CVE-2017-1000353.zip
16.7 KB
CVE-2017-1000353
Author: Jelc0Doesbruf
Jenkins versions 2.56 and earlier as well as 2.46.1 LTS and earlier are vulnerable to an unauthenticated remote code execution. An unauthenticated remote code execution vulnerability allowed attackers to transfer a serialized Java
GitHub Link:
https://github.com/Jelc0Doesbruf/CVE-2017-1000353
Author: Jelc0Doesbruf
Jenkins versions 2.56 and earlier as well as 2.46.1 LTS and earlier are vulnerable to an unauthenticated remote code execution. An unauthenticated remote code execution vulnerability allowed attackers to transfer a serialized Java
SignedObject
object to the Jenkins CLI, that would be deserialized using a new ObjectInputStream
, bypassing the existing blacklist-based protection mechanism. We're fixing this issue by adding SignedObject
to the blacklist. We're also backporting the new HTTP CLI protocol from Jenkins 2.54 to LTS 2.46.2, and deprecating the remoting-based (i.e. Java serialization) CLI protocol, disabling it by default.GitHub Link:
https://github.com/Jelc0Doesbruf/CVE-2017-1000353
🔥1
CVE-2021-3493.zip
1.9 KB
CVE-2021-3493
Author: cyberx-1
The overlayfs implementation in the linux kernel did not properly validate with respect to user namespaces the setting of file capabilities on files in an underlying file system. Due to the combination of unprivileged user namespaces along with a patch carried in the Ubuntu kernel to allow unprivileged overlay mounts, an attacker could use this to gain elevated privileges.
GitHub Link:
https://github.com/cyberx-1/OverlayFS-CVE-2021-3493
Author: cyberx-1
The overlayfs implementation in the linux kernel did not properly validate with respect to user namespaces the setting of file capabilities on files in an underlying file system. Due to the combination of unprivileged user namespaces along with a patch carried in the Ubuntu kernel to allow unprivileged overlay mounts, an attacker could use this to gain elevated privileges.
GitHub Link:
https://github.com/cyberx-1/OverlayFS-CVE-2021-3493
CVE-2022-0001.zip
2.6 KB
CVE-2022-0001
Author: Sabecomoeh
Non-transparent sharing of branch predictor selectors between contexts in some Intel(R) Processors may allow an authorized user to potentially enable information disclosure via local access.
GitHub Link:
https://github.com/Sabecomoeh/CVE-2022-0001
Author: Sabecomoeh
Non-transparent sharing of branch predictor selectors between contexts in some Intel(R) Processors may allow an authorized user to potentially enable information disclosure via local access.
GitHub Link:
https://github.com/Sabecomoeh/CVE-2022-0001
CVE-2024-3094.zip
14.7 KB
CVE-2024-3094
Author: ThomRgn
Malicious code was discovered in the upstream tarballs of xz, starting with version 5.6.0. The tarballs included extra .m4 files, which contained instructions for building with automake that did not exist in the repository. These instructions, through a series of complex obfuscations, extract a prebuilt object file from one of the test archives, which is then used to modify specific functions in the code while building the liblzma package. This issue results in liblzma being used by additional software, like sshd, to provide functionality that will be interpreted by the modified functions.
GitHub Link:
https://github.com/ThomRgn/xzutilsbackdoorobfuscation
Author: ThomRgn
Malicious code was discovered in the upstream tarballs of xz, starting with version 5.6.0. The tarballs included extra .m4 files, which contained instructions for building with automake that did not exist in the repository. These instructions, through a series of complex obfuscations, extract a prebuilt object file from one of the test archives, which is then used to modify specific functions in the code while building the liblzma package. This issue results in liblzma being used by additional software, like sshd, to provide functionality that will be interpreted by the modified functions.
GitHub Link:
https://github.com/ThomRgn/xzutilsbackdoorobfuscation
CVE-2025-53072.zip
2 KB
CVE-2025-53072
Author: RedFoxNxploits
None
GitHub Link:
https://github.com/RedFoxNxploits/CVE-2025-53072
Author: RedFoxNxploits
None
GitHub Link:
https://github.com/RedFoxNxploits/CVE-2025-53072