Skip to content

Commit

Permalink
Update Tue Apr 9 10:08:07 UTC 2024
Browse files Browse the repository at this point in the history
  • Loading branch information
trickest-workflows committed Apr 9, 2024
1 parent a756390 commit 63a047b
Show file tree
Hide file tree
Showing 25 changed files with 68 additions and 10 deletions.
1 change: 1 addition & 0 deletions 2015/CVE-2015-2150.md
Expand Up @@ -11,6 +11,7 @@ Xen 3.3.x through 4.5.x and the Linux kernel through 3.19.1 do not properly rest

#### Reference
- http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html
- http://www.ubuntu.com/usn/USN-2632-1

#### Github
No PoCs found on GitHub currently.
Expand Down
1 change: 1 addition & 0 deletions 2015/CVE-2015-2830.md
Expand Up @@ -11,6 +11,7 @@ arch/x86/kernel/entry_64.S in the Linux kernel before 3.19.2 does not prevent th

#### Reference
- http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html
- http://www.ubuntu.com/usn/USN-2632-1

#### Github
No PoCs found on GitHub currently.
Expand Down
1 change: 1 addition & 0 deletions 2015/CVE-2015-3331.md
Expand Up @@ -11,6 +11,7 @@ The __driver_rfc4106_decrypt function in arch/x86/crypto/aesni-intel_glue.c in t

#### Reference
- http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html
- http://www.ubuntu.com/usn/USN-2632-1

#### Github
No PoCs found on GitHub currently.
Expand Down
1 change: 1 addition & 0 deletions 2015/CVE-2015-3636.md
Expand Up @@ -11,6 +11,7 @@ The ping_unhash function in net/ipv4/ping.c in the Linux kernel before 4.0.3 doe

#### Reference
- http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html
- http://www.ubuntu.com/usn/USN-2632-1

#### Github
- https://github.com/ARPSyndicate/cvemon
Expand Down
1 change: 1 addition & 0 deletions 2015/CVE-2015-4004.md
Expand Up @@ -11,6 +11,7 @@ The OZWPAN driver in the Linux kernel through 4.0.5 relies on an untrusted lengt

#### Reference
- http://www.ubuntu.com/usn/USN-3000-1
- http://www.ubuntu.com/usn/USN-3002-1
- http://www.ubuntu.com/usn/USN-3003-1
- http://www.ubuntu.com/usn/USN-3004-1
- https://lkml.org/lkml/2015/5/13/739
Expand Down
7 changes: 3 additions & 4 deletions 2015/CVE-2015-4167.md
@@ -1,6 +1,6 @@
### [CVE-2015-4167](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4167)
![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=%3D%20n%2Fa%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen)

### Description
Expand All @@ -10,9 +10,8 @@ The udf_read_inode function in fs/udf/inode.c in the Linux kernel before 3.19.1
### POC

#### Reference
No PoCs from references.
- http://www.ubuntu.com/usn/USN-2632-1

#### Github
- https://github.com/thdusdl1219/CVE-Study
- https://github.com/vincent-deng/veracode-container-security-finding-parser
No PoCs found on GitHub currently.

1 change: 1 addition & 0 deletions 2016/CVE-2016-1583.md
Expand Up @@ -12,6 +12,7 @@ The ecryptfs_privileged_open function in fs/ecryptfs/kthread.c in the Linux kern
#### Reference
- http://packetstormsecurity.com/files/137560/Linux-ecryptfs-Stack-Overflow.html
- http://www.ubuntu.com/usn/USN-3000-1
- http://www.ubuntu.com/usn/USN-3002-1
- http://www.ubuntu.com/usn/USN-3003-1
- http://www.ubuntu.com/usn/USN-3004-1
- https://www.exploit-db.com/exploits/39992/
Expand Down
1 change: 1 addition & 0 deletions 2016/CVE-2016-2117.md
Expand Up @@ -13,6 +13,7 @@ The atl2_probe function in drivers/net/ethernet/atheros/atlx/atl2.c in the Linux
- http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html
- http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html
- http://www.ubuntu.com/usn/USN-3000-1
- http://www.ubuntu.com/usn/USN-3002-1
- http://www.ubuntu.com/usn/USN-3003-1
- http://www.ubuntu.com/usn/USN-3004-1

Expand Down
1 change: 1 addition & 0 deletions 2016/CVE-2016-2187.md
Expand Up @@ -11,6 +11,7 @@ The gtco_probe function in drivers/input/tablet/gtco.c in the Linux kernel throu

#### Reference
- http://www.ubuntu.com/usn/USN-3000-1
- http://www.ubuntu.com/usn/USN-3002-1
- http://www.ubuntu.com/usn/USN-3003-1
- http://www.ubuntu.com/usn/USN-3004-1

Expand Down
1 change: 1 addition & 0 deletions 2016/CVE-2016-3135.md
Expand Up @@ -10,6 +10,7 @@ Integer overflow in the xt_alloc_table_info function in net/netfilter/x_tables.c
### POC

#### Reference
- http://www.ubuntu.com/usn/USN-3056-1
- https://code.google.com/p/google-security-research/issues/detail?id=758

#### Github
Expand Down
1 change: 1 addition & 0 deletions 2016/CVE-2016-3672.md
Expand Up @@ -11,6 +11,7 @@ The arch_pick_mmap_layout function in arch/x86/mm/mmap.c in the Linux kernel thr

#### Reference
- http://www.ubuntu.com/usn/USN-3000-1
- http://www.ubuntu.com/usn/USN-3002-1
- http://www.ubuntu.com/usn/USN-3003-1
- http://www.ubuntu.com/usn/USN-3004-1
- https://www.exploit-db.com/exploits/39669/
Expand Down
1 change: 1 addition & 0 deletions 2016/CVE-2016-3951.md
Expand Up @@ -11,6 +11,7 @@ Double free vulnerability in drivers/net/usb/cdc_ncm.c in the Linux kernel befor

#### Reference
- http://www.ubuntu.com/usn/USN-3000-1
- http://www.ubuntu.com/usn/USN-3002-1
- http://www.ubuntu.com/usn/USN-3003-1
- http://www.ubuntu.com/usn/USN-3004-1

Expand Down
1 change: 1 addition & 0 deletions 2016/CVE-2016-3955.md
Expand Up @@ -11,6 +11,7 @@ The usbip_recv_xbuff function in drivers/usb/usbip/usbip_common.c in the Linux k

#### Reference
- http://www.ubuntu.com/usn/USN-3000-1
- http://www.ubuntu.com/usn/USN-3002-1
- http://www.ubuntu.com/usn/USN-3003-1
- http://www.ubuntu.com/usn/USN-3004-1

Expand Down
1 change: 1 addition & 0 deletions 2016/CVE-2016-3961.md
Expand Up @@ -10,6 +10,7 @@ Xen and the Linux kernel through 4.5.x do not properly suppress hugetlbfs suppor
### POC

#### Reference
- http://www.ubuntu.com/usn/USN-3002-1
- http://www.ubuntu.com/usn/USN-3003-1
- http://www.ubuntu.com/usn/USN-3004-1

Expand Down
1 change: 1 addition & 0 deletions 2016/CVE-2016-4470.md
Expand Up @@ -12,6 +12,7 @@ The key_reject_and_link function in security/keys/key.c in the Linux kernel thro
#### Reference
- http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html
- http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html
- http://www.ubuntu.com/usn/USN-3056-1

#### Github
No PoCs found on GitHub currently.
Expand Down
1 change: 1 addition & 0 deletions 2016/CVE-2016-4485.md
Expand Up @@ -11,6 +11,7 @@ The llc_cmsg_rcv function in net/llc/af_llc.c in the Linux kernel before 4.5.5 d

#### Reference
- http://www.ubuntu.com/usn/USN-3000-1
- http://www.ubuntu.com/usn/USN-3002-1
- http://www.ubuntu.com/usn/USN-3003-1
- http://www.ubuntu.com/usn/USN-3004-1

Expand Down
1 change: 1 addition & 0 deletions 2016/CVE-2016-4486.md
Expand Up @@ -11,6 +11,7 @@ The rtnl_fill_link_ifmap function in net/core/rtnetlink.c in the Linux kernel be

#### Reference
- http://www.ubuntu.com/usn/USN-3000-1
- http://www.ubuntu.com/usn/USN-3002-1
- http://www.ubuntu.com/usn/USN-3003-1
- http://www.ubuntu.com/usn/USN-3004-1
- https://www.exploit-db.com/exploits/46006/
Expand Down
1 change: 1 addition & 0 deletions 2016/CVE-2016-4565.md
Expand Up @@ -13,6 +13,7 @@ The InfiniBand (aka IB) stack in the Linux kernel before 4.5.3 incorrectly relie
- http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html
- http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html
- http://www.ubuntu.com/usn/USN-3002-1
- http://www.ubuntu.com/usn/USN-3003-1
- http://www.ubuntu.com/usn/USN-3004-1

Expand Down
1 change: 1 addition & 0 deletions 2016/CVE-2016-4581.md
Expand Up @@ -13,6 +13,7 @@ fs/pnode.c in the Linux kernel before 4.5.4 does not properly traverse a mount p
- http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html
- http://www.oracle.com/technetwork/topics/security/ovmbulletinoct2016-3090547.html
- http://www.ubuntu.com/usn/USN-3000-1
- http://www.ubuntu.com/usn/USN-3002-1
- http://www.ubuntu.com/usn/USN-3003-1
- http://www.ubuntu.com/usn/USN-3004-1

Expand Down
4 changes: 2 additions & 2 deletions 2016/CVE-2016-4794.md
Expand Up @@ -10,8 +10,8 @@ Use-after-free vulnerability in mm/percpu.c in the Linux kernel through 4.6 allo
### POC

#### Reference
No PoCs from references.
- http://www.ubuntu.com/usn/USN-3056-1

#### Github
- https://github.com/thdusdl1219/CVE-Study
No PoCs found on GitHub currently.

4 changes: 2 additions & 2 deletions 2016/CVE-2016-5243.md
Expand Up @@ -10,8 +10,8 @@ The tipc_nl_compat_link_dump function in net/tipc/netlink_compat.c in the Linux
### POC

#### Reference
No PoCs from references.
- http://www.ubuntu.com/usn/USN-3056-1

#### Github
- https://github.com/thdusdl1219/CVE-Study
No PoCs found on GitHub currently.

2 changes: 1 addition & 1 deletion 2017/CVE-2017-6862.md
Expand Up @@ -10,7 +10,7 @@ NETGEAR WNR2000v3 devices before 1.1.2.14, WNR2000v4 devices before 1.0.0.66, an
### POC

#### Reference
No PoCs from references.
- https://kb.netgear.com/000038542/Security-Advisory-for-Unauthenticated-Remote-Code-Execution-on-Some-Routers-PSV-2016-0261

#### Github
- https://github.com/Ostorlab/KEV
Expand Down
17 changes: 17 additions & 0 deletions 2018/CVE-2018-14424.md
@@ -0,0 +1,17 @@
### [CVE-2018-14424](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14424)
![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen)

### Description

The daemon in GDM through 3.29.1 does not properly unexport display objects from its D-Bus interface when they are destroyed, which allows a local attacker to trigger a use-after-free via a specially crafted sequence of D-Bus method calls, resulting in a denial of service or potential code execution.

### POC

#### Reference
- https://usn.ubuntu.com/3737-1/

#### Github
No PoCs found on GitHub currently.

2 changes: 1 addition & 1 deletion 2024/CVE-2024-25410.md
Expand Up @@ -10,7 +10,7 @@ flusity-CMS 2.33 is vulnerable to Unrestricted Upload of File with Dangerous Typ
### POC

#### Reference
No PoCs from references.
- https://github.com/flusity/flusity-CMS/issues/9

#### Github
- https://github.com/fkie-cad/nvd-json-data-feeds
Expand Down

0 comments on commit 63a047b

Please sign in to comment.