Github Exploits

401 exploits tracked across all sources.

Sort: Activity Stars
CVE-2012-6702 GITHUB MEDIUM c
Libexpat < 2.2.0 - Cryptographic Issue
Expat, when used in a parser that has not called XML_SetHashSalt or passed it a seed of 0, makes it easier for context-dependent attackers to defeat cryptographic protection mechanisms via vectors involving use of the srand function.
by codecat007
8 stars
CVSS 5.9
CVE-2015-7504 GITHUB HIGH c
QEMU - Buffer Overflow
Heap-based buffer overflow in the pcnet_receive function in hw/net/pcnet.c in QEMU allows guest OS administrators to cause a denial of service (instance crash) or possibly execute arbitrary code via a series of packets in loopback mode.
by codecat007
8 stars
CVSS 8.8
CVE-2015-5165 GITHUB c
Xen < 4.5.0 - Use of Uninitialized Resource
The C+ mode offload emulation in the RTL8139 network card device model in QEMU, as used in Xen 4.5.x and earlier, allows remote attackers to read process heap memory via unspecified vectors.
by codecat007
8 stars
CVE-2016-6690 GITHUB MEDIUM c
Google Android < 7.0 - Improper Access Control
The sound driver in the kernel in Android before 2016-10-05 on Nexus 5, Nexus 5X, Nexus 6, Nexus 6P, and Nexus Player devices allows attackers to cause a denial of service (reboot) via a crafted application, aka internal bug 28838221.
by codecat007
8 stars
CVSS 5.5
CVE-2016-6672 GITHUB HIGH c
Google Android < 7.0 - Access Control
The Synaptics touchscreen driver in Android before 2016-10-05 on Nexus 5X devices allows attackers to gain privileges via a crafted application, aka internal bug 30537088.
by codecat007
8 stars
CVSS 7.8
CVE-2016-5195 GITHUB HIGH c
Canonical Ubuntu Linux < 3.2.83 - Race Condition
Race condition in mm/gup.c in the Linux kernel 2.x through 4.x before 4.8.3 allows local users to gain privileges by leveraging incorrect handling of a copy-on-write (COW) feature to write to a read-only memory mapping, as exploited in the wild in October 2016, aka "Dirty COW."
by codecat007
8 stars
CVSS 7.0
CVE-2016-3940 GITHUB HIGH c
Synaptics touchscreen - Privilege Escalation
The Synaptics touchscreen driver in Android before 2016-10-05 on Nexus 6P and Android One devices allows attackers to gain privileges via a crafted application, aka internal bug 30141991.
by codecat007
8 stars
CVSS 7.8
CVE-2016-3901 GITHUB HIGH c
Qualcomm cryptographic engine driver - Privilege Escalation
Multiple integer overflows in drivers/crypto/msm/qcedev.c in the Qualcomm cryptographic engine driver in Android before 2016-10-05 on Nexus 5X, Nexus 6, Nexus 6P, and Android One devices allow attackers to gain privileges via a crafted application, aka Android internal bug 29999161 and Qualcomm internal bug CR 1046434.
by codecat007
8 stars
CVSS 7.8
CVE-2016-3866 GITHUB HIGH c
Qualcomm sound driver - Privilege Escalation
The Qualcomm sound driver in Android before 2016-09-05 on Nexus 5X, 6, and 6P devices allows attackers to gain privileges via a crafted application, aka Android internal bug 28868303 and Qualcomm internal bug CR1032820.
by codecat007
8 stars
CVSS 7.8
CVE-2019-13272 GITHUB HIGH c
Linux Polkit pkexec helper PTRACE_TRACEME local root exploit
In the Linux kernel before 5.1.17, ptrace_link in kernel/ptrace.c mishandles the recording of the credentials of a process that wants to create a ptrace relationship, which allows local users to obtain root access by leveraging certain scenarios with a parent-child process relationship, where a parent drops privileges and calls execve (potentially allowing control by an attacker). One contributing factor is an object lifetime issue (which can also cause a panic). Another contributing factor is incorrect marking of a ptrace relationship as privileged, which is exploitable through (for example) Polkit's pkexec helper with PTRACE_TRACEME. NOTE: SELinux deny_ptrace might be a usable workaround in some environments.
by codecat007
8 stars
CVSS 7.8
CVE-2018-17182 GITHUB HIGH c
Linux kernel <4.18.8 - Use After Free
An issue was discovered in the Linux kernel through 4.18.8. The vmacache_flush_all function in mm/vmacache.c mishandles sequence number overflows. An attacker can trigger a use-after-free (and possibly gain privileges) via certain thread creation, map, unmap, invalidation, and dereference operations.
by codecat007
8 stars
CVSS 7.8
CVE-2017-7308 GITHUB HIGH c
AF_PACKET packet_set_ring Privilege Escalation
The packet_set_ring function in net/packet/af_packet.c in the Linux kernel through 4.10.6 does not properly validate certain block-size data, which allows local users to cause a denial of service (integer signedness error and out-of-bounds write), or gain privileges (if the CAP_NET_RAW capability is held), via crafted system calls.
by codecat007
8 stars
CVSS 7.8
CVE-2017-6074 GITHUB HIGH c
Linux Kernel < 3.2.86 - Double Free
The dccp_rcv_state_process function in net/dccp/input.c in the Linux kernel through 4.9.11 mishandles DCCP_PKT_REQUEST packet data structures in the LISTEN state, which allows local users to obtain root privileges or cause a denial of service (double free) via an application that makes an IPV6_RECVPKTINFO setsockopt system call.
by codecat007
8 stars
CVSS 7.8
CVE-2017-1000112 GITHUB HIGH c
Linux Kernel UDP Fragmentation Offset (UFO) Privilege Escalation
Linux kernel: Exploitable memory corruption due to UFO to non-UFO path switch. When building a UFO packet with MSG_MORE __ip_append_data() calls ip_ufo_append_data() to append. However in between two send() calls, the append path can be switched from UFO to non-UFO one, which leads to a memory corruption. In case UFO packet lengths exceeds MTU, copy = maxfraglen - skb->len becomes negative on the non-UFO path and the branch to allocate new skb is taken. This triggers fragmentation and computation of fraggap = skb_prev->len - maxfraglen. Fraggap can exceed MTU, causing copy = datalen - transhdrlen - fraggap to become negative. Subsequently skb_copy_and_csum_bits() writes out-of-bounds. A similar issue is present in IPv6 code. The bug was introduced in e89e9cf539a2 ("[IPv4/IPv6]: UFO Scatter-gather approach") on Oct 18 2005.
by codecat007
8 stars
CVSS 7.0
CVE-2016-9793 GITHUB HIGH c
Linux Kernel < 3.12.69 - Memory Corruption
The sock_setsockopt function in net/core/sock.c in the Linux kernel before 4.8.14 mishandles negative values of sk_sndbuf and sk_rcvbuf, which allows local users to cause a denial of service (memory corruption and system crash) or possibly have unspecified other impact by leveraging the CAP_NET_ADMIN capability for a crafted setsockopt system call with the (1) SO_SNDBUFFORCE or (2) SO_RCVBUFFORCE option.
by codecat007
8 stars
CVSS 7.8
CVE-2016-3935 GITHUB HIGH c
Qualcomm cryptographic engine driver - Privilege Escalation
Multiple integer overflows in drivers/crypto/msm/qcedev.c in the Qualcomm cryptographic engine driver in Android before 2016-10-05 on Nexus 5X, Nexus 6, Nexus 6P, and Android One devices allow attackers to gain privileges via a crafted application, aka Android internal bug 29999665 and Qualcomm internal bug CR 1046507.
by codecat007
8 stars
CVSS 7.8
CVE-2016-3857 GITHUB HIGH c
Android <2016-08-05 - Privilege Escalation
The kernel in Android before 2016-08-05 on Nexus 7 (2013) devices allows attackers to gain privileges via a crafted application, aka internal bug 28522518.
by codecat007
8 stars
CVSS 7.8
CVE-2016-2435 GITHUB HIGH c
Google Android < 6.0.1 - Access Control
The NVIDIA video driver in Android before 2016-05-01 on Nexus 9 devices allows attackers to gain privileges via a crafted application, aka internal bug 27297988.
by codecat007
8 stars
CVSS 7.8
CVE-2016-2434 GITHUB HIGH c
Google Android < 6.0.1 - Access Control
The NVIDIA video driver in Android before 2016-05-01 on Nexus 9 devices allows attackers to gain privileges via a crafted application, aka internal bug 27251090.
by codecat007
8 stars
CVSS 7.8
CVE-2016-2411 GITHUB MEDIUM c
Google Android - Improper Input Validation
A Qualcomm Power Management kernel driver in Android 6.x before 2016-04-01 allows attackers to gain privileges via a crafted application that leverages root access, aka internal bug 26866053.
by codecat007
8 stars
CVSS 6.5
CVE-2016-2384 GITHUB MEDIUM c
Linux Kernel < 4.4.8 - Denial of Service
Double free vulnerability in the snd_usbmidi_create function in sound/usb/midi.c in the Linux kernel before 4.5 allows physically proximate attackers to cause a denial of service (panic) or possibly have unspecified other impact via vectors involving an invalid USB descriptor.
by codecat007
8 stars
CVSS 4.6
CVE-2018-18281 GITHUB HIGH c
Linux kernel <4.2 - Info Disclosure
Since Linux kernel version 3.2, the mremap() syscall performs TLB flushes after dropping pagetable locks. If a syscall such as ftruncate() removes entries from the pagetables of a task that is in the middle of mremap(), a stale TLB entry can remain for a short time that permits access to a physical page after it has been released back to the page allocator and reused. This is fixed in the following kernel versions: 4.9.135, 4.14.78, 4.18.16, 4.19.
by codecat007
8 stars
CVSS 7.8
CVE-2017-9691 GITHUB MEDIUM c
Android for MSM/Firefox OS for MSM/QRD Android - Memory Corruption
There is a race condition in Android for MSM, Firefox OS for MSM, and QRD Android that allows to access to already free'd memory in the debug message output functionality contained within the mobicore driver.
by codecat007
8 stars
CVSS 4.7
CVE-2017-8270 GITHUB HIGH c
Google Android - Race Condition
In all Qualcomm products with Android releases from CAF using the Linux kernel, a race condition exists in a driver potentially leading to a use-after-free condition.
by codecat007
8 stars
CVSS 7.0
CVE-2017-8266 GITHUB HIGH c
Google Android - Race Condition
In all Qualcomm products with Android releases from CAF using the Linux kernel, a race condition exists in a video driver potentially leading to a use-after-free condition.
by codecat007
8 stars
CVSS 7.0