Update Mon May 27 13:12:02 UTC 2024

This commit is contained in:
0xMarcio
2024-05-27 13:12:02 +00:00
parent 2d745dea05
commit b042ce8188
523 changed files with 1925 additions and 51 deletions
+1
View File
@@ -13,5 +13,6 @@ The Windows 2000 telnet client attempts to perform NTLM authentication by defaul
No PoCs from references.
#### Github
- https://github.com/Cruxer8Mech/Idk
- https://github.com/ycdxsb/WindowsPrivilegeEscalation
+1
View File
@@ -16,6 +16,7 @@ File and Print Sharing service in Windows 95, Windows 98, and Windows Me does no
- https://github.com/ARPSyndicate/cvemon
- https://github.com/Ascotbe/Kernelhub
- https://github.com/CVEDB/PoC-List
- https://github.com/Cruxer8Mech/Idk
- https://github.com/Z6543/CVE-2000-0979
- https://github.com/ycdxsb/WindowsPrivilegeEscalation
+1
View File
@@ -16,6 +16,7 @@ No PoCs from references.
- https://github.com/ARPSyndicate/cvemon
- https://github.com/Al1ex/WindowsElevation
- https://github.com/Ascotbe/Kernelhub
- https://github.com/Cruxer8Mech/Idk
- https://github.com/fei9747/WindowsElevation
- https://github.com/lyshark/Windows-exploits
- https://github.com/makoto56/penetration-suite-toolkit
+1
View File
@@ -32,6 +32,7 @@ The do_mremap function for the mremap system call in Linux 2.2 to 2.2.25, 2.4 to
- https://github.com/Singlea-lyh/linux-kernel-exploits
- https://github.com/Snoopy-Sec/Localroot-ALL-CVE
- https://github.com/Technoashofficial/kernel-exploitation-linux
- https://github.com/ZTK-009/linux-kernel-exploits
- https://github.com/albinjoshy03/linux-kernel-exploits
- https://github.com/alian87/linux-kernel-exploits
- https://github.com/coffee727/linux-exp
+1
View File
@@ -29,6 +29,7 @@ Race condition in the (1) load_elf_library and (2) binfmt_aout function calls fo
- https://github.com/Shadowshusky/linux-kernel-exploits
- https://github.com/Singlea-lyh/linux-kernel-exploits
- https://github.com/Snoopy-Sec/Localroot-ALL-CVE
- https://github.com/ZTK-009/linux-kernel-exploits
- https://github.com/albinjoshy03/linux-kernel-exploits
- https://github.com/alian87/linux-kernel-exploits
- https://github.com/coffee727/linux-exp
+1
View File
@@ -14,5 +14,6 @@ The Windows Animated Cursor (ANI) capability in Windows NT, Windows 2000 through
- https://docs.microsoft.com/en-us/security-updates/securitybulletins/2005/ms05-002
#### Github
- https://github.com/Cruxer8Mech/Idk
- https://github.com/ycdxsb/WindowsPrivilegeEscalation
+1
View File
@@ -29,6 +29,7 @@ Integer overflow in sys_epoll_wait in eventpoll.c for Linux kernel 2.6 to 2.6.11
- https://github.com/Shadowshusky/linux-kernel-exploits
- https://github.com/Singlea-lyh/linux-kernel-exploits
- https://github.com/Snoopy-Sec/Localroot-ALL-CVE
- https://github.com/ZTK-009/linux-kernel-exploits
- https://github.com/albinjoshy03/linux-kernel-exploits
- https://github.com/alian87/linux-kernel-exploits
- https://github.com/coffee727/linux-exp
+1
View File
@@ -28,6 +28,7 @@ The elf_core_dump function in binfmt_elf.c for Linux kernel 2.x.x to 2.2.27-rc2,
- https://github.com/Shadowshusky/linux-kernel-exploits
- https://github.com/Singlea-lyh/linux-kernel-exploits
- https://github.com/Snoopy-Sec/Localroot-ALL-CVE
- https://github.com/ZTK-009/linux-kernel-exploits
- https://github.com/albinjoshy03/linux-kernel-exploits
- https://github.com/alian87/linux-kernel-exploits
- https://github.com/coffee727/linux-exp
+1
View File
@@ -17,6 +17,7 @@ Stack-based buffer overflow in the Plug and Play (PnP) service for Microsoft Win
- https://github.com/ARPSyndicate/cvemon
- https://github.com/Al1ex/WindowsElevation
- https://github.com/Ascotbe/Kernelhub
- https://github.com/Cruxer8Mech/Idk
- https://github.com/fei9747/WindowsElevation
- https://github.com/makoto56/penetration-suite-toolkit
- https://github.com/ycdxsb/WindowsPrivilegeEscalation
+1
View File
@@ -13,6 +13,7 @@ Heap-based buffer overflow in the Server Service (SRV.SYS driver) in Microsoft W
- https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-035
#### Github
- https://github.com/Cruxer8Mech/Idk
- https://github.com/uroboros-security/SMB-CVE
- https://github.com/ycdxsb/WindowsPrivilegeEscalation
+1
View File
@@ -31,6 +31,7 @@ No PoCs from references.
- https://github.com/Shadowshusky/linux-kernel-exploits
- https://github.com/Singlea-lyh/linux-kernel-exploits
- https://github.com/Snoopy-Sec/Localroot-ALL-CVE
- https://github.com/ZTK-009/linux-kernel-exploits
- https://github.com/albinjoshy03/linux-kernel-exploits
- https://github.com/alian87/linux-kernel-exploits
- https://github.com/coffee727/linux-exp
+17
View File
@@ -0,0 +1,17 @@
### [CVE-2006-2822](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2822)
![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen)
### Description
SQL injection vulnerability in admin/default.asp in Dusan Drobac CodeAvalanche FreeForum (aka CAForum) 1.0 allows remote attackers to execute arbitrary SQL commands via the password parameter.
### POC
#### Reference
- http://securityreason.com/securityalert/1026
#### Github
No PoCs found on GitHub currently.
+1
View File
@@ -16,6 +16,7 @@ No PoCs from references.
- https://github.com/ARPSyndicate/cvemon
- https://github.com/Al1ex/WindowsElevation
- https://github.com/Ascotbe/Kernelhub
- https://github.com/Cruxer8Mech/Idk
- https://github.com/fei9747/WindowsElevation
- https://github.com/lyshark/Windows-exploits
- https://github.com/makoto56/penetration-suite-toolkit
+1
View File
@@ -28,6 +28,7 @@ Race condition in Linux kernel 2.6.17.4 and earlier allows local users to gain r
- https://github.com/Shadowshusky/linux-kernel-exploits
- https://github.com/Singlea-lyh/linux-kernel-exploits
- https://github.com/Snoopy-Sec/Localroot-ALL-CVE
- https://github.com/ZTK-009/linux-kernel-exploits
- https://github.com/albinjoshy03/linux-kernel-exploits
- https://github.com/alian87/linux-kernel-exploits
- https://github.com/coffee727/linux-exp
+1
View File
@@ -25,6 +25,7 @@ No PoCs from references.
- https://github.com/aulauniversal/Pppwn-Android
- https://github.com/aulauniversal/Pppwn.Android
- https://github.com/aulauniversal/Ps4-pppwn-Windows
- https://github.com/lvca-dev/easyPPPwn
- https://github.com/secdev/awesome-scapy
- https://github.com/sonicps/pppwn-sonicps
- https://github.com/vineshgoyal/SISTR0-PPPwn
+1
View File
@@ -18,5 +18,6 @@ Stack-based buffer overflow in the animated cursor code in Microsoft Windows 200
- https://github.com/Axua/CVE-2007-0038
- https://github.com/CVEDB/PoC-List
- https://github.com/CVEDB/awesome-cve-repo
- https://github.com/Cruxer8Mech/Idk
- https://github.com/ycdxsb/WindowsPrivilegeEscalation
+1
View File
@@ -16,6 +16,7 @@ The ReadDirectoryChangesW API function on Microsoft Windows 2000, XP, Server 200
- https://github.com/ARPSyndicate/cvemon
- https://github.com/CVEDB/PoC-List
- https://github.com/CVEDB/awesome-cve-repo
- https://github.com/Cruxer8Mech/Idk
- https://github.com/disintegr8te/MonitorFileSystemWatcher
- https://github.com/ycdxsb/WindowsPrivilegeEscalation
- https://github.com/z3APA3A/spydir
+1
View File
@@ -13,5 +13,6 @@ Unspecified vulnerability in Microsoft Windows 2000 SP4 through Vista allows rem
No PoCs from references.
#### Github
- https://github.com/Cruxer8Mech/Idk
- https://github.com/ycdxsb/WindowsPrivilegeEscalation
+1
View File
@@ -30,6 +30,7 @@ The vmsplice_to_pipe function in Linux kernel 2.6.17 through 2.6.24.1 does not v
- https://github.com/Singlea-lyh/linux-kernel-exploits
- https://github.com/Snoopy-Sec/Localroot-ALL-CVE
- https://github.com/Technoashofficial/kernel-exploitation-linux
- https://github.com/ZTK-009/linux-kernel-exploits
- https://github.com/albinjoshy03/linux-kernel-exploits
- https://github.com/alian87/linux-kernel-exploits
- https://github.com/coffee727/linux-exp
+1
View File
@@ -17,6 +17,7 @@ Unspecified vulnerability in the kernel in Microsoft Windows 2000 SP4, XP SP2, S
- https://github.com/ARPSyndicate/cvemon
- https://github.com/Al1ex/WindowsElevation
- https://github.com/Ascotbe/Kernelhub
- https://github.com/Cruxer8Mech/Idk
- https://github.com/fei9747/WindowsElevation
- https://github.com/lyshark/Windows-exploits
- https://github.com/makoto56/penetration-suite-toolkit
+1
View File
@@ -16,6 +16,7 @@ afd.sys in the Ancillary Function Driver (AFD) component in Microsoft Windows XP
#### Github
- https://github.com/Al1ex/WindowsElevation
- https://github.com/Ascotbe/Kernelhub
- https://github.com/Cruxer8Mech/Idk
- https://github.com/fei9747/WindowsElevation
- https://github.com/lyshark/Windows-exploits
- https://github.com/ycdxsb/WindowsPrivilegeEscalation
+1
View File
@@ -16,6 +16,7 @@ Microsoft Windows 2000 Gold through SP4, XP Gold through SP3, Server 2003 SP1 an
#### Github
- https://github.com/Al1ex/WindowsElevation
- https://github.com/Ascotbe/Kernelhub
- https://github.com/Cruxer8Mech/Idk
- https://github.com/fei9747/WindowsElevation
- https://github.com/lyshark/Windows-exploits
- https://github.com/uroboros-security/SMB-CVE
+1
View File
@@ -28,6 +28,7 @@ fs/open.c in the Linux kernel before 2.6.22 does not properly strip setuid and s
- https://github.com/Shadowshusky/linux-kernel-exploits
- https://github.com/Singlea-lyh/linux-kernel-exploits
- https://github.com/Snoopy-Sec/Localroot-ALL-CVE
- https://github.com/ZTK-009/linux-kernel-exploits
- https://github.com/albinjoshy03/linux-kernel-exploits
- https://github.com/alian87/linux-kernel-exploits
- https://github.com/coffee727/linux-exp
+1
View File
@@ -27,6 +27,7 @@ The Server service in Microsoft Windows 2000 SP4, XP SP2 and SP3, Server 2003 SP
- https://github.com/Ascotbe/Kernelhub
- https://github.com/CVEDB/PoC-List
- https://github.com/CVEDB/awesome-cve-repo
- https://github.com/Cruxer8Mech/Idk
- https://github.com/H3xL00m/MS08-067
- https://github.com/Jean-Francois-C/Boot2root-CTFs-Writeups
- https://github.com/Kuromesi/Py4CSKG
+1
View File
@@ -15,6 +15,7 @@ No PoCs from references.
#### Github
- https://github.com/Al1ex/WindowsElevation
- https://github.com/Ascotbe/Kernelhub
- https://github.com/Cruxer8Mech/Idk
- https://github.com/fei9747/WindowsElevation
- https://github.com/ycdxsb/WindowsPrivilegeEscalation
+1
View File
@@ -17,6 +17,7 @@ The Windows Printing Service in Microsoft Windows 2000 SP4, XP SP2 and SP3, Serv
- https://github.com/ARPSyndicate/cvemon
- https://github.com/CVEDB/PoC-List
- https://github.com/CVEDB/awesome-cve-repo
- https://github.com/Cruxer8Mech/Idk
- https://github.com/clearbluejar/cve-markdown-charts
- https://github.com/developer3000S/PoC-in-GitHub
- https://github.com/hectorgie/PoC-in-GitHub
+1
View File
@@ -13,5 +13,6 @@ The WebDAV extension in Microsoft Internet Information Services (IIS) 5.0 on Win
- https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-020
#### Github
- https://github.com/Cruxer8Mech/Idk
- https://github.com/ycdxsb/WindowsPrivilegeEscalation
+1
View File
@@ -31,6 +31,7 @@ udev before 1.4.1 does not verify whether a NETLINK message originates from kern
- https://github.com/Shadowshusky/linux-kernel-exploits
- https://github.com/Singlea-lyh/linux-kernel-exploits
- https://github.com/Snoopy-Sec/Localroot-ALL-CVE
- https://github.com/ZTK-009/linux-kernel-exploits
- https://github.com/albinjoshy03/linux-kernel-exploits
- https://github.com/alian87/linux-kernel-exploits
- https://github.com/amane312/Linux_menthor
+1
View File
@@ -29,6 +29,7 @@ The exit_notify function in kernel/exit.c in the Linux kernel before 2.6.30-rc1
- https://github.com/Shadowshusky/linux-kernel-exploits
- https://github.com/Singlea-lyh/linux-kernel-exploits
- https://github.com/Snoopy-Sec/Localroot-ALL-CVE
- https://github.com/ZTK-009/linux-kernel-exploits
- https://github.com/albinjoshy03/linux-kernel-exploits
- https://github.com/alian87/linux-kernel-exploits
- https://github.com/coffee727/linux-exp
+1
View File
@@ -16,6 +16,7 @@ The WebDAV extension in Microsoft Internet Information Services (IIS) 5.1 and 6.
#### Github
- https://github.com/Al1ex/WindowsElevation
- https://github.com/Cruxer8Mech/Idk
- https://github.com/fei9747/WindowsElevation
- https://github.com/ycdxsb/WindowsPrivilegeEscalation
+1
View File
@@ -15,6 +15,7 @@ Microsoft Windows Vista Gold, SP1, and SP2, Windows Server 2008 Gold and SP2, an
#### Github
- https://github.com/Al1ex/WindowsElevation
- https://github.com/Ascotbe/Kernelhub
- https://github.com/Cruxer8Mech/Idk
- https://github.com/EricwentwithCyber/Vulnerability-Scan-Lab
- https://github.com/fei9747/WindowsElevation
- https://github.com/lyshark/Windows-exploits
+1
View File
@@ -34,6 +34,7 @@ The Linux kernel 2.6.0 through 2.6.30.4, and 2.4.4 through 2.4.37.4, does not in
- https://github.com/Singlea-lyh/linux-kernel-exploits
- https://github.com/Snoopy-Sec/Localroot-ALL-CVE
- https://github.com/Technoashofficial/kernel-exploitation-linux
- https://github.com/ZTK-009/linux-kernel-exploits
- https://github.com/albinjoshy03/linux-kernel-exploits
- https://github.com/alian87/linux-kernel-exploits
- https://github.com/cloudsec/exploit
+1
View File
@@ -34,6 +34,7 @@ The udp_sendmsg function in the UDP implementation in (1) net/ipv4/udp.c and (2)
- https://github.com/Snoopy-Sec/Localroot-ALL-CVE
- https://github.com/YgorAlberto/Ethical-Hacker
- https://github.com/YgorAlberto/ygoralberto.github.io
- https://github.com/ZTK-009/linux-kernel-exploits
- https://github.com/albinjoshy03/linux-kernel-exploits
- https://github.com/alian87/linux-kernel-exploits
- https://github.com/cloudsec/exploit
+1
View File
@@ -30,6 +30,7 @@ Multiple race conditions in fs/pipe.c in the Linux kernel before 2.6.32-rc6 allo
- https://github.com/Shadowshusky/linux-kernel-exploits
- https://github.com/Singlea-lyh/linux-kernel-exploits
- https://github.com/Snoopy-Sec/Localroot-ALL-CVE
- https://github.com/ZTK-009/linux-kernel-exploits
- https://github.com/albinjoshy03/linux-kernel-exploits
- https://github.com/alian87/linux-kernel-exploits
- https://github.com/coffee727/linux-exp
+1
View File
@@ -16,6 +16,7 @@ No PoCs from references.
- https://github.com/Al1ex/WindowsElevation
- https://github.com/Amnesthesia/EHAPT-Group-Project
- https://github.com/Ascotbe/Kernelhub
- https://github.com/Cruxer8Mech/Idk
- https://github.com/EricwentwithCyber/Vulnerability-Scan-Lab
- https://github.com/fei9747/WindowsElevation
- https://github.com/uroboros-security/SMB-CVE
+1
View File
@@ -14,6 +14,7 @@ No PoCs from references.
#### Github
- https://github.com/Ascotbe/Kernelhub
- https://github.com/Cruxer8Mech/Idk
- https://github.com/lyshark/Windows-exploits
- https://github.com/ycdxsb/WindowsPrivilegeEscalation
+1
View File
@@ -14,6 +14,7 @@ No PoCs from references.
#### Github
- https://github.com/Ascotbe/Kernelhub
- https://github.com/Cruxer8Mech/Idk
- https://github.com/aRustyDev/C844
- https://github.com/lyshark/Windows-exploits
- https://github.com/ycdxsb/WindowsPrivilegeEscalation
+1
View File
@@ -28,6 +28,7 @@ The do_pages_move function in mm/migrate.c in the Linux kernel before 2.6.33-rc7
- https://github.com/SecWiki/linux-kernel-exploits
- https://github.com/Shadowshusky/linux-kernel-exploits
- https://github.com/Singlea-lyh/linux-kernel-exploits
- https://github.com/ZTK-009/linux-kernel-exploits
- https://github.com/albinjoshy03/linux-kernel-exploits
- https://github.com/alian87/linux-kernel-exploits
- https://github.com/coffee727/linux-exp
+1
View File
@@ -30,6 +30,7 @@ No PoCs from references.
- https://github.com/Shadowshusky/linux-kernel-exploits
- https://github.com/Singlea-lyh/linux-kernel-exploits
- https://github.com/Snoopy-Sec/Localroot-ALL-CVE
- https://github.com/ZTK-009/linux-kernel-exploits
- https://github.com/albinjoshy03/linux-kernel-exploits
- https://github.com/alian87/linux-kernel-exploits
- https://github.com/coffee727/linux-exp
+1
View File
@@ -14,6 +14,7 @@ The Windows kernel-mode drivers in win32k.sys in Microsoft Windows XP SP2 and SP
#### Github
- https://github.com/Al1ex/WindowsElevation
- https://github.com/Cruxer8Mech/Idk
- https://github.com/fei9747/WindowsElevation
- https://github.com/ycdxsb/WindowsPrivilegeEscalation
+1
View File
@@ -14,6 +14,7 @@ The Windows kernel-mode drivers in win32k.sys in Microsoft Windows XP SP2 and SP
#### Github
- https://github.com/Ascotbe/Kernelhub
- https://github.com/Cruxer8Mech/Idk
- https://github.com/lyshark/Windows-exploits
- https://github.com/ycdxsb/WindowsPrivilegeEscalation
+1
View File
@@ -15,6 +15,7 @@ No PoCs from references.
#### Github
- https://github.com/Al1ex/WindowsElevation
- https://github.com/Ascotbe/Kernelhub
- https://github.com/Cruxer8Mech/Idk
- https://github.com/fei9747/WindowsElevation
- https://github.com/ycdxsb/WindowsPrivilegeEscalation
+1
View File
@@ -13,6 +13,7 @@ Buffer overflow in Microsoft Internet Information Services (IIS) 7.5, when FastC
No PoCs from references.
#### Github
- https://github.com/Cruxer8Mech/Idk
- https://github.com/Romulus968/copycat
- https://github.com/bioly230/THM_Alfred
- https://github.com/dominicporter/shodan-playing
+1 -1
View File
@@ -1,6 +1,6 @@
### [CVE-2010-2954](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2954)
![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=%3D%20n%2Fa%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen)
### Description
+1 -1
View File
@@ -1,6 +1,6 @@
### [CVE-2010-2955](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2955)
![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=%3D%20n%2Fa%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen)
### Description
+1
View File
@@ -45,6 +45,7 @@ No PoCs from references.
- https://github.com/Skixie/OSCP-Journey
- https://github.com/Snoopy-Sec/Localroot-ALL-CVE
- https://github.com/Technoashofficial/kernel-exploitation-linux
- https://github.com/ZTK-009/linux-kernel-exploits
- https://github.com/akr3ch/OSCP-Survival-Guide
- https://github.com/aktechnohacker/OSCP-Notes
- https://github.com/albinjoshy03/linux-kernel-exploits
+1
View File
@@ -34,6 +34,7 @@ The compat_alloc_user_space functions in include/asm/compat.h files in the Linux
- https://github.com/Snoopy-Sec/Localroot-ALL-CVE
- https://github.com/SteinsGatep001/Binary
- https://github.com/Technoashofficial/kernel-exploitation-linux
- https://github.com/ZTK-009/linux-kernel-exploits
- https://github.com/albinjoshy03/linux-kernel-exploits
- https://github.com/alian87/linux-kernel-exploits
- https://github.com/coffee727/linux-exp
+1
View File
@@ -33,6 +33,7 @@ The IA32 system call emulation functionality in arch/x86/ia32/ia32entry.S in the
- https://github.com/Singlea-lyh/linux-kernel-exploits
- https://github.com/Snoopy-Sec/Localroot-ALL-CVE
- https://github.com/Technoashofficial/kernel-exploitation-linux
- https://github.com/ZTK-009/linux-kernel-exploits
- https://github.com/albinjoshy03/linux-kernel-exploits
- https://github.com/alian87/linux-kernel-exploits
- https://github.com/coffee727/linux-exp
+1
View File
@@ -15,6 +15,7 @@ The Windows Task Scheduler in Microsoft Windows Vista SP1 and SP2, Windows Serve
#### Github
- https://github.com/Al1ex/WindowsElevation
- https://github.com/Ascotbe/Kernelhub
- https://github.com/Cruxer8Mech/Idk
- https://github.com/fei9747/WindowsElevation
- https://github.com/lyshark/Windows-exploits
- https://github.com/ycdxsb/WindowsPrivilegeEscalation
+1
View File
@@ -32,6 +32,7 @@ No PoCs from references.
- https://github.com/Singlea-lyh/linux-kernel-exploits
- https://github.com/Snoopy-Sec/Localroot-ALL-CVE
- https://github.com/Technoashofficial/kernel-exploitation-linux
- https://github.com/ZTK-009/linux-kernel-exploits
- https://github.com/albinjoshy03/linux-kernel-exploits
- https://github.com/alian87/linux-kernel-exploits
- https://github.com/coffee727/linux-exp
+1 -1
View File
@@ -1,6 +1,6 @@
### [CVE-2010-3705](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3705)
![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=%3D%20n%2Fa%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen)
### Description
+1 -1
View File
@@ -1,6 +1,6 @@
### [CVE-2010-3873](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3873)
![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=%3D%20n%2Fa%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen)
### Description
+1 -1
View File
@@ -1,6 +1,6 @@
### [CVE-2010-3875](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3875)
![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=%3D%20n%2Fa%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen)
### Description
+1
View File
@@ -14,5 +14,6 @@ Unspecified vulnerability in Microsoft Windows on 32-bit platforms allows local
- http://www.symantec.com/connect/blogs/stuxnet-using-three-additional-zero-day-vulnerabilities
#### Github
- https://github.com/Cruxer8Mech/Idk
- https://github.com/ycdxsb/WindowsPrivilegeEscalation
+1
View File
@@ -53,6 +53,7 @@ The rds_page_copy_user function in net/rds/page.c in the Reliable Datagram Socke
- https://github.com/Skixie/OSCP-Journey
- https://github.com/Snoopy-Sec/Localroot-ALL-CVE
- https://github.com/T3b0g025/PWK-CheatSheet
- https://github.com/ZTK-009/linux-kernel-exploits
- https://github.com/akr3ch/OSCP-Survival-Guide
- https://github.com/aktechnohacker/OSCP-Notes
- https://github.com/albinjoshy03/linux-kernel-exploits
+1
View File
@@ -32,6 +32,7 @@ The ipc subsystem in the Linux kernel before 2.6.37-rc1 does not initialize cert
- https://github.com/Shadowshusky/linux-kernel-exploits
- https://github.com/Singlea-lyh/linux-kernel-exploits
- https://github.com/Snoopy-Sec/Localroot-ALL-CVE
- https://github.com/ZTK-009/linux-kernel-exploits
- https://github.com/albinjoshy03/linux-kernel-exploits
- https://github.com/alian87/linux-kernel-exploits
- https://github.com/coffee727/linux-exp
+1 -1
View File
@@ -1,6 +1,6 @@
### [CVE-2010-4164](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4164)
![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=%3D%20n%2Fa%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen)
### Description
+1
View File
@@ -32,6 +32,7 @@ The do_exit function in kernel/exit.c in the Linux kernel before 2.6.36.2 does n
- https://github.com/Singlea-lyh/linux-kernel-exploits
- https://github.com/Snoopy-Sec/Localroot-ALL-CVE
- https://github.com/Technoashofficial/kernel-exploitation-linux
- https://github.com/ZTK-009/linux-kernel-exploits
- https://github.com/albinjoshy03/linux-kernel-exploits
- https://github.com/alian87/linux-kernel-exploits
- https://github.com/coffee727/linux-exp
+1 -1
View File
@@ -1,6 +1,6 @@
### [CVE-2010-4342](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4342)
![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=%3D%20n%2Fa%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen)
### Description
+1
View File
@@ -30,6 +30,7 @@ No PoCs from references.
- https://github.com/Shadowshusky/linux-kernel-exploits
- https://github.com/Singlea-lyh/linux-kernel-exploits
- https://github.com/Snoopy-Sec/Localroot-ALL-CVE
- https://github.com/ZTK-009/linux-kernel-exploits
- https://github.com/albinjoshy03/linux-kernel-exploits
- https://github.com/alian87/linux-kernel-exploits
- https://github.com/coffee727/linux-exp
+1 -1
View File
@@ -1,6 +1,6 @@
### [CVE-2010-4527](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4527)
![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=%3D%20n%2Fa%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen)
### Description
+1
View File
@@ -14,5 +14,6 @@ The Trace Events functionality in the kernel in Microsoft Windows XP SP3 does no
#### Github
- https://github.com/Ascotbe/Kernelhub
- https://github.com/Cruxer8Mech/Idk
- https://github.com/ycdxsb/WindowsPrivilegeEscalation
+17
View File
@@ -0,0 +1,17 @@
### [CVE-2011-0615](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0615)
![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen)
### Description
Multiple buffer overflows in Adobe Audition 3.0.1 and earlier allow remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via crafted data in unspecified fields in the TRKM chunk in an Audition Session (aka .ses) file, related to inconsistent use of character data types.
### POC
#### Reference
- http://www.coresecurity.com/content/Adobe-Audition-malformed-SES-file
#### Github
No PoCs found on GitHub currently.
+1
View File
@@ -18,5 +18,6 @@ No PoCs from references.
- https://github.com/BrunoPujos/CVE-2011-1237
- https://github.com/CVEDB/PoC-List
- https://github.com/CVEDB/awesome-cve-repo
- https://github.com/Cruxer8Mech/Idk
- https://github.com/ycdxsb/WindowsPrivilegeEscalation
+1
View File
@@ -19,6 +19,7 @@ The Ancillary Function Driver (AFD) in afd.sys in Microsoft Windows XP SP2 and S
- https://github.com/Ascotbe/Kernelhub
- https://github.com/CVEDB/PoC-List
- https://github.com/CVEDB/awesome-cve-repo
- https://github.com/Cruxer8Mech/Idk
- https://github.com/H3xL00m/CVE-2011-1249
- https://github.com/Madusanka99/OHTS
- https://github.com/c0d3cr4f73r/CVE-2011-1249
+1
View File
@@ -11,6 +11,7 @@ The encryptPassword function in Login.js in ManageEngine ServiceDesk Plus (SDP)
#### Reference
- http://securityreason.com/securityalert/8385
- http://www.coresecurity.com/content/multiples-vulnerabilities-manageengine-sdp
#### Github
No PoCs found on GitHub currently.
+1
View File
@@ -11,6 +11,7 @@ Cross-site scripting (XSS) vulnerability in SolutionSearch.do in ManageEngine Se
#### Reference
- http://securityreason.com/securityalert/8385
- http://www.coresecurity.com/content/multiples-vulnerabilities-manageengine-sdp
#### Github
No PoCs found on GitHub currently.
+1
View File
@@ -11,6 +11,7 @@ Heap-based buffer overflow in xlssr.dll in Autonomy KeyView, as used in IBM Lotu
#### Reference
- http://securityreason.com/securityalert/8263
- http://www.coresecurity.com/content/LotusNotes-XLS-viewer-heap-overflow
#### Github
No PoCs found on GitHub currently.
+17
View File
@@ -0,0 +1,17 @@
### [CVE-2011-1513](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1513)
![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen)
### Description
Static code injection vulnerability in install_.php in e107 CMS 0.7.24 and probably earlier versions, when the installation script is not removed, allows remote attackers to inject arbitrary PHP code into e107_config.php via a crafted MySQL server name.
### POC
#### Reference
- http://www.coresecurity.com/content/e107-cms-script-command-injection
#### Github
No PoCs found on GitHub currently.
+17
View File
@@ -0,0 +1,17 @@
### [CVE-2011-1514](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1514)
![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen)
### Description
The inet service in HP OpenView Storage Data Protector 6.00 through 6.20 allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via a request containing crafted parameters.
### POC
#### Reference
- http://www.coresecurity.com/content/HP-Data-Protector-multiple-vulnerabilities
#### Github
No PoCs found on GitHub currently.
+17
View File
@@ -0,0 +1,17 @@
### [CVE-2011-1515](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1515)
![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen)
### Description
The inet service in HP OpenView Storage Data Protector 6.00 through 6.20 allows remote attackers to cause a denial of service (daemon exit) via a request containing crafted parameters.
### POC
#### Reference
- http://www.coresecurity.com/content/HP-Data-Protector-multiple-vulnerabilities
#### Github
No PoCs found on GitHub currently.
+1
View File
@@ -11,6 +11,7 @@ Multiple stack-based buffer overflows in the inet service in HP OpenView Storage
#### Reference
- http://securityreason.com/securityalert/8288
- http://www.coresecurity.com/content/HP-Data-Protector-multiple-vulnerabilities
- http://www.exploit-db.com/exploits/17458
- http://www.exploit-db.com/exploits/17490
+1
View File
@@ -11,6 +11,7 @@ Buffer overflow in omniinet.exe in the inet service in HP OpenView Storage Data
#### Reference
- http://securityreason.com/securityalert/8289
- http://www.coresecurity.com/content/HP-Data-Protector-EXECCMD-Vulnerability
- http://www.exploit-db.com/exploits/17461
#### Github
+1
View File
@@ -17,6 +17,7 @@ NDISTAPI.sys in the NDISTAPI driver in Remote Access Service (RAS) in Microsoft
- https://github.com/Al1ex/WindowsElevation
- https://github.com/Ascotbe/Kernelhub
- https://github.com/CVEDB/PoC-List
- https://github.com/Cruxer8Mech/Idk
- https://github.com/fei9747/WindowsElevation
- https://github.com/lyshark/Windows-exploits
- https://github.com/ycdxsb/WindowsPrivilegeEscalation
+1
View File
@@ -17,6 +17,7 @@ No PoCs from references.
- https://github.com/Al1ex/WindowsElevation
- https://github.com/Ascotbe/Kernelhub
- https://github.com/BLACKHAT-SSG/EXP-401-OSEE
- https://github.com/Cruxer8Mech/Idk
- https://github.com/DotSight7/Cheatsheet
- https://github.com/Ostorlab/KEV
- https://github.com/Ostorlab/known_exploited_vulnerbilities_detectors
+1
View File
@@ -16,6 +16,7 @@ No PoCs from references.
- https://github.com/ARPSyndicate/cvemon
- https://github.com/Al1ex/WindowsElevation
- https://github.com/Ascotbe/Kernelhub
- https://github.com/Cruxer8Mech/Idk
- https://github.com/Juba0x4355/Blue-THM
- https://github.com/Juba0x4355/Blue-Writeup
- https://github.com/TesterCC/exp_poc_library
+1
View File
@@ -55,6 +55,7 @@ No PoCs from references.
- https://github.com/Snoopy-Sec/Localroot-ALL-CVE
- https://github.com/T3b0g025/PWK-CheatSheet
- https://github.com/Technoashofficial/kernel-exploitation-linux
- https://github.com/ZTK-009/linux-kernel-exploits
- https://github.com/akr3ch/OSCP-Survival-Guide
- https://github.com/aktechnohacker/OSCP-Notes
- https://github.com/albinjoshy03/linux-kernel-exploits
+1
View File
@@ -16,6 +16,7 @@ No PoCs from references.
- https://github.com/ARPSyndicate/cvemon
- https://github.com/CVEDB/PoC-List
- https://github.com/CVEDB/awesome-cve-repo
- https://github.com/Cruxer8Mech/Idk
- https://github.com/Juba0x4355/Blue-THM
- https://github.com/Juba0x4355/Blue-Writeup
- https://github.com/anmolksachan/MS12-020
+1
View File
@@ -21,6 +21,7 @@ The x86-64 kernel system-call functionality in Xen 4.1.2 and earlier, as used in
- https://github.com/Al1ex/Red-Team
- https://github.com/Apri1y/Red-Team-links
- https://github.com/Ascotbe/Kernelhub
- https://github.com/Cruxer8Mech/Idk
- https://github.com/Echocipher/Resource-list
- https://github.com/Flerov/WindowsExploitDev
- https://github.com/Ondrik8/RED-Team
+1
View File
@@ -29,6 +29,7 @@ libdbus 1.5.x and earlier, when used in setuid or other privileged programs in X
- https://github.com/Shadowshusky/linux-kernel-exploits
- https://github.com/Singlea-lyh/linux-kernel-exploits
- https://github.com/Snoopy-Sec/Localroot-ALL-CVE
- https://github.com/ZTK-009/linux-kernel-exploits
- https://github.com/albinjoshy03/linux-kernel-exploits
- https://github.com/alian87/linux-kernel-exploits
- https://github.com/coffee727/linux-exp
+1
View File
@@ -17,6 +17,7 @@ win32k.sys in the kernel-mode drivers in Microsoft Windows Vista SP2, Windows Se
- https://github.com/Al1ex/WindowsElevation
- https://github.com/Ascotbe/Kernelhub
- https://github.com/Crunchy0/Win_exploits
- https://github.com/Cruxer8Mech/Idk
- https://github.com/fei9747/WindowsElevation
- https://github.com/nitishbadole/oscp-note-2
- https://github.com/rmsbpro/rmsbpro
+1
View File
@@ -28,6 +28,7 @@ No PoCs from references.
- https://github.com/Shadowshusky/linux-kernel-exploits
- https://github.com/Singlea-lyh/linux-kernel-exploits
- https://github.com/Snoopy-Sec/Localroot-ALL-CVE
- https://github.com/ZTK-009/linux-kernel-exploits
- https://github.com/albinjoshy03/linux-kernel-exploits
- https://github.com/alian87/linux-kernel-exploits
- https://github.com/coffee727/linux-exp
+1
View File
@@ -18,6 +18,7 @@ win32k.sys in the kernel-mode drivers in Microsoft Windows XP SP2 and SP3, Windo
- https://github.com/Ascotbe/Kernelhub
- https://github.com/CVEDB/PoC-List
- https://github.com/CVEDB/awesome-cve-repo
- https://github.com/Cruxer8Mech/Idk
- https://github.com/JERRY123S/all-poc
- https://github.com/Meatballs1/cve-2013-1300
- https://github.com/cyberanand1337x/bug-bounty-2022
+1
View File
@@ -15,6 +15,7 @@ No PoCs from references.
#### Github
- https://github.com/Al1ex/WindowsElevation
- https://github.com/Ascotbe/Kernelhub
- https://github.com/Cruxer8Mech/Idk
- https://github.com/fei9747/WindowsElevation
- https://github.com/lyshark/Windows-exploits
- https://github.com/ycdxsb/WindowsPrivilegeEscalation
+1
View File
@@ -14,6 +14,7 @@ win32k.sys in the kernel-mode drivers in Microsoft Windows XP SP2 and SP3, Windo
#### Github
- https://github.com/Ascotbe/Kernelhub
- https://github.com/Cruxer8Mech/Idk
- https://github.com/lyshark/Windows-exploits
- https://github.com/ycdxsb/WindowsPrivilegeEscalation
+1
View File
@@ -32,6 +32,7 @@ Array index error in the __sock_diag_rcv_msg function in net/core/sock_diag.c in
- https://github.com/Singlea-lyh/linux-kernel-exploits
- https://github.com/Snoopy-Sec/Localroot-ALL-CVE
- https://github.com/Technoashofficial/kernel-exploitation-linux
- https://github.com/ZTK-009/linux-kernel-exploits
- https://github.com/albinjoshy03/linux-kernel-exploits
- https://github.com/alian87/linux-kernel-exploits
- https://github.com/anoaghost/Localroot_Compile
+1
View File
@@ -28,6 +28,7 @@ The clone system-call implementation in the Linux kernel before 3.8.3 does not p
- https://github.com/Shadowshusky/linux-kernel-exploits
- https://github.com/Singlea-lyh/linux-kernel-exploits
- https://github.com/Snoopy-Sec/Localroot-ALL-CVE
- https://github.com/ZTK-009/linux-kernel-exploits
- https://github.com/albinjoshy03/linux-kernel-exploits
- https://github.com/alian87/linux-kernel-exploits
- https://github.com/coffee727/linux-exp
+1
View File
@@ -45,6 +45,7 @@ The perf_swevent_init function in kernel/events/core.c in the Linux kernel befor
- https://github.com/Singlea-lyh/linux-kernel-exploits
- https://github.com/Snoopy-Sec/Localroot-ALL-CVE
- https://github.com/Technoashofficial/kernel-exploitation-linux
- https://github.com/ZTK-009/linux-kernel-exploits
- https://github.com/albinjoshy03/linux-kernel-exploits
- https://github.com/alian87/linux-kernel-exploits
- https://github.com/amane312/Linux_menthor
+1
View File
@@ -15,6 +15,7 @@ NDProxy.sys in the kernel in Microsoft Windows XP SP2 and SP3 and Server 2003 SP
#### Github
- https://github.com/Al1ex/WindowsElevation
- https://github.com/Ascotbe/Kernelhub
- https://github.com/Cruxer8Mech/Idk
- https://github.com/Friarfukd/RobbinHood
- https://github.com/Ostorlab/KEV
- https://github.com/Ostorlab/known_exploited_vulnerbilities_detectors
+1
View File
@@ -15,6 +15,7 @@ Directory traversal vulnerability in /res/I18nMsg,AjxMsg,ZMsg,ZmMsg,AjxKeys,ZmKe
#### Github
- https://github.com/ARPSyndicate/kenzer-templates
- https://github.com/ZTK-009/RedTeamer
- https://github.com/fengjixuchui/RedTeamer
- https://github.com/fnmsd/zimbra_poc
- https://github.com/password520/RedTeamer
+1
View File
@@ -38,6 +38,7 @@ The compat_sys_recvmmsg function in net/compat.c in the Linux kernel before 3.13
- https://github.com/Singlea-lyh/linux-kernel-exploits
- https://github.com/Snoopy-Sec/Localroot-ALL-CVE
- https://github.com/Technoashofficial/kernel-exploitation-linux
- https://github.com/ZTK-009/linux-kernel-exploits
- https://github.com/albinjoshy03/linux-kernel-exploits
- https://github.com/alian87/linux-kernel-exploits
- https://github.com/ambynotcoder/C-libraries
+1
View File
@@ -36,6 +36,7 @@ The n_tty_write function in drivers/tty/n_tty.c in the Linux kernel through 3.14
- https://github.com/Snoopy-Sec/Localroot-ALL-CVE
- https://github.com/SunRain/CVE-2014-0196
- https://github.com/Technoashofficial/kernel-exploitation-linux
- https://github.com/ZTK-009/linux-kernel-exploits
- https://github.com/albinjoshy03/linux-kernel-exploits
- https://github.com/alian87/linux-kernel-exploits
- https://github.com/anoaghost/Localroot_Compile
+1
View File
@@ -16,6 +16,7 @@ Double free vulnerability in the Ancillary Function Driver (AFD) in afd.sys in t
#### Github
- https://github.com/Al1ex/WindowsElevation
- https://github.com/Ascotbe/Kernelhub
- https://github.com/Cruxer8Mech/Idk
- https://github.com/ExploitCN/CVE-2014-1767-EXP-PAPER
- https://github.com/LegendSaber/exp
- https://github.com/ThunderJie/CVE
+1
View File
@@ -45,6 +45,7 @@ The default configuration in Elasticsearch before 1.2 enables dynamic scripting,
- https://github.com/SexyBeast233/SecBooks
- https://github.com/ToonyLoony/OpenVAS_Project
- https://github.com/Z0fhack/Goby_POC
- https://github.com/ZTK-009/RedTeamer
- https://github.com/ahm3dhany/IDS-Evasion
- https://github.com/akusilvennoinen/cybersecuritybase-project-2
- https://github.com/amcai/myscan
+1
View File
@@ -43,6 +43,7 @@ No PoCs from references.
- https://github.com/Singlea-lyh/linux-kernel-exploits
- https://github.com/Snoopy-Sec/Localroot-ALL-CVE
- https://github.com/Technoashofficial/kernel-exploitation-linux
- https://github.com/ZTK-009/linux-kernel-exploits
- https://github.com/albinjoshy03/linux-kernel-exploits
- https://github.com/alian87/linux-kernel-exploits
- https://github.com/ambynotcoder/C-libraries
+1
View File
@@ -30,6 +30,7 @@ The capabilities implementation in the Linux kernel before 3.14.8 does not prope
- https://github.com/Singlea-lyh/linux-kernel-exploits
- https://github.com/Snoopy-Sec/Localroot-ALL-CVE
- https://github.com/Technoashofficial/kernel-exploitation-linux
- https://github.com/ZTK-009/linux-kernel-exploits
- https://github.com/albinjoshy03/linux-kernel-exploits
- https://github.com/alian87/linux-kernel-exploits
- https://github.com/anoaghost/Localroot_Compile
+1
View File
@@ -16,6 +16,7 @@ Microsoft Windows Server 2003 SP2 allows local users to gain privileges via a cr
#### Github
- https://github.com/Al1ex/WindowsElevation
- https://github.com/Ascotbe/Kernelhub
- https://github.com/Cruxer8Mech/Idk
- https://github.com/fei9747/WindowsElevation
- https://github.com/fungoshacks/CVE-2014-4076
- https://github.com/lyshark/Windows-exploits
+1
View File
@@ -33,6 +33,7 @@ win32k.sys in the kernel-mode drivers in Microsoft Windows Server 2003 SP2, Wind
- https://github.com/CVEDB/awesome-cve-repo
- https://github.com/CVEDB/top
- https://github.com/CrackerCat/Kernel-Security-Development
- https://github.com/Cruxer8Mech/Idk
- https://github.com/Echocipher/Resource-list
- https://github.com/ExpLife0011/awesome-windows-kernel-security-development
- https://github.com/FULLSHADE/WindowsExploitationResources
+1
View File
@@ -53,6 +53,7 @@ Unspecified vulnerability in the Oracle WebLogic Server component in Oracle Fusi
- https://github.com/WingsSec/Meppo
- https://github.com/Z0fhack/Goby_POC
- https://github.com/ZH3FENG/Weblogic_SSRF
- https://github.com/ZTK-009/RedTeamer
- https://github.com/Zero094/Vulnerability-verification
- https://github.com/assetnote/blind-ssrf-chains
- https://github.com/asw3asw/SSRF
+1
View File
@@ -34,6 +34,7 @@ The Linux kernel before 3.15.4 on Intel processors does not properly restrict us
- https://github.com/Singlea-lyh/linux-kernel-exploits
- https://github.com/Snoopy-Sec/Localroot-ALL-CVE
- https://github.com/Technoashofficial/kernel-exploitation-linux
- https://github.com/ZTK-009/linux-kernel-exploits
- https://github.com/albinjoshy03/linux-kernel-exploits
- https://github.com/alian87/linux-kernel-exploits
- https://github.com/anoaghost/Localroot_Compile

Some files were not shown because too many files have changed in this diff Show More