CVE-2015-2291.zip
3.8 MB
CVE-2015-2291
Author: paysonism
(1) IQVW32.sys before 1.3.1.0 and (2) IQVW64.sys before 1.3.1.0 in the Intel Ethernet diagnostics driver for Windows allows local users to cause a denial of service or possibly execute arbitrary code with kernel privileges via a crafted (a) 0x80862013, (b) 0x8086200B, (c) 0x8086200F, or (d) 0x80862007 IOCTL call.
GitHub Link:
https://github.com/paysonism/CVE-2015-2291-Spoofer-Analysis
Author: paysonism
(1) IQVW32.sys before 1.3.1.0 and (2) IQVW64.sys before 1.3.1.0 in the Intel Ethernet diagnostics driver for Windows allows local users to cause a denial of service or possibly execute arbitrary code with kernel privileges via a crafted (a) 0x80862013, (b) 0x8086200B, (c) 0x8086200F, or (d) 0x80862007 IOCTL call.
GitHub Link:
https://github.com/paysonism/CVE-2015-2291-Spoofer-Analysis
CVE-2024-23897.zip
3.2 KB
CVE-2024-23897
Author: wvverez
Jenkins 2.441 and earlier, LTS 2.426.2 and earlier does not disable a feature of its CLI command parser that replaces an '@' character followed by a file path in an argument with the file's contents, allowing unauthenticated attackers to read arbitrary files on the Jenkins controller file system.
GitHub Link:
https://github.com/wvverez/CVE-2024-23897
Author: wvverez
Jenkins 2.441 and earlier, LTS 2.426.2 and earlier does not disable a feature of its CLI command parser that replaces an '@' character followed by a file path in an argument with the file's contents, allowing unauthenticated attackers to read arbitrary files on the Jenkins controller file system.
GitHub Link:
https://github.com/wvverez/CVE-2024-23897
CVE-2015-3306.zip
470.8 KB
CVE-2015-3306
Author: canpilayda
The modcopy module in ProFTPD 1.3.5 allows remote attackers to read and write to arbitrary files via the site cpfr and site cpto commands.
GitHub Link:
https://github.com/canpilayda/proftpd-modcopy-cve-2015-3306
Author: canpilayda
The modcopy module in ProFTPD 1.3.5 allows remote attackers to read and write to arbitrary files via the site cpfr and site cpto commands.
GitHub Link:
https://github.com/canpilayda/proftpd-modcopy-cve-2015-3306
CVE-2026-22812
Author: barrersoftware
None
GitHub Link:
https://github.com/barrersoftware/opencode-secure
Author: barrersoftware
None
GitHub Link:
https://github.com/barrersoftware/opencode-secure
CVE-2017-14980
Author: pseudo-securite
Buffer overflow in Sync Breeze Enterprise 10.0.28 allows remote attackers to have unspecified impact via a long username parameter to /login.
GitHub Link:
https://github.com/pseudo-securite/CVE-2017-14980
Author: pseudo-securite
Buffer overflow in Sync Breeze Enterprise 10.0.28 allows remote attackers to have unspecified impact via a long username parameter to /login.
GitHub Link:
https://github.com/pseudo-securite/CVE-2017-14980
CVE-2019-5736.zip
559.6 KB
CVE-2019-5736
Author: sastraadiwiguna-purpleeliteteaming
runc through 1.0-rc6, as used in Docker before 18.09.2 and other products, allows attackers to overwrite the host runc binary (and consequently obtain host root access) by leveraging the ability to execute a command as root within one of these types of containers: (1) a new container with an attacker-controlled image, or (2) an existing container, to which the attacker previously had write access, that can be attached with docker exec. This occurs because of file-descriptor mishandling, related to /proc/self/exe.
GitHub Link:
https://github.com/sastraadiwiguna-purpleeliteteaming/Holistic-Deconstruction-of-CVE-2019-5736-
Author: sastraadiwiguna-purpleeliteteaming
runc through 1.0-rc6, as used in Docker before 18.09.2 and other products, allows attackers to overwrite the host runc binary (and consequently obtain host root access) by leveraging the ability to execute a command as root within one of these types of containers: (1) a new container with an attacker-controlled image, or (2) an existing container, to which the attacker previously had write access, that can be attached with docker exec. This occurs because of file-descriptor mishandling, related to /proc/self/exe.
GitHub Link:
https://github.com/sastraadiwiguna-purpleeliteteaming/Holistic-Deconstruction-of-CVE-2019-5736-