CVE-2021-3493.zip
1.9 KB
CVE-2021-3493
Author: cyberx-1
The overlayfs implementation in the linux kernel did not properly validate with respect to user namespaces the setting of file capabilities on files in an underlying file system. Due to the combination of unprivileged user namespaces along with a patch carried in the Ubuntu kernel to allow unprivileged overlay mounts, an attacker could use this to gain elevated privileges.
GitHub Link:
https://github.com/cyberx-1/OverlayFS-CVE-2021-3493
Author: cyberx-1
The overlayfs implementation in the linux kernel did not properly validate with respect to user namespaces the setting of file capabilities on files in an underlying file system. Due to the combination of unprivileged user namespaces along with a patch carried in the Ubuntu kernel to allow unprivileged overlay mounts, an attacker could use this to gain elevated privileges.
GitHub Link:
https://github.com/cyberx-1/OverlayFS-CVE-2021-3493
CVE-2022-0001.zip
2.6 KB
CVE-2022-0001
Author: Sabecomoeh
Non-transparent sharing of branch predictor selectors between contexts in some Intel(R) Processors may allow an authorized user to potentially enable information disclosure via local access.
GitHub Link:
https://github.com/Sabecomoeh/CVE-2022-0001
Author: Sabecomoeh
Non-transparent sharing of branch predictor selectors between contexts in some Intel(R) Processors may allow an authorized user to potentially enable information disclosure via local access.
GitHub Link:
https://github.com/Sabecomoeh/CVE-2022-0001
CVE-2024-3094.zip
14.7 KB
CVE-2024-3094
Author: ThomRgn
Malicious code was discovered in the upstream tarballs of xz, starting with version 5.6.0. The tarballs included extra .m4 files, which contained instructions for building with automake that did not exist in the repository. These instructions, through a series of complex obfuscations, extract a prebuilt object file from one of the test archives, which is then used to modify specific functions in the code while building the liblzma package. This issue results in liblzma being used by additional software, like sshd, to provide functionality that will be interpreted by the modified functions.
GitHub Link:
https://github.com/ThomRgn/xzutilsbackdoorobfuscation
Author: ThomRgn
Malicious code was discovered in the upstream tarballs of xz, starting with version 5.6.0. The tarballs included extra .m4 files, which contained instructions for building with automake that did not exist in the repository. These instructions, through a series of complex obfuscations, extract a prebuilt object file from one of the test archives, which is then used to modify specific functions in the code while building the liblzma package. This issue results in liblzma being used by additional software, like sshd, to provide functionality that will be interpreted by the modified functions.
GitHub Link:
https://github.com/ThomRgn/xzutilsbackdoorobfuscation
CVE-2025-53072.zip
2 KB
CVE-2025-53072
Author: RedFoxNxploits
None
GitHub Link:
https://github.com/RedFoxNxploits/CVE-2025-53072
Author: RedFoxNxploits
None
GitHub Link:
https://github.com/RedFoxNxploits/CVE-2025-53072
CVE-2024-38063.zip
8.7 KB
CVE-2024-38063
Author: akozsentre
Windows TCP/IP Remote Code Execution Vulnerability
GitHub Link:
https://github.com/akozsentre/CVE-2024-38063
Author: akozsentre
Windows TCP/IP Remote Code Execution Vulnerability
GitHub Link:
https://github.com/akozsentre/CVE-2024-38063
CVE-2019-18935.zip
71.4 KB
CVE-2019-18935
Author: menashe12346
Progress Telerik UI for ASP.NET AJAX through 2019.3.1023 contains a .NET deserialization vulnerability in the RadAsyncUpload function. This is exploitable when the encryption keys are known due to the presence of CVE-2017-11317 or CVE-2017-11357, or other means. Exploitation can result in remote code execution. (As of 2020.1.114, a default setting prevents the exploit. In 2019.3.1023, but not earlier versions, a non-default setting can prevent exploitation.)
GitHub Link:
https://github.com/menashe12346/CVE-2019-18935
Author: menashe12346
Progress Telerik UI for ASP.NET AJAX through 2019.3.1023 contains a .NET deserialization vulnerability in the RadAsyncUpload function. This is exploitable when the encryption keys are known due to the presence of CVE-2017-11317 or CVE-2017-11357, or other means. Exploitation can result in remote code execution. (As of 2020.1.114, a default setting prevents the exploit. In 2019.3.1023, but not earlier versions, a non-default setting can prevent exploitation.)
GitHub Link:
https://github.com/menashe12346/CVE-2019-18935