com/oneoy/cve-
+1
View File
@@ -24,6 +24,7 @@ No PoCs from references.
- https://github.com/khanhhdz06/linux-kernel-exploitation
- https://github.com/khanhnd123/linux-kernel-exploitation
- https://github.com/knd06/linux-kernel-exploitation
- https://github.com/ndk06/linux-kernel-exploitation
- https://github.com/ndk191/linux-kernel-exploitation
- https://github.com/skbasava/Linux-Kernel-exploit
- https://github.com/ssr-111/linux-kernel-exploitation
+1
View File
@@ -24,6 +24,7 @@ No PoCs from references.
- https://github.com/khanhhdz06/linux-kernel-exploitation
- https://github.com/khanhnd123/linux-kernel-exploitation
- https://github.com/knd06/linux-kernel-exploitation
- https://github.com/ndk06/linux-kernel-exploitation
- https://github.com/ndk191/linux-kernel-exploitation
- https://github.com/skbasava/Linux-Kernel-exploit
- https://github.com/ssr-111/linux-kernel-exploitation
+1
View File
@@ -29,6 +29,7 @@ An elevation of privilege vulnerability in the Motorola bootloader could enable
- https://github.com/knd06/linux-kernel-exploitation
- https://github.com/leosol/initroot
- https://github.com/lnick2023/nicenice
- https://github.com/ndk06/linux-kernel-exploitation
- https://github.com/ndk191/linux-kernel-exploitation
- https://github.com/qazbnm456/awesome-cve-poc
- https://github.com/ssr-111/linux-kernel-exploitation
+17
View File
@@ -0,0 +1,17 @@
### [CVE-2016-15027](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-15027)
![](https://img.shields.io/static/v1?label=Product&message=Post%20Duplicator%20Plugin&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=%3D%202.18%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-79%20Cross%20Site%20Scripting&color=brighgreen)
### Description
A vulnerability was found in meta4creations Post Duplicator Plugin 2.18 on WordPress. It has been classified as problematic. Affected is the function mtphr_post_duplicator_notice of the file includes/notices.php. The manipulation of the argument post-duplicated leads to cross site scripting. It is possible to launch the attack remotely. Upgrading to version 2.19 is able to address this issue. The name of the patch is ca67c05e490c0cf93a1e9b2d93bfeff3dd96f594. It is recommended to upgrade the affected component. The identifier of this vulnerability is VDB-221496.
### POC
#### Reference
No PoCs from references.
#### Github
- https://github.com/20142995/nuclei-templates
+1
View File
@@ -29,6 +29,7 @@ The ecryptfs_privileged_open function in fs/ecryptfs/kthread.c in the Linux kern
- https://github.com/khanhhdz06/linux-kernel-exploitation
- https://github.com/khanhnd123/linux-kernel-exploitation
- https://github.com/knd06/linux-kernel-exploitation
- https://github.com/ndk06/linux-kernel-exploitation
- https://github.com/ndk191/linux-kernel-exploitation
- https://github.com/skbasava/Linux-Kernel-exploit
- https://github.com/ssr-111/linux-kernel-exploitation
+1
View File
@@ -22,6 +22,7 @@ No PoCs from references.
- https://github.com/khanhhdz06/linux-kernel-exploitation
- https://github.com/khanhnd123/linux-kernel-exploitation
- https://github.com/knd06/linux-kernel-exploitation
- https://github.com/ndk06/linux-kernel-exploitation
- https://github.com/ndk191/linux-kernel-exploitation
- https://github.com/ssr-111/linux-kernel-exploitation
- https://github.com/wkhnh06/linux-kernel-exploitation
+1
View File
@@ -59,6 +59,7 @@ Double free vulnerability in the snd_usbmidi_create function in sound/usb/midi.c
- https://github.com/kumardineshwar/linux-kernel-exploits
- https://github.com/lnick2023/nicenice
- https://github.com/m0mkris/linux-kernel-exploits
- https://github.com/ndk06/linux-kernel-exploitation
- https://github.com/ndk191/linux-kernel-exploitation
- https://github.com/ozkanbilge/Linux-Kernel-Exploits
- https://github.com/password520/linux-kernel-exploits
+1
View File
@@ -25,6 +25,7 @@ No PoCs from references.
- https://github.com/khanhhdz06/linux-kernel-exploitation
- https://github.com/khanhnd123/linux-kernel-exploitation
- https://github.com/knd06/linux-kernel-exploitation
- https://github.com/ndk06/linux-kernel-exploitation
- https://github.com/ndk191/linux-kernel-exploitation
- https://github.com/skbasava/Linux-Kernel-exploit
- https://github.com/ssr-111/linux-kernel-exploitation
+1
View File
@@ -37,6 +37,7 @@ No PoCs from references.
- https://github.com/khanhnd123/linux-kernel-exploitation
- https://github.com/knd06/linux-kernel-exploitation
- https://github.com/likescam/exploit_playground_lists_androidCVE
- https://github.com/ndk06/linux-kernel-exploitation
- https://github.com/ndk191/linux-kernel-exploitation
- https://github.com/skbasava/Linux-Kernel-exploit
- https://github.com/ssr-111/linux-kernel-exploitation
+1
View File
@@ -25,6 +25,7 @@ No PoCs from references.
- https://github.com/khanhhdz06/linux-kernel-exploitation
- https://github.com/khanhnd123/linux-kernel-exploitation
- https://github.com/knd06/linux-kernel-exploitation
- https://github.com/ndk06/linux-kernel-exploitation
- https://github.com/ndk191/linux-kernel-exploitation
- https://github.com/skbasava/Linux-Kernel-exploit
- https://github.com/ssr-111/linux-kernel-exploitation
+1
View File
@@ -24,6 +24,7 @@ No PoCs from references.
- https://github.com/khanhhdz06/linux-kernel-exploitation
- https://github.com/khanhnd123/linux-kernel-exploitation
- https://github.com/knd06/linux-kernel-exploitation
- https://github.com/ndk06/linux-kernel-exploitation
- https://github.com/ndk191/linux-kernel-exploitation
- https://github.com/skbasava/Linux-Kernel-exploit
- https://github.com/ssr-111/linux-kernel-exploitation
+1
View File
@@ -22,6 +22,7 @@ No PoCs from references.
- https://github.com/khanhhdz06/linux-kernel-exploitation
- https://github.com/khanhnd123/linux-kernel-exploitation
- https://github.com/knd06/linux-kernel-exploitation
- https://github.com/ndk06/linux-kernel-exploitation
- https://github.com/ndk191/linux-kernel-exploitation
- https://github.com/ssr-111/linux-kernel-exploitation
- https://github.com/wkhnh06/linux-kernel-exploitation
+1
View File
@@ -25,6 +25,7 @@ No PoCs from references.
- https://github.com/khanhhdz06/linux-kernel-exploitation
- https://github.com/khanhnd123/linux-kernel-exploitation
- https://github.com/knd06/linux-kernel-exploitation
- https://github.com/ndk06/linux-kernel-exploitation
- https://github.com/ndk191/linux-kernel-exploitation
- https://github.com/skbasava/Linux-Kernel-exploit
- https://github.com/ssr-111/linux-kernel-exploitation
+1
View File
@@ -24,6 +24,7 @@ No PoCs from references.
- https://github.com/khanhhdz06/linux-kernel-exploitation
- https://github.com/khanhnd123/linux-kernel-exploitation
- https://github.com/knd06/linux-kernel-exploitation
- https://github.com/ndk06/linux-kernel-exploitation
- https://github.com/ndk191/linux-kernel-exploitation
- https://github.com/skbasava/Linux-Kernel-exploit
- https://github.com/ssr-111/linux-kernel-exploitation
+1
View File
@@ -316,6 +316,7 @@ Race condition in mm/gup.c in the Linux kernel 2.x through 4.x before 4.8.3 allo
- https://github.com/monkeysm8/OSCP_HELP
- https://github.com/naftalyava/DirtyCow-Exploit
- https://github.com/nazgul6092/2nd-Year-Project-01-Linux-Exploitation-using-CVE-20166-5195
- https://github.com/ndk06/linux-kernel-exploitation
- https://github.com/ndk191/linux-kernel-exploitation
- https://github.com/ndobson/inspec_CVE-2016-5195
- https://github.com/ne2der/AKLab
+1
View File
@@ -22,6 +22,7 @@ No PoCs from references.
- https://github.com/khanhhdz06/linux-kernel-exploitation
- https://github.com/khanhnd123/linux-kernel-exploitation
- https://github.com/knd06/linux-kernel-exploitation
- https://github.com/ndk06/linux-kernel-exploitation
- https://github.com/ndk191/linux-kernel-exploitation
- https://github.com/ssr-111/linux-kernel-exploitation
- https://github.com/wkhnh06/linux-kernel-exploitation
+1
View File
@@ -25,6 +25,7 @@ No PoCs from references.
- https://github.com/khanhnd123/linux-kernel-exploitation
- https://github.com/knd06/linux-kernel-exploitation
- https://github.com/mudongliang/LinuxFlaw
- https://github.com/ndk06/linux-kernel-exploitation
- https://github.com/ndk191/linux-kernel-exploitation
- https://github.com/oneoy/cve-
- https://github.com/ostrichxyz7/kexps
+1
View File
@@ -25,6 +25,7 @@ No PoCs from references.
- https://github.com/khanhnd123/linux-kernel-exploitation
- https://github.com/knd06/linux-kernel-exploitation
- https://github.com/lnick2023/nicenice
- https://github.com/ndk06/linux-kernel-exploitation
- https://github.com/ndk191/linux-kernel-exploitation
- https://github.com/qazbnm456/awesome-cve-poc
- https://github.com/ssr-111/linux-kernel-exploitation
+1
View File
@@ -24,6 +24,7 @@ No PoCs from references.
- https://github.com/khanhhdz06/linux-kernel-exploitation
- https://github.com/khanhnd123/linux-kernel-exploitation
- https://github.com/knd06/linux-kernel-exploitation
- https://github.com/ndk06/linux-kernel-exploitation
- https://github.com/ndk191/linux-kernel-exploitation
- https://github.com/skbasava/Linux-Kernel-exploit
- https://github.com/ssr-111/linux-kernel-exploitation
+1
View File
@@ -24,6 +24,7 @@ No PoCs from references.
- https://github.com/khanhhdz06/linux-kernel-exploitation
- https://github.com/khanhnd123/linux-kernel-exploitation
- https://github.com/knd06/linux-kernel-exploitation
- https://github.com/ndk06/linux-kernel-exploitation
- https://github.com/ndk191/linux-kernel-exploitation
- https://github.com/skbasava/Linux-Kernel-exploit
- https://github.com/ssr-111/linux-kernel-exploitation
+1
View File
@@ -24,6 +24,7 @@ No PoCs from references.
- https://github.com/khanhhdz06/linux-kernel-exploitation
- https://github.com/khanhnd123/linux-kernel-exploitation
- https://github.com/knd06/linux-kernel-exploitation
- https://github.com/ndk06/linux-kernel-exploitation
- https://github.com/ndk191/linux-kernel-exploitation
- https://github.com/skbasava/Linux-Kernel-exploit
- https://github.com/ssr-111/linux-kernel-exploitation
+1
View File
@@ -58,6 +58,7 @@ Race condition in net/packet/af_packet.c in the Linux kernel through 4.8.12 allo
- https://github.com/mudongliang/LinuxFlaw
- https://github.com/mzet-/linux-exploit-suggester
- https://github.com/n3t1nv4d3/kernel-exploits
- https://github.com/ndk06/linux-kernel-exploitation
- https://github.com/ndk191/linux-kernel-exploitation
- https://github.com/oneoy/cve-
- https://github.com/ostrichxyz7/kexps
+1
View File
@@ -24,6 +24,7 @@ No PoCs from references.
- https://github.com/khanhhdz06/linux-kernel-exploitation
- https://github.com/khanhnd123/linux-kernel-exploitation
- https://github.com/knd06/linux-kernel-exploitation
- https://github.com/ndk06/linux-kernel-exploitation
- https://github.com/ndk191/linux-kernel-exploitation
- https://github.com/ssr-111/linux-kernel-exploitation
- https://github.com/wkhnh06/linux-kernel-exploitation
+1
View File
@@ -23,6 +23,7 @@ No PoCs from references.
- https://github.com/khanhhdz06/linux-kernel-exploitation
- https://github.com/khanhnd123/linux-kernel-exploitation
- https://github.com/knd06/linux-kernel-exploitation
- https://github.com/ndk06/linux-kernel-exploitation
- https://github.com/ndk191/linux-kernel-exploitation
- https://github.com/ssr-111/linux-kernel-exploitation
- https://github.com/wkhnh06/linux-kernel-exploitation
+1
View File
@@ -22,6 +22,7 @@ An elevation of privilege vulnerability in the Broadcom Wi-Fi driver could enabl
- https://github.com/khanhhdz06/linux-kernel-exploitation
- https://github.com/khanhnd123/linux-kernel-exploitation
- https://github.com/knd06/linux-kernel-exploitation
- https://github.com/ndk06/linux-kernel-exploitation
- https://github.com/ndk191/linux-kernel-exploitation
- https://github.com/ssr-111/linux-kernel-exploitation
- https://github.com/wkhnh06/linux-kernel-exploitation
+1
View File
@@ -81,6 +81,7 @@ Linux kernel: Exploitable memory corruption due to UFO to non-UFO path switch. W
- https://github.com/milabs/lkrg-bypass
- https://github.com/mzet-/linux-exploit-suggester
- https://github.com/n3t1nv4d3/kernel-exploits
- https://github.com/ndk06/linux-kernel-exploitation
- https://github.com/ndk191/linux-kernel-exploitation
- https://github.com/nikaiw/rump
- https://github.com/nmvuonginfosec/linux
+1
View File
@@ -44,6 +44,7 @@ The native Bluetooth stack in the Linux Kernel (BlueZ), starting at the Linux ke
- https://github.com/lnick2023/nicenice
- https://github.com/marcinguy/blueborne-CVE-2017-1000251
- https://github.com/marcinguy/kernel-exploitation
- https://github.com/ndk06/linux-kernel-exploitation
- https://github.com/ndk191/linux-kernel-exploitation
- https://github.com/own2pwn/blueborne-CVE-2017-1000251-POC
- https://github.com/qazbnm456/awesome-cve-poc
+1
View File
@@ -24,6 +24,7 @@ No PoCs from references.
- https://github.com/khanhhdz06/linux-kernel-exploitation
- https://github.com/khanhnd123/linux-kernel-exploitation
- https://github.com/knd06/linux-kernel-exploitation
- https://github.com/ndk06/linux-kernel-exploitation
- https://github.com/ndk191/linux-kernel-exploitation
- https://github.com/ssr-111/linux-kernel-exploitation
- https://github.com/wkhnh06/linux-kernel-exploitation
+1
View File
@@ -25,6 +25,7 @@ sound/core/timer.c in the Linux kernel before 4.11.5 is vulnerable to a data rac
- https://github.com/khanhhdz06/linux-kernel-exploitation
- https://github.com/khanhnd123/linux-kernel-exploitation
- https://github.com/knd06/linux-kernel-exploitation
- https://github.com/ndk06/linux-kernel-exploitation
- https://github.com/ndk191/linux-kernel-exploitation
- https://github.com/ssr-111/linux-kernel-exploitation
- https://github.com/wkhnh06/linux-kernel-exploitation
+1
View File
@@ -24,6 +24,7 @@ Race condition in fs/timerfd.c in the Linux kernel before 4.10.15 allows local u
- https://github.com/khanhnd123/linux-kernel-exploitation
- https://github.com/knd06/linux-kernel-exploitation
- https://github.com/lnick2023/nicenice
- https://github.com/ndk06/linux-kernel-exploitation
- https://github.com/ndk191/linux-kernel-exploitation
- https://github.com/ostrichxyz7/kexps
- https://github.com/qazbnm456/awesome-cve-poc
+1
View File
@@ -48,6 +48,7 @@ The mq_notify function in the Linux kernel through 4.11.9 does not set the sock
- https://github.com/knd06/linux-kernel-exploitation
- https://github.com/leonardo1101/cve-2017-11176
- https://github.com/lexfo/cve-2017-11176
- https://github.com/ndk06/linux-kernel-exploitation
- https://github.com/ndk191/linux-kernel-exploitation
- https://github.com/ostrichxyz7/kexps
- https://github.com/paulveillard/cybersecurity-exploit-development
+1
View File
@@ -99,6 +99,7 @@ The check_alu_op function in kernel/bpf/verifier.c in the Linux kernel through 4
- https://github.com/lnick2023/nicenice
- https://github.com/mareks1007/cve-2017-16995
- https://github.com/mzet-/linux-exploit-suggester
- https://github.com/ndk06/linux-kernel-exploitation
- https://github.com/ndk191/linux-kernel-exploitation
- https://github.com/ozkanbilge/Linux-Kernel-Exploits
- https://github.com/ozkanbilge/Ubuntu16.04-0day-Local-Root
+1
View File
@@ -28,6 +28,7 @@ The timer_create syscall implementation in kernel/time/posix-timers.c in the Lin
- https://github.com/khanhnd123/linux-kernel-exploitation
- https://github.com/knd06/linux-kernel-exploitation
- https://github.com/lnick2023/nicenice
- https://github.com/ndk06/linux-kernel-exploitation
- https://github.com/ndk191/linux-kernel-exploitation
- https://github.com/qazbnm456/awesome-cve-poc
- https://github.com/ssr-111/linux-kernel-exploitation
+1
View File
@@ -28,6 +28,7 @@ Race condition in drivers/tty/n_hdlc.c in the Linux kernel through 4.10.1 allows
- https://github.com/khanhnd123/linux-kernel-exploitation
- https://github.com/knd06/linux-kernel-exploitation
- https://github.com/lnick2023/nicenice
- https://github.com/ndk06/linux-kernel-exploitation
- https://github.com/ndk191/linux-kernel-exploitation
- https://github.com/ostrichxyz7/kexps
- https://github.com/qazbnm456/awesome-cve-poc
+1
View File
@@ -74,6 +74,7 @@ Insufficient data validation in waitid allowed an user to escape sandboxes on Li
- https://github.com/m0mkris/linux-kernel-exploits
- https://github.com/m0nad/awesome-privilege-escalation
- https://github.com/manikanta-suru/cybersecurity-container-security
- https://github.com/ndk06/linux-kernel-exploitation
- https://github.com/ndk191/linux-kernel-exploitation
- https://github.com/ozkanbilge/Linux-Kernel-Exploits
- https://github.com/password520/linux-kernel-exploits
+1
View File
@@ -76,6 +76,7 @@ The dccp_rcv_state_process function in net/dccp/input.c in the Linux kernel thro
- https://github.com/lnick2023/nicenice
- https://github.com/m0mkris/linux-kernel-exploits
- https://github.com/mateeuslinno/kernel-linux-xpls
- https://github.com/ndk06/linux-kernel-exploitation
- https://github.com/ndk191/linux-kernel-exploitation
- https://github.com/ostrichxyz7/kexps
- https://github.com/ozkanbilge/Linux-Kernel-Exploits
+1
View File
@@ -26,6 +26,7 @@ The xfrm_replay_verify_len function in net/xfrm/xfrm_user.c in the Linux kernel
- https://github.com/khanhnd123/linux-kernel-exploitation
- https://github.com/knd06/linux-kernel-exploitation
- https://github.com/mudongliang/LinuxFlaw
- https://github.com/ndk06/linux-kernel-exploitation
- https://github.com/ndk191/linux-kernel-exploitation
- https://github.com/oneoy/cve-
- https://github.com/ostrichxyz7/kexps
+1
View File
@@ -73,6 +73,7 @@ The packet_set_ring function in net/packet/af_packet.c in the Linux kernel throu
- https://github.com/mateeuslinno/kernel-linux-xpls
- https://github.com/mudongliang/LinuxFlaw
- https://github.com/n3t1nv4d3/kernel-exploits
- https://github.com/ndk06/linux-kernel-exploitation
- https://github.com/ndk191/linux-kernel-exploitation
- https://github.com/oneoy/cve-
- https://github.com/ostrichxyz7/kexps
+1
View File
@@ -24,6 +24,7 @@ No PoCs from references.
- https://github.com/khanhhdz06/linux-kernel-exploitation
- https://github.com/khanhnd123/linux-kernel-exploitation
- https://github.com/knd06/linux-kernel-exploitation
- https://github.com/ndk06/linux-kernel-exploitation
- https://github.com/ndk191/linux-kernel-exploitation
- https://github.com/skbasava/Linux-Kernel-exploit
- https://github.com/ssr-111/linux-kernel-exploitation
+1
View File
@@ -11,6 +11,7 @@ A flaw was found in the way Linux kernel KVM hypervisor before 4.18 emulated ins
#### Reference
- https://usn.ubuntu.com/3777-1/
- https://usn.ubuntu.com/3777-2/
#### Github
- https://github.com/ARPSyndicate/cvemon
+1
View File
@@ -11,6 +11,7 @@ A security flaw was found in the chap_server_compute_md5() function in the ISCSI
#### Reference
- https://usn.ubuntu.com/3777-1/
- https://usn.ubuntu.com/3777-2/
- https://usn.ubuntu.com/3777-3/
#### Github
+1
View File
@@ -30,6 +30,7 @@ An integer overflow flaw was found in the Linux kernel's create_elf_tables() fun
- https://github.com/knd06/linux-kernel-exploitation
- https://github.com/lnick2023/nicenice
- https://github.com/luan0ap/cve-2018-14634
- https://github.com/ndk06/linux-kernel-exploitation
- https://github.com/ndk191/linux-kernel-exploitation
- https://github.com/qazbnm456/awesome-cve-poc
- https://github.com/ssr-111/linux-kernel-exploitation
+1
View File
@@ -11,6 +11,7 @@ The spectre_v2_select_mitigation function in arch/x86/kernel/cpu/bugs.c in the L
#### Reference
- https://usn.ubuntu.com/3777-1/
- https://usn.ubuntu.com/3777-2/
- https://usn.ubuntu.com/3777-3/
#### Github
+1
View File
@@ -11,6 +11,7 @@ arch/x86/kernel/paravirt.c in the Linux kernel before 4.18.1 mishandles certain
#### Reference
- https://usn.ubuntu.com/3777-1/
- https://usn.ubuntu.com/3777-2/
- https://usn.ubuntu.com/3777-3/
#### Github
+1
View File
@@ -18,5 +18,6 @@ Microsoft ADFS 4.0 Windows Server 2016 and previous (Active Directory Federation
- https://github.com/0dayhunter/Facebook-BugBounty-Writeups
- https://github.com/Jester0x01/Facebook-Bug-Bounty-Writeups
- https://github.com/Krishnathakur063/Facebook-BugBounty-Writeup
- https://github.com/bikramsah/Meta--BugBounty-Writeups
- https://github.com/jaiswalakshansh/Facebook-BugBounty-Writeups
+2
View File
@@ -11,6 +11,7 @@ An issue was discovered in the Linux kernel through 4.18.8. The vmacache_flush_a
#### Reference
- https://usn.ubuntu.com/3777-1/
- https://usn.ubuntu.com/3777-2/
- https://usn.ubuntu.com/3777-3/
- https://www.exploit-db.com/exploits/45497/
@@ -53,6 +54,7 @@ An issue was discovered in the Linux kernel through 4.18.8. The vmacache_flush_a
- https://github.com/likescam/vmacache_CVE-2018-17182
- https://github.com/lnick2023/nicenice
- https://github.com/lp008/Hack-readme
- https://github.com/ndk06/linux-kernel-exploitation
- https://github.com/ndk191/linux-kernel-exploitation
- https://github.com/nobiusmallyu/kehai
- https://github.com/qazbnm456/awesome-cve-poc
+1
View File
@@ -23,6 +23,7 @@ Since Linux kernel version 3.2, the mremap() syscall performs TLB flushes after
- https://github.com/khanhhdz06/linux-kernel-exploitation
- https://github.com/khanhnd123/linux-kernel-exploitation
- https://github.com/knd06/linux-kernel-exploitation
- https://github.com/ndk06/linux-kernel-exploitation
- https://github.com/ndk191/linux-kernel-exploitation
- https://github.com/ssr-111/linux-kernel-exploitation
- https://github.com/wkhnh06/linux-kernel-exploitation
+1
View File
@@ -61,6 +61,7 @@ Systems with microprocessors utilizing speculative execution and speculative exe
- https://github.com/mjaggi-cavium/spectre-meltdown-checker
- https://github.com/mmxsrup/CVE-2018-3639
- https://github.com/morning21/Spectre_Meltdown_MDS_srcs
- https://github.com/ndk06/linux-kernel-exploitation
- https://github.com/ndk191/linux-kernel-exploitation
- https://github.com/nmosier/clou-bugs
- https://github.com/nsacyber/Hardware-and-Firmware-Security-Guidance
+2
View File
@@ -11,6 +11,7 @@ Memory leak in the irda_bind function in net/irda/af_irda.c and later in drivers
#### Reference
- https://usn.ubuntu.com/3777-1/
- https://usn.ubuntu.com/3777-2/
- https://usn.ubuntu.com/3777-3/
#### Github
@@ -24,6 +25,7 @@ Memory leak in the irda_bind function in net/irda/af_irda.c and later in drivers
- https://github.com/khanhhdz06/linux-kernel-exploitation
- https://github.com/khanhnd123/linux-kernel-exploitation
- https://github.com/knd06/linux-kernel-exploitation
- https://github.com/ndk06/linux-kernel-exploitation
- https://github.com/ndk191/linux-kernel-exploitation
- https://github.com/ssr-111/linux-kernel-exploitation
- https://github.com/wkhnh06/linux-kernel-exploitation
+2
View File
@@ -11,6 +11,7 @@ The irda_setsockopt function in net/irda/af_irda.c and later in drivers/staging/
#### Reference
- https://usn.ubuntu.com/3777-1/
- https://usn.ubuntu.com/3777-2/
- https://usn.ubuntu.com/3777-3/
#### Github
@@ -23,6 +24,7 @@ The irda_setsockopt function in net/irda/af_irda.c and later in drivers/staging/
- https://github.com/khanhhdz06/linux-kernel-exploitation
- https://github.com/khanhnd123/linux-kernel-exploitation
- https://github.com/knd06/linux-kernel-exploitation
- https://github.com/ndk06/linux-kernel-exploitation
- https://github.com/ndk191/linux-kernel-exploitation
- https://github.com/ostrichxyz7/kexps
- https://github.com/ssr-111/linux-kernel-exploitation
+1
View File
@@ -23,6 +23,7 @@ No PoCs from references.
- https://github.com/khanhhdz06/linux-kernel-exploitation
- https://github.com/khanhnd123/linux-kernel-exploitation
- https://github.com/knd06/linux-kernel-exploitation
- https://github.com/ndk06/linux-kernel-exploitation
- https://github.com/ndk191/linux-kernel-exploitation
- https://github.com/ssr-111/linux-kernel-exploitation
- https://github.com/wkhnh06/linux-kernel-exploitation
+1
View File
@@ -24,6 +24,7 @@ No PoCs from references.
- https://github.com/khanhhdz06/linux-kernel-exploitation
- https://github.com/khanhnd123/linux-kernel-exploitation
- https://github.com/knd06/linux-kernel-exploitation
- https://github.com/ndk06/linux-kernel-exploitation
- https://github.com/ndk191/linux-kernel-exploitation
- https://github.com/ssr-111/linux-kernel-exploitation
- https://github.com/wkhnh06/linux-kernel-exploitation
+1
View File
@@ -22,6 +22,7 @@ There is a way to deceive the GPU kernel driver into thinking there is room in t
- https://github.com/khanhhdz06/linux-kernel-exploitation
- https://github.com/khanhnd123/linux-kernel-exploitation
- https://github.com/knd06/linux-kernel-exploitation
- https://github.com/ndk06/linux-kernel-exploitation
- https://github.com/ndk191/linux-kernel-exploitation
- https://github.com/secmob/TiYunZong-An-Exploit-Chain-to-Remotely-Root-Modern-Android-Devices
- https://github.com/ssr-111/linux-kernel-exploitation
+1
View File
@@ -24,6 +24,7 @@ The Linux kernel before 4.8 allows local users to bypass ASLR on setuid programs
- https://github.com/khanhhdz06/linux-kernel-exploitation
- https://github.com/khanhnd123/linux-kernel-exploitation
- https://github.com/knd06/linux-kernel-exploitation
- https://github.com/ndk06/linux-kernel-exploitation
- https://github.com/ndk191/linux-kernel-exploitation
- https://github.com/ssr-111/linux-kernel-exploitation
- https://github.com/wkhnh06/linux-kernel-exploitation
+2
View File
@@ -20,6 +20,8 @@ No PoCs from references.
#### Github
- https://github.com/0dayhunter/Windows-Privilege-Escalation-Resources
- https://github.com/0xT11/CVE-POC
- https://github.com/1dika1/network
- https://github.com/1dika1/vsvs
- https://github.com/20142995/sectool
- https://github.com/ARPSyndicate/cvemon
- https://github.com/Abbykito/WINDOWS_PREVILAGEESCALATIONS
+1
View File
@@ -25,6 +25,7 @@ Using memory after being freed in qsee due to wrong implementation can lead to u
- https://github.com/khanhhdz06/linux-kernel-exploitation
- https://github.com/khanhnd123/linux-kernel-exploitation
- https://github.com/knd06/linux-kernel-exploitation
- https://github.com/ndk06/linux-kernel-exploitation
- https://github.com/ndk191/linux-kernel-exploitation
- https://github.com/ssr-111/linux-kernel-exploitation
- https://github.com/tamirzb/CVE-2019-14040
+1
View File
@@ -25,6 +25,7 @@ During listener modified response processing, a buffer overrun occurs due to lac
- https://github.com/khanhhdz06/linux-kernel-exploitation
- https://github.com/khanhnd123/linux-kernel-exploitation
- https://github.com/knd06/linux-kernel-exploitation
- https://github.com/ndk06/linux-kernel-exploitation
- https://github.com/ndk191/linux-kernel-exploitation
- https://github.com/ssr-111/linux-kernel-exploitation
- https://github.com/tamirzb/CVE-2019-14041
+1
View File
@@ -22,6 +22,7 @@ No PoCs from references.
- https://github.com/khanhhdz06/linux-kernel-exploitation
- https://github.com/khanhnd123/linux-kernel-exploitation
- https://github.com/knd06/linux-kernel-exploitation
- https://github.com/ndk06/linux-kernel-exploitation
- https://github.com/ndk191/linux-kernel-exploitation
- https://github.com/ssr-111/linux-kernel-exploitation
- https://github.com/wkhnh06/linux-kernel-exploitation
+17
View File
@@ -0,0 +1,17 @@
### [CVE-2019-17072](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17072)
![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen)
### Description
The new-contact-form-widget (aka Contact Form Widget - Contact Query, Form Maker) plugin 1.0.9 for WordPress has SQL Injection via all-query-page.php.
### POC
#### Reference
No PoCs from references.
#### Github
- https://github.com/20142995/nuclei-templates
+1
View File
@@ -19,6 +19,7 @@ A vulnerability in WhatsApp Desktop versions prior to 0.3.9309 when paired with
- https://github.com/Ostorlab/known_exploited_vulnerbilities_detectors
- https://github.com/PerimeterX/CVE-2019-18426
- https://github.com/abhav/nvd_scrapper
- https://github.com/bikramsah/Meta--BugBounty-Writeups
- https://github.com/developer3000S/PoC-in-GitHub
- https://github.com/hectorgie/PoC-in-GitHub
- https://github.com/jaiswalakshansh/Facebook-BugBounty-Writeups
+1
View File
@@ -24,6 +24,7 @@ The Linux kernel through 5.3.13 has a start_offset+size Integer Overflow in cpia
- https://github.com/khanhhdz06/linux-kernel-exploitation
- https://github.com/khanhnd123/linux-kernel-exploitation
- https://github.com/knd06/linux-kernel-exploitation
- https://github.com/ndk06/linux-kernel-exploitation
- https://github.com/ndk191/linux-kernel-exploitation
- https://github.com/ssr-111/linux-kernel-exploitation
- https://github.com/wkhnh06/linux-kernel-exploitation
+1
View File
@@ -33,6 +33,7 @@ An issue was discovered in drivers/media/platform/vivid in the Linux kernel thro
- https://github.com/khanhnd123/linux-kernel-exploitation
- https://github.com/knd06/linux-kernel-exploitation
- https://github.com/lnick2023/nicenice
- https://github.com/ndk06/linux-kernel-exploitation
- https://github.com/ndk191/linux-kernel-exploitation
- https://github.com/qazbnm456/awesome-cve-poc
- https://github.com/sanjana123-cloud/CVE-2019-18683
+1
View File
@@ -23,6 +23,7 @@ In the Linux kernel 5.0.21, mounting a crafted btrfs filesystem image, performin
- https://github.com/khanhhdz06/linux-kernel-exploitation
- https://github.com/khanhnd123/linux-kernel-exploitation
- https://github.com/knd06/linux-kernel-exploitation
- https://github.com/ndk06/linux-kernel-exploitation
- https://github.com/ndk191/linux-kernel-exploitation
- https://github.com/ssr-111/linux-kernel-exploitation
- https://github.com/wkhnh06/linux-kernel-exploitation

Some files were not shown because too many files have changed in this diff Show More