Exploits from Github
577 subscribers
1 photo
679 files
3.62K links
Download Telegram
CVE-2017-1000353.zip
16.7 KB
CVE-2017-1000353
Author: Jelc0Doesbruf

Jenkins versions 2.56 and earlier as well as 2.46.1 LTS and earlier are vulnerable to an unauthenticated remote code execution. An unauthenticated remote code execution vulnerability allowed attackers to transfer a serialized Java SignedObject object to the Jenkins CLI, that would be deserialized using a new ObjectInputStream, bypassing the existing blacklist-based protection mechanism. We're fixing this issue by adding SignedObject to the blacklist. We're also backporting the new HTTP CLI protocol from Jenkins 2.54 to LTS 2.46.2, and deprecating the remoting-based (i.e. Java serialization) CLI protocol, disabling it by default.

GitHub Link:
https://github.com/Jelc0Doesbruf/CVE-2017-1000353
CVE-2021-3493.zip
1.9 KB
CVE-2021-3493
Author: cyberx-1

The overlayfs implementation in the linux kernel did not properly validate with respect to user namespaces the setting of file capabilities on files in an underlying file system. Due to the combination of unprivileged user namespaces along with a patch carried in the Ubuntu kernel to allow unprivileged overlay mounts, an attacker could use this to gain elevated privileges.

GitHub Link:
https://github.com/cyberx-1/OverlayFS-CVE-2021-3493
CVE-2022-0001.zip
2.6 KB
CVE-2022-0001
Author: Sabecomoeh

Non-transparent sharing of branch predictor selectors between contexts in some Intel(R) Processors may allow an authorized user to potentially enable information disclosure via local access.

GitHub Link:
https://github.com/Sabecomoeh/CVE-2022-0001
CVE-2024-3094.zip
14.7 KB
CVE-2024-3094
Author: ThomRgn

Malicious code was discovered in the upstream tarballs of xz, starting with version 5.6.0. The tarballs included extra .m4 files, which contained instructions for building with automake that did not exist in the repository. These instructions, through a series of complex obfuscations, extract a prebuilt object file from one of the test archives, which is then used to modify specific functions in the code while building the liblzma package. This issue results in liblzma being used by additional software, like sshd, to provide functionality that will be interpreted by the modified functions.

GitHub Link:
https://github.com/ThomRgn/xzutilsbackdoorobfuscation