Skip to content

Latest commit

 

History

History
398 lines (354 loc) · 49.9 KB

CVEsPoCs.md

File metadata and controls

398 lines (354 loc) · 49.9 KB

CVEs and PoCs Resources

General

Some CVEs PoCs repos on github or internet.

  • First, see: Awesome CVE PoC by qazbnm456.
  • To search (without PoCs): cve-search you can use it off-line too.
  • This is a nice Wrapper:vFeed.
  • Automated Generation of Proofs of Vulnerability with S2E
  • SecurityExploits: This repository contains proof-of-concept exploits developed by the Semmle Security Research Team. We always disclose security vulnerabilities responsibly, so this repository only contains exploits for vulnerabilities which have already been fixed and publicly disclosed.
  • Penetration_Testing_POC: About penetration-testing python-script poc getshell csrf xss cms php-getshell domainmod-xss penetration-testing-poc csrf-webshell cobub-razor cve rce sql sql-poc poc-exp bypass oa-getshell cve-cms.
  • Como registrar uma CVE
  • ALPACA Attack
  • Overview: OWASP Top 10 2021
  • CVE Trends: So I built CVE Trends; it collates real-time information about tweeted CVEs.

Linux

Solaris

  • Kernel Level Privilege Escalation in Oracle Solaris: CVE-2018-2892

Windows

macOS/iOS

Android

Java

Apache Struts

Hardware

  • fragattack: This website presents FragAttacks (fragmentation and aggregation attacks) which is a collection of new security vulnerabilities that affect Wi-Fi devices.

x86

ARM

BMC

VirtualBox

PHP

API

Others

 echo H4sICH0mqFkAA3BvYwDbweS/W8LxrMCuK8wbZN85bWh494VhFIwUELoKAIJvFIwAAgAA | base64 -d | gunzip > a && qemu-system-i386 -vga cirrus a
GET /api/console/api_server?sense_version=%40%40SENSE_VERSION&apis=../../../../../../../../../../../etc/passwd
  • Web/Javscript/WAF Payload will run in a lot of contexts: Short but lethal. No script tags, thus bypassing a lot of WAF and executes in multiple environments.
javascript:"/*'/*`/*--><html \" onmouseover=/*&lt;svg/*/onload=alert()//>

Additions

Please, send pull requests for new additions.

Thanks!