mirror of
https://github.com/0xMarcio/cve.git
synced 2026-04-21 09:56:14 +02:00
1.8 KiB
1.8 KiB
CVE-2017-15906
Description
The process_open function in sftp-server.c in OpenSSH before 7.6 does not properly prevent write operations in readonly mode, which allows attackers to create zero-length files.
POC
Reference
- https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf
- https://www.oracle.com/security-alerts/cpujan2020.html
Github
- https://github.com/482949203/Nmap-manual
- https://github.com/ARPSyndicate/cvemon
- https://github.com/FishyStix12/WHPython_v1.02
- https://github.com/FishyStix12/WHPython_v1.1
- https://github.com/Maribel0370/Nebula-io
- https://github.com/Milkad0/DC-4_VulnHub
- https://github.com/NeoOniX/5ATTACK
- https://github.com/ProTechEx/asn
- https://github.com/bioly230/THM_Skynet
- https://github.com/firatesatoglu/shodanSearch
- https://github.com/fujiokayu/nmap-nvd-script
- https://github.com/krlabs/openssh-vulnerabilities
- https://github.com/lacysw/RandScan
- https://github.com/lekctut/sdb-hw-13-01
- https://github.com/nitefood/asn
- https://github.com/pedr0alencar/vlab-metasploitable2
- https://github.com/project7io/nmap
- https://github.com/rahadhasan666/ASN_IP_LOOKUP
- https://github.com/swlacy/RandScan
- https://github.com/syadg123/pigat
- https://github.com/teamssix/pigat
- https://github.com/vshaliii/Basic-Pentesting-2-Vulnhub-Walkthrough
- https://github.com/vshaliii/DC-1-Vulnhub-Walkthrough
- https://github.com/vshaliii/DC-2-Vulnhub-Walkthrough
- https://github.com/vshaliii/DC-4-Vulnhub-Walkthrough