Exploits from Github
577 subscribers
1 photo
679 files
3.62K links
Download Telegram
CVE-2021-3493.zip
1.9 KB
CVE-2021-3493
Author: cyberx-1

The overlayfs implementation in the linux kernel did not properly validate with respect to user namespaces the setting of file capabilities on files in an underlying file system. Due to the combination of unprivileged user namespaces along with a patch carried in the Ubuntu kernel to allow unprivileged overlay mounts, an attacker could use this to gain elevated privileges.

GitHub Link:
https://github.com/cyberx-1/OverlayFS-CVE-2021-3493
CVE-2022-0001.zip
2.6 KB
CVE-2022-0001
Author: Sabecomoeh

Non-transparent sharing of branch predictor selectors between contexts in some Intel(R) Processors may allow an authorized user to potentially enable information disclosure via local access.

GitHub Link:
https://github.com/Sabecomoeh/CVE-2022-0001
CVE-2024-3094.zip
14.7 KB
CVE-2024-3094
Author: ThomRgn

Malicious code was discovered in the upstream tarballs of xz, starting with version 5.6.0. The tarballs included extra .m4 files, which contained instructions for building with automake that did not exist in the repository. These instructions, through a series of complex obfuscations, extract a prebuilt object file from one of the test archives, which is then used to modify specific functions in the code while building the liblzma package. This issue results in liblzma being used by additional software, like sshd, to provide functionality that will be interpreted by the modified functions.

GitHub Link:
https://github.com/ThomRgn/xzutilsbackdoorobfuscation