update old cve.mitre.org URL references
This commit is contained in:
parent
6853fce6f6
commit
451998644e
|
@ -3,7 +3,7 @@
|
|||
CVE-2004-1235
|
||||
|
||||
Vulnerability reference:
|
||||
* [CVE-2004-1235](http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=2004-1235)
|
||||
* [CVE-2004-1235](https://cve.mitre.org/cgi-bin/cvename.cgi?name=2004-1235)
|
||||
* [exp-db](https://www.exploit-db.com/exploits/744/)
|
||||
|
||||
## Kernels
|
||||
|
|
|
@ -3,7 +3,7 @@
|
|||
CVE-2005-0736
|
||||
|
||||
Vulnerability reference:
|
||||
* [CVE-2005-0736](http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=2005-0736)
|
||||
* [CVE-2005-0736](https://cve.mitre.org/cgi-bin/cvename.cgi?name=2005-0736)
|
||||
* [exp-db](https://www.exploit-db.com/exploits/1397/)
|
||||
|
||||
## Kernels
|
||||
|
|
|
@ -8,7 +8,7 @@ leading to a buffer overflow.
|
|||
```
|
||||
|
||||
Vulnerability reference:
|
||||
* [CVE-2005-1263](http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1263)
|
||||
* [CVE-2005-1263](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1263)
|
||||
* [exp-db](https://www.exploit-db.com/exploits/25647/)
|
||||
|
||||
## Kernels
|
||||
|
|
|
@ -3,7 +3,7 @@
|
|||
CVE-2006-2451
|
||||
|
||||
Vulnerability reference:
|
||||
* [CVE-2006-2451](http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=2006-2451)
|
||||
* [CVE-2006-2451](https://cve.mitre.org/cgi-bin/cvename.cgi?name=2006-2451)
|
||||
* [exp-db](http://www.exploit-db.com/exploits/2031/)
|
||||
|
||||
## Kernels
|
||||
|
|
|
@ -3,7 +3,7 @@
|
|||
CVE-2006-3626
|
||||
|
||||
Vulnerability reference:
|
||||
* [CVE-2006-3626](http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=2006-3626)
|
||||
* [CVE-2006-3626](https://cve.mitre.org/cgi-bin/cvename.cgi?name=2006-3626)
|
||||
* [exp-db](https://www.exploit-db.com/exploits/2013/)
|
||||
|
||||
## Kernels
|
||||
|
|
|
@ -3,7 +3,7 @@
|
|||
CVE-2008-0600
|
||||
|
||||
Vulnerability reference:
|
||||
* [CVE-2008-0600](http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=2008-0600)
|
||||
* [CVE-2008-0600](https://cve.mitre.org/cgi-bin/cvename.cgi?name=2008-0600)
|
||||
* [exp-db](https://www.exploit-db.com/exploits/5093/)
|
||||
|
||||
## Kernels
|
||||
|
|
|
@ -3,7 +3,7 @@
|
|||
CVE-2008-0900
|
||||
|
||||
Vulnerability reference:
|
||||
* [CVE-2008-0900](http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=2008-0900)
|
||||
* [CVE-2008-0900](https://cve.mitre.org/cgi-bin/cvename.cgi?name=2008-0900)
|
||||
* [exp-db](https://www.exploit-db.com/exploits/5092/)
|
||||
|
||||
## Kernels
|
||||
|
|
|
@ -3,7 +3,7 @@
|
|||
CVE-2008-4210
|
||||
|
||||
Vulnerability reference:
|
||||
* [CVE-2008-4210](http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=2008-4210)
|
||||
* [CVE-2008-4210](https://cve.mitre.org/cgi-bin/cvename.cgi?name=2008-4210)
|
||||
* [exp-db](https://www.exploit-db.com/exploits/6851/)
|
||||
|
||||
## Kernels
|
||||
|
|
|
@ -3,7 +3,7 @@
|
|||
CVE-2009-1185
|
||||
|
||||
Vulnerability reference:
|
||||
* [CVE-2009-1185](http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=2009-1185)
|
||||
* [CVE-2009-1185](https://cve.mitre.org/cgi-bin/cvename.cgi?name=2009-1185)
|
||||
* [exp-db](https://www.exploit-db.com/exploits/8478/)
|
||||
|
||||
## Kernels
|
||||
|
|
|
@ -3,7 +3,7 @@
|
|||
CVE-2009-1337
|
||||
|
||||
Vulnerability reference:
|
||||
* [CVE-2009-1337](http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=2009-1337)
|
||||
* [CVE-2009-1337](https://cve.mitre.org/cgi-bin/cvename.cgi?name=2009-1337)
|
||||
* [exp-db](https://www.exploit-db.com/exploits/8369/)
|
||||
|
||||
## Kernels
|
||||
|
|
|
@ -3,7 +3,7 @@
|
|||
CVE-2009-2692
|
||||
|
||||
Vulnerability reference:
|
||||
* [CVE-2009-2692](http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=2009-2692)
|
||||
* [CVE-2009-2692](https://cve.mitre.org/cgi-bin/cvename.cgi?name=2009-2692)
|
||||
* [exp-db](https://www.exploit-db.com/exploits/9435/)
|
||||
* [exp-db](https://www.exploit-db.com/exploits/9436/)
|
||||
|
||||
|
|
|
@ -3,7 +3,7 @@
|
|||
CVE-2009-2698
|
||||
|
||||
Vulnerability reference:
|
||||
* [CVE-2009-2698](http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=2009-2698)
|
||||
* [CVE-2009-2698](https://cve.mitre.org/cgi-bin/cvename.cgi?name=2009-2698)
|
||||
|
||||
## Kernels
|
||||
```
|
||||
|
|
|
@ -3,7 +3,7 @@
|
|||
CVE-2009-3547
|
||||
|
||||
Vulnerability reference:
|
||||
* [CVE-2009-3547](http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=2009-3547)
|
||||
* [CVE-2009-3547](https://cve.mitre.org/cgi-bin/cvename.cgi?name=2009-3547)
|
||||
|
||||
## Kernels
|
||||
```
|
||||
|
|
|
@ -3,7 +3,7 @@
|
|||
CVE-2010-0415
|
||||
|
||||
Vulnerability reference:
|
||||
* [CVE-2010-0415](http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=2010-0415)
|
||||
* [CVE-2010-0415](https://cve.mitre.org/cgi-bin/cvename.cgi?name=2010-0415)
|
||||
|
||||
## Kernels
|
||||
```
|
||||
|
|
|
@ -3,7 +3,7 @@
|
|||
CVE-2010-1146
|
||||
|
||||
Vulnerability reference:
|
||||
* [CVE-2010-1146](http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=2010-1146)
|
||||
* [CVE-2010-1146](https://cve.mitre.org/cgi-bin/cvename.cgi?name=2010-1146)
|
||||
* [exp-db](https://www.exploit-db.com/exploits/12130/)
|
||||
|
||||
## Kernels
|
||||
|
|
|
@ -3,7 +3,7 @@
|
|||
CVE-2010-2959
|
||||
|
||||
Vulnerability reference:
|
||||
* [CVE-2010-2959](http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=2010-2959)
|
||||
* [CVE-2010-2959](https://cve.mitre.org/cgi-bin/cvename.cgi?name=2010-2959)
|
||||
* [exp-db](http://www.exploit-db.com/exploits/14814/)
|
||||
|
||||
## Kernels
|
||||
|
|
|
@ -3,7 +3,7 @@
|
|||
CVE-2010-3081
|
||||
|
||||
Vulnerability reference:
|
||||
* [CVE-2010-3081](http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=2010-3081)
|
||||
* [CVE-2010-3081](https://cve.mitre.org/cgi-bin/cvename.cgi?name=2010-3081)
|
||||
* [exp-db](https://www.exploit-db.com/exploits/15024/)
|
||||
|
||||
## Kernels
|
||||
|
|
|
@ -3,7 +3,7 @@
|
|||
CVE-2010-3437
|
||||
|
||||
Vulnerability reference:
|
||||
* [CVE-2010-3437](http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=2010-3437)
|
||||
* [CVE-2010-3437](https://cve.mitre.org/cgi-bin/cvename.cgi?name=2010-3437)
|
||||
* [exp-db](https://www.exploit-db.com/exploits/15150/)
|
||||
|
||||
## Kernels
|
||||
|
|
|
@ -3,7 +3,7 @@
|
|||
CVE-2010-3904
|
||||
|
||||
Vulnerability reference:
|
||||
* [CVE-2010-3904](http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=2010-3904)
|
||||
* [CVE-2010-3904](https://cve.mitre.org/cgi-bin/cvename.cgi?name=2010-3904)
|
||||
* [exp-db](http://www.exploit-db.com/exploits/15285/)
|
||||
|
||||
## Kernels
|
||||
|
|
|
@ -3,7 +3,7 @@
|
|||
CVE-2010-4073
|
||||
|
||||
Vulnerability reference:
|
||||
* [CVE-2010-4073](http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=2010-4073)
|
||||
* [CVE-2010-4073](https://cve.mitre.org/cgi-bin/cvename.cgi?name=2010-4073)
|
||||
* [exp-db](https://www.exploit-db.com/exploits/17787/)
|
||||
|
||||
## Kernels
|
||||
|
|
|
@ -3,7 +3,7 @@
|
|||
CVE-2010-4258
|
||||
|
||||
Vulnerability reference:
|
||||
* [CVE-2010-4258](http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=2010-4258)
|
||||
* [CVE-2010-4258](https://cve.mitre.org/cgi-bin/cvename.cgi?name=2010-4258)
|
||||
* [exp-db](https://www.exploit-db.com/exploits/15704/)
|
||||
|
||||
## Kernels
|
||||
|
|
|
@ -3,7 +3,7 @@
|
|||
CVE-2012-0056
|
||||
|
||||
Vulnerability reference:
|
||||
* [CVE-2012-0056](http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=2012-0056)
|
||||
* [CVE-2012-0056](https://cve.mitre.org/cgi-bin/cvename.cgi?name=2012-0056)
|
||||
* [exp-db](http://www.exploit-db.com/exploits/18411/)
|
||||
|
||||
## Kernels
|
||||
|
|
|
@ -9,7 +9,7 @@ not in libdbus itself: "we do not support use of libdbus in setuid binaries that
|
|||
|
||||
|
||||
Vulnerability reference:
|
||||
* [CVE-2012-3524](http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3524)
|
||||
* [CVE-2012-3524](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3524)
|
||||
* [exp-db](https://www.exploit-db.com/exploits/21323/)
|
||||
|
||||
## libdbus
|
||||
|
|
|
@ -3,7 +3,7 @@
|
|||
CVE-2013-0268
|
||||
|
||||
Vulnerability reference:
|
||||
* [CVE-2013-0268](http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=2013-0268)
|
||||
* [CVE-2013-0268](https://cve.mitre.org/cgi-bin/cvename.cgi?name=2013-0268)
|
||||
* [exp-db](https://www.exploit-db.com/exploits/27297/)
|
||||
|
||||
## Kernels
|
||||
|
|
|
@ -3,7 +3,7 @@
|
|||
CVE-2013-2094
|
||||
|
||||
Vulnerability reference:
|
||||
* [CVE-2013-2094](http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=2013-2094)
|
||||
* [CVE-2013-2094](https://cve.mitre.org/cgi-bin/cvename.cgi?name=2013-2094)
|
||||
|
||||
## Kernels
|
||||
```
|
||||
|
|
|
@ -3,7 +3,7 @@
|
|||
CVE-2014-0038
|
||||
|
||||
Vulnerability reference:
|
||||
* [CVE-2014-0038](http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=2014-0038)
|
||||
* [CVE-2014-0038](https://cve.mitre.org/cgi-bin/cvename.cgi?name=2014-0038)
|
||||
* [exp-db](https://www.exploit-db.com/exploits/31347/)
|
||||
* [exp-db](https://www.exploit-db.com/exploits/31346/)
|
||||
|
||||
|
|
|
@ -3,7 +3,7 @@
|
|||
CVE-2014-0196
|
||||
|
||||
Vulnerability reference:
|
||||
* [CVE-2014-0196](http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=2014-0196)
|
||||
* [CVE-2014-0196](https://cve.mitre.org/cgi-bin/cvename.cgi?name=2014-0196)
|
||||
* [exp-db](https://www.exploit-db.com/exploits/33516/)
|
||||
## Kernels
|
||||
```
|
||||
|
|
|
@ -7,7 +7,7 @@ as demonstrated by setting the setgid bit on a file with group ownership of root
|
|||
|
||||
|
||||
Vulnerability reference:
|
||||
* [CVE-2014-4014](http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4014)
|
||||
* [CVE-2014-4014](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4014)
|
||||
* [exp-db](https://www.exploit-db.com/exploits/33824/)
|
||||
|
||||
## Kernels
|
||||
|
|
|
@ -3,7 +3,7 @@
|
|||
CVE-2014-4699
|
||||
|
||||
Vulnerability reference:
|
||||
* [CVE-2014-4699](http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4699)
|
||||
* [CVE-2014-4699](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4699)
|
||||
* [exp-db](https://www.exploit-db.com/exploits/34134/)
|
||||
|
||||
## Kernels
|
||||
|
|
|
@ -3,7 +3,7 @@
|
|||
CVE-2014-5284
|
||||
|
||||
Vulnerability reference:
|
||||
* [CVE-2014-5284](http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5284)
|
||||
* [CVE-2014-5284](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5284)
|
||||
* [exp-db](https://www.exploit-db.com/exploits/35234/)
|
||||
|
||||
|
||||
|
|
|
@ -3,7 +3,7 @@
|
|||
CVE-2015-7547
|
||||
|
||||
Vulnerability reference:
|
||||
* [CVE-2015-7547](http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7547)
|
||||
* [CVE-2015-7547](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7547)
|
||||
* [exp-db](https://www.exploit-db.com/exploits/39454/)
|
||||
|
||||
## Glibc
|
||||
|
|
|
@ -3,7 +3,7 @@
|
|||
CVE-2016-0728
|
||||
|
||||
Vulnerability reference:
|
||||
* [CVE-2016-0728](http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=2016-0728)
|
||||
* [CVE-2016-0728](https://cve.mitre.org/cgi-bin/cvename.cgi?name=2016-0728)
|
||||
|
||||
## Kernels
|
||||
```
|
||||
|
|
|
@ -1,7 +1,7 @@
|
|||
CVE-2016-2384
|
||||
=============
|
||||
|
||||
- [CVE-2016-2384](http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2384)
|
||||
- [CVE-2016-2384](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2384)
|
||||
|
||||
This is a proof-of-concept exploit for the vulnerability in the usb-midi Linux kernel driver ([CVE-2016-2384](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2384)).
|
||||
Requires physical access to the machine.
|
||||
|
|
|
@ -15,7 +15,7 @@ All code, images and documentation in this page and the website is in the public
|
|||
```
|
||||
|
||||
Vulnerability reference:
|
||||
* [CVE-2016-5195](http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=2016-5195)
|
||||
* [CVE-2016-5195](https://cve.mitre.org/cgi-bin/cvename.cgi?name=2016-5195)
|
||||
* [Table of PoCs](https://github.com/dirtycow/dirtycow.github.io/wiki/PoCs)
|
||||
* [exp-db](https://www.exploit-db.com/exploits/40616/)
|
||||
|
||||
|
|
|
@ -1,9 +1,9 @@
|
|||
CVE-2016-9793
|
||||
=============
|
||||
|
||||
- [CVE-2016-9793](http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9793)
|
||||
- [CVE-2016-9793](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9793)
|
||||
|
||||
This is a proof-of-concept local root exploit for the vulnerability in the SO\_SNDBUFFORCE and SO\_RCVBUFFORCE socket options implementation [CVE-2016-9793](http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9793).
|
||||
This is a proof-of-concept local root exploit for the vulnerability in the SO\_SNDBUFFORCE and SO\_RCVBUFFORCE socket options implementation [CVE-2016-9793](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9793).
|
||||
Requires CAP\_NET\_ADMIN capability.
|
||||
|
||||
Timeline:
|
||||
|
|
|
@ -3,7 +3,7 @@
|
|||
CVE-2017-5123
|
||||
|
||||
Vulnerability reference:
|
||||
* [CVE-2017-5123](http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5123)
|
||||
* [CVE-2017-5123](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5123)
|
||||
|
||||
## Kernels
|
||||
```
|
||||
|
|
|
@ -1,9 +1,9 @@
|
|||
CVE-2017-6074
|
||||
=============
|
||||
|
||||
- [CVE-2017-6074](http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6074)
|
||||
- [CVE-2017-6074](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6074)
|
||||
|
||||
This is a proof-of-concept local root exploit for the vulnerability in the DCCP protocol implementation [CVE-2017-6074](http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=2017-6074).
|
||||
This is a proof-of-concept local root exploit for the vulnerability in the DCCP protocol implementation [CVE-2017-6074](https://cve.mitre.org/cgi-bin/cvename.cgi?name=2017-6074).
|
||||
Includes a semireliable SMEP/SMAP bypass (the kernel might crash shorty after the exploit succeds).
|
||||
|
||||
Some details: http://www.openwall.com/lists/oss-security/2017/02/26/2
|
||||
|
|
|
@ -1,8 +1,8 @@
|
|||
CVE-2017-7308
|
||||
=============
|
||||
|
||||
- [CVE-2017-7308](http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7308)
|
||||
- [CVE-2017-7308](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7308)
|
||||
|
||||
This is a proof-of-concept local root exploit for the vulnerability in the AF\_PACKET sockets implementation [CVE-2017-7308](http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=2017-6074).
|
||||
This is a proof-of-concept local root exploit for the vulnerability in the AF\_PACKET sockets implementation [CVE-2017-7308](https://cve.mitre.org/cgi-bin/cvename.cgi?name=2017-6074).
|
||||
|
||||
Details are here: https://googleprojectzero.blogspot.com/2017/05/exploiting-linux-kernel-via-packet.html
|
||||
|
|
|
@ -3,7 +3,7 @@
|
|||
CVE-2017-7494
|
||||
|
||||
Vulnerability reference:
|
||||
* [CVE-2016-0728](http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=2017-7494)
|
||||
* [CVE-2016-0728](https://cve.mitre.org/cgi-bin/cvename.cgi?name=2017-7494)
|
||||
* [exp-db](https://www.exploit-db.com/exploits/42060/)
|
||||
|
||||
## Samba
|
||||
|
|
Loading…
Reference in New Issue