// xsxlzx DECOMPILE CVE INFORMATION : - dirtycow - Dirty Cow exploit (firefart) * CVE-2016-5195 This exploit uses the pokemon exploit of the dirtycow vulnerability as a base and automatically generates a new passwd line. The user will be prompted for the new password when the binary is run. The original /etc/passwd file is then backed up to /tmp/passwd.bak and overwrites the root account with the generated line. After running the exploit you should be able to login with the newly created user. Source : https://github.com/firefart/dirtycow - kernel-exploits - My proof-of-concept exploits for the Linux kernel (xairy) * CVE-2017-1000112 Exploiting an out-of-bounds bug in the Linux kernel UFO packets. Source : https://github.com/xairy/kernel-exploits/tree/master/CVE-2017-1000112 * CVE-2017-18344 Exploiting an arbitrary-read vulnerability in the Linux kernel timer subsystem. Source : https://github.com/xairy/kernel-exploits/tree/master/CVE-2017-18344 * CVE-2017-7308 Exploiting the Linux kernel via packet sockets Source : https://github.com/xairy/kernel-exploits/tree/master/CVE-2017-7308 - cve-2018-14634 - proof-of-concept (PoC) for linux dists based on Debian, CentOS and RedHat - exploit 1 (uan0ap) * CVE-2018-14634 Affect kernel versions 2.6.x, 3.10.x and 4.14.x Source : https://github.com/luan0ap/cve-2018-14634 - CVE-2019-13272 - Linux 4.10 < 5.1.17 PTRACE_TRACEME local root (as502n) * CVE-2019-13272 ptrace_link in kernel/ptrace.c mishandles the recording of the credentials of a process that wants to create a ptrace relationship, which allows local users to obtain root access by leveraging certain scenarios with a parent-child process relationship, where a parent drops privileges and calls execve (potentially allowing control by an attacker). Source : https://github.com/jas502n/CVE-2019-13272 - kernel-exploits - Various kernel exploits (bcoles) * CVE-2021-22555 A heap out-of-bounds write affecting Linux since v2.6.19-rc1 was discovered in net/netfilter/x_tables.c. This allows an attacker to gain privileges or cause a DoS (via heap memory corruption) through user name space. Source : https://github.com/bcoles/kernel-exploits - CVE-2021-4034 - CVE-2021-4034 1day (berdav) * CVE-2021-4034 Polkit (formerly PolicyKit) is a component for controlling system-wide privileges in Unix-like operating systems. It provides an organized way for non-privileged processes to communicate with privileged processes. It is also possible to use polkit to execute commands with elevated privileges using the command pkexec followed by the command intended to be executed (with root permission). Source : https://github.com/berdav/CVE-2021-4034 - xfrm_poc - Linux kernel XFRM UAF poc (3.x - 5.x kernels) (duasynt) * lucky0 - unprivileged usernamespaces are allowed - xfrm support is compiled in or can be autoloaded - the patch was not backported Source : https://github.com/duasynt/xfrm_poc