Skip to content

Commit

Permalink
Update CVE sources 2024-08-11 18:44
Browse files Browse the repository at this point in the history
  • Loading branch information
0xMarcio committed Aug 11, 2024
1 parent d527075 commit 8654f5a
Show file tree
Hide file tree
Showing 298 changed files with 1,171 additions and 54 deletions.
1 change: 1 addition & 0 deletions 2004/CVE-2004-0077.md
Original file line number Diff line number Diff line change
Expand Up @@ -53,6 +53,7 @@ The do_mremap function for the mremap system call in Linux 2.2 to 2.2.25, 2.4 to
- https://github.com/knd06/linux-kernel-exploitation
- https://github.com/kumardineshwar/linux-kernel-exploits
- https://github.com/m0mkris/linux-kernel-exploits
- https://github.com/ndk06/linux-kernel-exploitation
- https://github.com/ndk191/linux-kernel-exploitation
- https://github.com/ozkanbilge/Linux-Kernel-Exploits
- https://github.com/p00h00/linux-exploits
Expand Down
1 change: 1 addition & 0 deletions 2007/CVE-2007-4573.md
Original file line number Diff line number Diff line change
Expand Up @@ -24,6 +24,7 @@ The IA32 system call emulation functionality in Linux kernel 2.4.x and 2.6.x bef
- https://github.com/khanhhdz06/linux-kernel-exploitation
- https://github.com/khanhnd123/linux-kernel-exploitation
- https://github.com/knd06/linux-kernel-exploitation
- https://github.com/ndk06/linux-kernel-exploitation
- https://github.com/ndk191/linux-kernel-exploitation
- https://github.com/skbasava/Linux-Kernel-exploit
- https://github.com/ssr-111/linux-kernel-exploitation
Expand Down
1 change: 1 addition & 0 deletions 2007/CVE-2007-5846.md
Original file line number Diff line number Diff line change
Expand Up @@ -10,6 +10,7 @@ The SNMP agent (snmp_agent.c) in net-snmp before 5.4.1 allows remote attackers t
### POC

#### Reference
- http://www.ubuntu.com/usn/usn-564-1
- https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA43730

#### Github
Expand Down
1 change: 1 addition & 0 deletions 2008/CVE-2008-0009.md
Original file line number Diff line number Diff line change
Expand Up @@ -24,6 +24,7 @@ No PoCs from references.
- https://github.com/khanhhdz06/linux-kernel-exploitation
- https://github.com/khanhnd123/linux-kernel-exploitation
- https://github.com/knd06/linux-kernel-exploitation
- https://github.com/ndk06/linux-kernel-exploitation
- https://github.com/ndk191/linux-kernel-exploitation
- https://github.com/skbasava/Linux-Kernel-exploit
- https://github.com/ssr-111/linux-kernel-exploitation
Expand Down
1 change: 1 addition & 0 deletions 2008/CVE-2008-0010.md
Original file line number Diff line number Diff line change
Expand Up @@ -24,6 +24,7 @@ The copy_from_user_mmap_sem function in fs/splice.c in the Linux kernel 2.6.22 t
- https://github.com/khanhhdz06/linux-kernel-exploitation
- https://github.com/khanhnd123/linux-kernel-exploitation
- https://github.com/knd06/linux-kernel-exploitation
- https://github.com/ndk06/linux-kernel-exploitation
- https://github.com/ndk191/linux-kernel-exploitation
- https://github.com/skbasava/Linux-Kernel-exploit
- https://github.com/ssr-111/linux-kernel-exploitation
Expand Down
1 change: 1 addition & 0 deletions 2008/CVE-2008-0600.md
Original file line number Diff line number Diff line change
Expand Up @@ -51,6 +51,7 @@ The vmsplice_to_pipe function in Linux kernel 2.6.17 through 2.6.24.1 does not v
- https://github.com/knd06/linux-kernel-exploitation
- https://github.com/kumardineshwar/linux-kernel-exploits
- https://github.com/m0mkris/linux-kernel-exploits
- https://github.com/ndk06/linux-kernel-exploitation
- https://github.com/ndk191/linux-kernel-exploitation
- https://github.com/ozkanbilge/Linux-Kernel-Exploits
- https://github.com/p00h00/linux-exploits
Expand Down
1 change: 1 addition & 0 deletions 2009/CVE-2009-0065.md
Original file line number Diff line number Diff line change
Expand Up @@ -24,6 +24,7 @@ No PoCs from references.
- https://github.com/khanhhdz06/linux-kernel-exploitation
- https://github.com/khanhnd123/linux-kernel-exploitation
- https://github.com/knd06/linux-kernel-exploitation
- https://github.com/ndk06/linux-kernel-exploitation
- https://github.com/ndk191/linux-kernel-exploitation
- https://github.com/skbasava/Linux-Kernel-exploit
- https://github.com/ssr-111/linux-kernel-exploitation
Expand Down
1 change: 1 addition & 0 deletions 2009/CVE-2009-1046.md
Original file line number Diff line number Diff line change
Expand Up @@ -24,6 +24,7 @@ No PoCs from references.
- https://github.com/khanhhdz06/linux-kernel-exploitation
- https://github.com/khanhnd123/linux-kernel-exploitation
- https://github.com/knd06/linux-kernel-exploitation
- https://github.com/ndk06/linux-kernel-exploitation
- https://github.com/ndk191/linux-kernel-exploitation
- https://github.com/skbasava/Linux-Kernel-exploit
- https://github.com/ssr-111/linux-kernel-exploitation
Expand Down
1 change: 1 addition & 0 deletions 2009/CVE-2009-2692.md
Original file line number Diff line number Diff line change
Expand Up @@ -59,6 +59,7 @@ The Linux kernel 2.6.0 through 2.6.30.4, and 2.4.4 through 2.4.37.4, does not in
- https://github.com/kumardineshwar/linux-kernel-exploits
- https://github.com/m0mkris/linux-kernel-exploits
- https://github.com/moshekaplan/pentesting_notes
- https://github.com/ndk06/linux-kernel-exploitation
- https://github.com/ndk191/linux-kernel-exploitation
- https://github.com/ozkanbilge/Linux-Kernel-Exploits
- https://github.com/p00h00/linux-exploits
Expand Down
1 change: 1 addition & 0 deletions 2009/CVE-2009-2910.md
Original file line number Diff line number Diff line change
Expand Up @@ -24,6 +24,7 @@ No PoCs from references.
- https://github.com/khanhhdz06/linux-kernel-exploitation
- https://github.com/khanhnd123/linux-kernel-exploitation
- https://github.com/knd06/linux-kernel-exploitation
- https://github.com/ndk06/linux-kernel-exploitation
- https://github.com/ndk191/linux-kernel-exploitation
- https://github.com/skbasava/Linux-Kernel-exploit
- https://github.com/ssr-111/linux-kernel-exploitation
Expand Down
1 change: 1 addition & 0 deletions 2009/CVE-2009-3001.md
Original file line number Diff line number Diff line change
Expand Up @@ -24,6 +24,7 @@ No PoCs from references.
- https://github.com/khanhhdz06/linux-kernel-exploitation
- https://github.com/khanhnd123/linux-kernel-exploitation
- https://github.com/knd06/linux-kernel-exploitation
- https://github.com/ndk06/linux-kernel-exploitation
- https://github.com/ndk191/linux-kernel-exploitation
- https://github.com/skbasava/Linux-Kernel-exploit
- https://github.com/ssr-111/linux-kernel-exploitation
Expand Down
1 change: 1 addition & 0 deletions 2010/CVE-2010-2240.md
Original file line number Diff line number Diff line change
Expand Up @@ -24,6 +24,7 @@ The do_anonymous_page function in mm/memory.c in the Linux kernel before 2.6.27.
- https://github.com/khanhhdz06/linux-kernel-exploitation
- https://github.com/khanhnd123/linux-kernel-exploitation
- https://github.com/knd06/linux-kernel-exploitation
- https://github.com/ndk06/linux-kernel-exploitation
- https://github.com/ndk191/linux-kernel-exploitation
- https://github.com/ssr-111/linux-kernel-exploitation
- https://github.com/wkhnh06/linux-kernel-exploitation
Expand Down
1 change: 1 addition & 0 deletions 2010/CVE-2010-2959.md
Original file line number Diff line number Diff line change
Expand Up @@ -84,6 +84,7 @@ No PoCs from references.
- https://github.com/mmt55/kalilinux
- https://github.com/monkeysm8/OSCP_HELP
- https://github.com/mudongliang/LinuxFlaw
- https://github.com/ndk06/linux-kernel-exploitation
- https://github.com/ndk191/linux-kernel-exploitation
- https://github.com/nitishbadole/hacking_30
- https://github.com/oneoy/cve-
Expand Down
1 change: 1 addition & 0 deletions 2010/CVE-2010-2963.md
Original file line number Diff line number Diff line change
Expand Up @@ -24,6 +24,7 @@ drivers/media/video/v4l2-compat-ioctl32.c in the Video4Linux (V4L) implementatio
- https://github.com/khanhhdz06/linux-kernel-exploitation
- https://github.com/khanhnd123/linux-kernel-exploitation
- https://github.com/knd06/linux-kernel-exploitation
- https://github.com/ndk06/linux-kernel-exploitation
- https://github.com/ndk191/linux-kernel-exploitation
- https://github.com/skbasava/Linux-Kernel-exploit
- https://github.com/ssr-111/linux-kernel-exploitation
Expand Down
1 change: 1 addition & 0 deletions 2010/CVE-2010-3081.md
Original file line number Diff line number Diff line change
Expand Up @@ -55,6 +55,7 @@ The compat_alloc_user_space functions in include/asm/compat.h files in the Linux
- https://github.com/knd06/linux-kernel-exploitation
- https://github.com/kumardineshwar/linux-kernel-exploits
- https://github.com/m0mkris/linux-kernel-exploits
- https://github.com/ndk06/linux-kernel-exploitation
- https://github.com/ndk191/linux-kernel-exploitation
- https://github.com/ozkanbilge/Linux-Kernel-Exploits
- https://github.com/p00h00/linux-exploits
Expand Down
1 change: 1 addition & 0 deletions 2010/CVE-2010-3301.md
Original file line number Diff line number Diff line change
Expand Up @@ -54,6 +54,7 @@ The IA32 system call emulation functionality in arch/x86/ia32/ia32entry.S in the
- https://github.com/knd06/linux-kernel-exploitation
- https://github.com/kumardineshwar/linux-kernel-exploits
- https://github.com/m0mkris/linux-kernel-exploits
- https://github.com/ndk06/linux-kernel-exploitation
- https://github.com/ndk191/linux-kernel-exploitation
- https://github.com/ozkanbilge/Linux-Kernel-Exploits
- https://github.com/p00h00/linux-exploits
Expand Down
1 change: 1 addition & 0 deletions 2010/CVE-2010-3437.md
Original file line number Diff line number Diff line change
Expand Up @@ -52,6 +52,7 @@ Integer signedness error in the pkt_find_dev_from_minor function in drivers/bloc
- https://github.com/knd06/linux-kernel-exploitation
- https://github.com/kumardineshwar/linux-kernel-exploits
- https://github.com/m0mkris/linux-kernel-exploits
- https://github.com/ndk06/linux-kernel-exploitation
- https://github.com/ndk191/linux-kernel-exploitation
- https://github.com/ozkanbilge/Linux-Kernel-Exploits
- https://github.com/p00h00/linux-exploits
Expand Down
1 change: 1 addition & 0 deletions 2010/CVE-2010-4258.md
Original file line number Diff line number Diff line change
Expand Up @@ -57,6 +57,7 @@ The do_exit function in kernel/exit.c in the Linux kernel before 2.6.36.2 does n
- https://github.com/knd06/linux-kernel-exploitation
- https://github.com/kumardineshwar/linux-kernel-exploits
- https://github.com/m0mkris/linux-kernel-exploits
- https://github.com/ndk06/linux-kernel-exploitation
- https://github.com/ndk191/linux-kernel-exploitation
- https://github.com/ozkanbilge/Linux-Kernel-Exploits
- https://github.com/p00h00/linux-exploits
Expand Down
1 change: 1 addition & 0 deletions 2011/CVE-2011-1493.md
Original file line number Diff line number Diff line change
Expand Up @@ -24,6 +24,7 @@ No PoCs from references.
- https://github.com/khanhhdz06/linux-kernel-exploitation
- https://github.com/khanhnd123/linux-kernel-exploitation
- https://github.com/knd06/linux-kernel-exploitation
- https://github.com/ndk06/linux-kernel-exploitation
- https://github.com/ndk191/linux-kernel-exploitation
- https://github.com/skbasava/Linux-Kernel-exploit
- https://github.com/ssr-111/linux-kernel-exploitation
Expand Down
1 change: 1 addition & 0 deletions 2012/CVE-2012-0056.md
Original file line number Diff line number Diff line change
Expand Up @@ -114,6 +114,7 @@ No PoCs from references.
- https://github.com/mjutsu/OSCP
- https://github.com/mmt55/kalilinux
- https://github.com/monkeysm8/OSCP_HELP
- https://github.com/ndk06/linux-kernel-exploitation
- https://github.com/ndk191/linux-kernel-exploitation
- https://github.com/nitishbadole/hacking_30
- https://github.com/nmvuonginfosec/linux
Expand Down
17 changes: 17 additions & 0 deletions 2013/CVE-2013-10024.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,17 @@
### [CVE-2013-10024](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-10024)
![](https://img.shields.io/static/v1?label=Product&message=Exit%20Strategy%20Plugin&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=%3D%201.55%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-200%20Information%20Disclosure&color=brighgreen)

### Description

A vulnerability has been found in Exit Strategy Plugin 1.55 on WordPress and classified as problematic. Affected by this vulnerability is an unknown functionality of the file exitpage.php. The manipulation leads to information disclosure. The attack can be launched remotely. Upgrading to version 1.59 is able to address this issue. The identifier of the patch is d964b8e961b2634158719f3328f16eda16ce93ac. It is recommended to upgrade the affected component. The identifier VDB-225265 was assigned to this vulnerability.

### POC

#### Reference
No PoCs from references.

#### Github
- https://github.com/20142995/nuclei-templates

1 change: 1 addition & 0 deletions 2013/CVE-2013-1763.md
Original file line number Diff line number Diff line change
Expand Up @@ -55,6 +55,7 @@ Array index error in the __sock_diag_rcv_msg function in net/core/sock_diag.c in
- https://github.com/knd06/linux-kernel-exploitation
- https://github.com/kumardineshwar/linux-kernel-exploits
- https://github.com/m0mkris/linux-kernel-exploits
- https://github.com/ndk06/linux-kernel-exploitation
- https://github.com/ndk191/linux-kernel-exploitation
- https://github.com/ozkanbilge/Linux-Kernel-Exploits
- https://github.com/password520/linux-kernel-exploits
Expand Down
1 change: 1 addition & 0 deletions 2013/CVE-2013-2094.md
Original file line number Diff line number Diff line change
Expand Up @@ -80,6 +80,7 @@ The perf_swevent_init function in kernel/events/core.c in the Linux kernel befor
- https://github.com/lushtree-cn-honeyzhao/awesome-c
- https://github.com/m0mkris/linux-kernel-exploits
- https://github.com/maririn312/Linux_menthor
- https://github.com/ndk06/linux-kernel-exploitation
- https://github.com/ndk191/linux-kernel-exploitation
- https://github.com/nmvuonginfosec/linux
- https://github.com/ozkanbilge/Linux-Kernel-Exploits
Expand Down
1 change: 1 addition & 0 deletions 2014/CVE-2014-0038.md
Original file line number Diff line number Diff line change
Expand Up @@ -67,6 +67,7 @@ The compat_sys_recvmmsg function in net/compat.c in the Linux kernel before 3.13
- https://github.com/kumardineshwar/linux-kernel-exploits
- https://github.com/lushtree-cn-honeyzhao/awesome-c
- https://github.com/m0mkris/linux-kernel-exploits
- https://github.com/ndk06/linux-kernel-exploitation
- https://github.com/ndk191/linux-kernel-exploitation
- https://github.com/ozkanbilge/Linux-Kernel-Exploits
- https://github.com/p00h00/linux-exploits
Expand Down
1 change: 1 addition & 0 deletions 2014/CVE-2014-0196.md
Original file line number Diff line number Diff line change
Expand Up @@ -61,6 +61,7 @@ The n_tty_write function in drivers/tty/n_tty.c in the Linux kernel through 3.14
- https://github.com/knd06/linux-kernel-exploitation
- https://github.com/kumardineshwar/linux-kernel-exploits
- https://github.com/m0mkris/linux-kernel-exploits
- https://github.com/ndk06/linux-kernel-exploitation
- https://github.com/ndk191/linux-kernel-exploitation
- https://github.com/ozkanbilge/Linux-Kernel-Exploits
- https://github.com/p00h00/linux-exploits
Expand Down
1 change: 1 addition & 0 deletions 2014/CVE-2014-2851.md
Original file line number Diff line number Diff line change
Expand Up @@ -25,6 +25,7 @@ No PoCs from references.
- https://github.com/khanhnd123/linux-kernel-exploitation
- https://github.com/knd06/linux-kernel-exploitation
- https://github.com/mudongliang/LinuxFlaw
- https://github.com/ndk06/linux-kernel-exploitation
- https://github.com/ndk191/linux-kernel-exploitation
- https://github.com/oneoy/cve-
- https://github.com/skbasava/Linux-Kernel-exploit
Expand Down
1 change: 1 addition & 0 deletions 2014/CVE-2014-3153.md
Original file line number Diff line number Diff line change
Expand Up @@ -82,6 +82,7 @@ No PoCs from references.
- https://github.com/lieanu/CVE-2014-3153
- https://github.com/lushtree-cn-honeyzhao/awesome-c
- https://github.com/m0mkris/linux-kernel-exploits
- https://github.com/ndk06/linux-kernel-exploitation
- https://github.com/ndk191/linux-kernel-exploitation
- https://github.com/ozkanbilge/Linux-Kernel-Exploits
- https://github.com/password520/linux-kernel-exploits
Expand Down
1 change: 1 addition & 0 deletions 2014/CVE-2014-4014.md
Original file line number Diff line number Diff line change
Expand Up @@ -53,6 +53,7 @@ The capabilities implementation in the Linux kernel before 3.14.8 does not prope
- https://github.com/knd06/linux-kernel-exploitation
- https://github.com/kumardineshwar/linux-kernel-exploits
- https://github.com/m0mkris/linux-kernel-exploits
- https://github.com/ndk06/linux-kernel-exploitation
- https://github.com/ndk191/linux-kernel-exploitation
- https://github.com/ozkanbilge/Linux-Kernel-Exploits
- https://github.com/password520/linux-kernel-exploits
Expand Down
1 change: 1 addition & 0 deletions 2014/CVE-2014-4322.md
Original file line number Diff line number Diff line change
Expand Up @@ -40,6 +40,7 @@ No PoCs from references.
- https://github.com/koozxcv/CVE-2014-7911-CVE-2014-4322_get_root_privilege
- https://github.com/laginimaineb/cve-2014-4322
- https://github.com/lushtree-cn-honeyzhao/awesome-c
- https://github.com/ndk06/linux-kernel-exploitation
- https://github.com/ndk191/linux-kernel-exploitation
- https://github.com/retme7/CVE-2014-4322_poc
- https://github.com/retme7/CVE-2014-7911_poc
Expand Down
1 change: 1 addition & 0 deletions 2014/CVE-2014-4699.md
Original file line number Diff line number Diff line change
Expand Up @@ -59,6 +59,7 @@ The Linux kernel before 3.15.4 on Intel processors does not properly restrict us
- https://github.com/kumardineshwar/linux-kernel-exploits
- https://github.com/m0mkris/linux-kernel-exploits
- https://github.com/msecrist-couchbase/smallcb-training-capella
- https://github.com/ndk06/linux-kernel-exploitation
- https://github.com/ndk191/linux-kernel-exploitation
- https://github.com/ozkanbilge/Linux-Kernel-Exploits
- https://github.com/password520/linux-kernel-exploits
Expand Down
1 change: 1 addition & 0 deletions 2014/CVE-2014-4943.md
Original file line number Diff line number Diff line change
Expand Up @@ -24,6 +24,7 @@ The PPPoL2TP feature in net/l2tp/l2tp_ppp.c in the Linux kernel through 3.15.6 a
- https://github.com/khanhhdz06/linux-kernel-exploitation
- https://github.com/khanhnd123/linux-kernel-exploitation
- https://github.com/knd06/linux-kernel-exploitation
- https://github.com/ndk06/linux-kernel-exploitation
- https://github.com/ndk191/linux-kernel-exploitation
- https://github.com/redes-2015/l2tp-socket-bug
- https://github.com/skbasava/Linux-Kernel-exploit
Expand Down
1 change: 1 addition & 0 deletions 2014/CVE-2014-9322.md
Original file line number Diff line number Diff line change
Expand Up @@ -31,6 +31,7 @@ arch/x86/kernel/entry_64.S in the Linux kernel before 3.17.5 does not properly h
- https://github.com/khanhhdz06/linux-kernel-exploitation
- https://github.com/khanhnd123/linux-kernel-exploitation
- https://github.com/knd06/linux-kernel-exploitation
- https://github.com/ndk06/linux-kernel-exploitation
- https://github.com/ndk191/linux-kernel-exploitation
- https://github.com/paulveillard/cybersecurity-exploit-development
- https://github.com/skbasava/Linux-Kernel-exploit
Expand Down
1 change: 1 addition & 0 deletions 2015/CVE-2015-0568.md
Original file line number Diff line number Diff line change
Expand Up @@ -23,6 +23,7 @@ No PoCs from references.
- https://github.com/khanhhdz06/linux-kernel-exploitation
- https://github.com/khanhnd123/linux-kernel-exploitation
- https://github.com/knd06/linux-kernel-exploitation
- https://github.com/ndk06/linux-kernel-exploitation
- https://github.com/ndk191/linux-kernel-exploitation
- https://github.com/ssr-111/linux-kernel-exploitation
- https://github.com/wkhnh06/linux-kernel-exploitation
Expand Down
1 change: 1 addition & 0 deletions 2015/CVE-2015-0570.md
Original file line number Diff line number Diff line change
Expand Up @@ -24,6 +24,7 @@ No PoCs from references.
- https://github.com/khanhhdz06/linux-kernel-exploitation
- https://github.com/khanhnd123/linux-kernel-exploitation
- https://github.com/knd06/linux-kernel-exploitation
- https://github.com/ndk06/linux-kernel-exploitation
- https://github.com/ndk191/linux-kernel-exploitation
- https://github.com/skbasava/Linux-Kernel-exploit
- https://github.com/ssr-111/linux-kernel-exploitation
Expand Down
1 change: 1 addition & 0 deletions 2015/CVE-2015-1805.md
Original file line number Diff line number Diff line change
Expand Up @@ -41,6 +41,7 @@ The (1) pipe_read and (2) pipe_write implementations in fs/pipe.c in the Linux k
- https://github.com/knd06/linux-kernel-exploitation
- https://github.com/makaitoushi/iovyroot_kyv37
- https://github.com/mobilelinux/iovy_root_research
- https://github.com/ndk06/linux-kernel-exploitation
- https://github.com/ndk191/linux-kernel-exploitation
- https://github.com/panyu6325/CVE-2015-1805
- https://github.com/skbasava/Linux-Kernel-exploit
Expand Down
1 change: 1 addition & 0 deletions 2015/CVE-2015-3636.md
Original file line number Diff line number Diff line change
Expand Up @@ -43,6 +43,7 @@ The ping_unhash function in net/ipv4/ping.c in the Linux kernel before 4.0.3 doe
- https://github.com/khanhnd123/linux-kernel-exploitation
- https://github.com/knd06/linux-kernel-exploitation
- https://github.com/ludongxu/cve-2015-3636
- https://github.com/ndk06/linux-kernel-exploitation
- https://github.com/ndk191/linux-kernel-exploitation
- https://github.com/ne2der/AKLab
- https://github.com/skbasava/Linux-Kernel-exploit
Expand Down
1 change: 1 addition & 0 deletions 2016/CVE-2016-0728.md
Original file line number Diff line number Diff line change
Expand Up @@ -74,6 +74,7 @@ The join_session_keyring function in security/keys/process_keys.c in the Linux k
- https://github.com/mfer/cve_2016_0728
- https://github.com/mudongliang/LinuxFlaw
- https://github.com/nardholio/cve-2016-0728
- https://github.com/ndk06/linux-kernel-exploitation
- https://github.com/ndk191/linux-kernel-exploitation
- https://github.com/neuschaefer/cve-2016-0728-testbed
- https://github.com/oneoy/cve-
Expand Down
1 change: 1 addition & 0 deletions 2016/CVE-2016-0819.md
Original file line number Diff line number Diff line change
Expand Up @@ -24,6 +24,7 @@ No PoCs from references.
- https://github.com/khanhhdz06/linux-kernel-exploitation
- https://github.com/khanhnd123/linux-kernel-exploitation
- https://github.com/knd06/linux-kernel-exploitation
- https://github.com/ndk06/linux-kernel-exploitation
- https://github.com/ndk191/linux-kernel-exploitation
- https://github.com/skbasava/Linux-Kernel-exploit
- https://github.com/ssr-111/linux-kernel-exploitation
Expand Down
1 change: 1 addition & 0 deletions 2016/CVE-2016-0820.md
Original file line number Diff line number Diff line change
Expand Up @@ -24,6 +24,7 @@ No PoCs from references.
- https://github.com/khanhhdz06/linux-kernel-exploitation
- https://github.com/khanhnd123/linux-kernel-exploitation
- https://github.com/knd06/linux-kernel-exploitation
- https://github.com/ndk06/linux-kernel-exploitation
- https://github.com/ndk191/linux-kernel-exploitation
- https://github.com/skbasava/Linux-Kernel-exploit
- https://github.com/ssr-111/linux-kernel-exploitation
Expand Down
1 change: 1 addition & 0 deletions 2016/CVE-2016-10277.md
Original file line number Diff line number Diff line change
Expand Up @@ -29,6 +29,7 @@ An elevation of privilege vulnerability in the Motorola bootloader could enable
- https://github.com/knd06/linux-kernel-exploitation
- https://github.com/leosol/initroot
- https://github.com/lnick2023/nicenice
- https://github.com/ndk06/linux-kernel-exploitation
- https://github.com/ndk191/linux-kernel-exploitation
- https://github.com/qazbnm456/awesome-cve-poc
- https://github.com/ssr-111/linux-kernel-exploitation
Expand Down
17 changes: 17 additions & 0 deletions 2016/CVE-2016-15027.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,17 @@
### [CVE-2016-15027](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-15027)
![](https://img.shields.io/static/v1?label=Product&message=Post%20Duplicator%20Plugin&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=%3D%202.18%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-79%20Cross%20Site%20Scripting&color=brighgreen)

### Description

A vulnerability was found in meta4creations Post Duplicator Plugin 2.18 on WordPress. It has been classified as problematic. Affected is the function mtphr_post_duplicator_notice of the file includes/notices.php. The manipulation of the argument post-duplicated leads to cross site scripting. It is possible to launch the attack remotely. Upgrading to version 2.19 is able to address this issue. The name of the patch is ca67c05e490c0cf93a1e9b2d93bfeff3dd96f594. It is recommended to upgrade the affected component. The identifier of this vulnerability is VDB-221496.

### POC

#### Reference
No PoCs from references.

#### Github
- https://github.com/20142995/nuclei-templates

1 change: 1 addition & 0 deletions 2016/CVE-2016-1583.md
Original file line number Diff line number Diff line change
Expand Up @@ -29,6 +29,7 @@ The ecryptfs_privileged_open function in fs/ecryptfs/kthread.c in the Linux kern
- https://github.com/khanhhdz06/linux-kernel-exploitation
- https://github.com/khanhnd123/linux-kernel-exploitation
- https://github.com/knd06/linux-kernel-exploitation
- https://github.com/ndk06/linux-kernel-exploitation
- https://github.com/ndk191/linux-kernel-exploitation
- https://github.com/skbasava/Linux-Kernel-exploit
- https://github.com/ssr-111/linux-kernel-exploitation
Expand Down
Loading

0 comments on commit 8654f5a

Please sign in to comment.