CVE-2017-1000367  [Sudo]

(Sudo 1.8.6p7 - 1.8.20)

CVE-2017-1000112  [a memory corruption due to UFO to non-UFO path switch]

CVE-2017-16939  [UAF in Netlink socket subsystem – XFRM]

(Linux kernel before 4.13.11)

CVE-2017-7494  [Samba Remote execution]

(Samba 3.5.0-4.6.4/4.5.10/4.4.14)

CVE-2017-7308  [a signedness issue in AF_PACKET sockets]

(Linux kernel through 4.10.6)

CVE-2017-6074  [a double-free in DCCP protocol]

(Linux kernel through 4.9.11)

CVE-2017-5123  ['waitid()']

(Kernel 4.14.0-rc4+)

CVE-2016-9793  [a signedness issue with SO_SNDBUFFORCE and SO_RCVBUFFORCE socket options]

(Linux kernel before 4.8.14)

CVE-2016-5195  [Dirty cow]

(Linux kernel>2.6.22 (released in 2007))

CVE-2016-2384  [a double-free in USB MIDI driver]

(Linux kernel before 4.5)

CVE-2016-0728  [pp_key]

(3.8.0, 3.8.1, 3.8.2, 3.8.3, 3.8.4, 3.8.5, 3.8.6, 3.8.7, 3.8.8, 3.8.9, 3.9, 3.10, 3.11, 3.12, 3.13, 3.4.0, 3.5.0, 3.6.0, 3.7.0, 3.8.0, 3.8.5, 3.8.6, 3.8.9, 3.9.0, 3.9.6, 3.10.0, 3.10.6, 3.11.0, 3.12.0, 3.13.0, 3.13.1)

CVE-2015-7547  [glibc getaddrinfo]

(before Glibc 2.9)

CVE-2015-1328  [overlayfs]

(3.13, 3.16.0, 3.19.0)

CVE-2014-5284  [OSSEC]

(2.8)

CVE-2014-4699  [ptrace]

(before 3.15.4)

CVE-2014-4014  [Local Privilege Escalation]

(before 3.14.8)

CVE-2014-3153  [futex]

(3.3.5 ,3.3.4 ,3.3.2 ,3.2.13 ,3.2.9 ,3.2.1 ,3.1.8 ,3.0.5 ,3.0.4 ,3.0.2 ,3.0.1 ,2.6.39 ,2.6.38 ,2.6.37 ,2.6.35 ,2.6.34 ,2.6.33 ,2.6.32 ,2.6.9 ,2.6.8 ,2.6.7 ,2.6.6 ,2.6.5 ,2.6.4 ,3.2.2 ,3.0.18 ,3.0 ,2.6.8.1)

CVE-2014-0196  [rawmodePTY]

(2.6.31, 2.6.32, 2.6.33, 2.6.34, 2.6.35, 2.6.36, 2.6.37, 2.6.38, 2.6.39, 3.14, 3.15)

CVE-2014-0038  [timeoutpwn]

(3.4, 3.5, 3.6, 3.7, 3.8, 3.8.9, 3.9, 3.10, 3.11, 3.12, 3.13, 3.4.0, 3.5.0, 3.6.0, 3.7.0, 3.8.0, 3.8.5, 3.8.6, 3.8.9, 3.9.0, 3.9.6, 3.10.0, 3.10.6, 3.11.0, 3.12.0, 3.13.0, 3.13.1)

CVE-2013-2094  [perf_swevent]

(3.0.0, 3.0.1, 3.0.2, 3.0.3, 3.0.4, 3.0.5, 3.0.6, 3.1.0, 3.2, 3.3, 3.4.0, 3.4.1, 3.4.2, 3.4.3, 3.4.4, 3.4.5, 3.4.6, 3.4.8, 3.4.9, 3.5, 3.6, 3.7, 3.8.0, 3.8.1, 3.8.2, 3.8.3, 3.8.4, 3.8.5, 3.8.6, 3.8.7, 3.8.8, 3.8.9)

CVE-2013-1858  [clown-newuser]

(3.3-3.8)

CVE-2013-1763  [__sock_diag_rcv_msg]

(before 3.8.3)

CVE-2013-0268  [msr]

(2.6.18, 2.6.19, 2.6.20, 2.6.21, 2.6.22, 2.6.23, 2.6.24, 2.6.25, 2.6.26, 2.6.27, 2.6.27, 2.6.28, 2.6.29, 2.6.30, 2.6.31, 2.6.32, 2.6.33, 2.6.34, 2.6.35, 2.6.36, 2.6.37, 2.6.38, 2.6.39, 3.0.0, 3.0.1, 3.0.2, 3.0.3, 3.0.4, 3.0.5, 3.0.6, 3.1.0, 3.2, 3.3, 3.4, 3.5, 3.6, 3.7.0, 3.7.6)

CVE-2012-3524  [libdbus]

(libdbus 1.5.x and earlier)

CVE-2012-0056  [memodipper]

(2.6.39, 3.0.0, 3.0.1, 3.0.2, 3.0.3, 3.0.4, 3.0.5, 3.0.6, 3.1.0)

CVE-2010-4347  [american-sign-language]

(2.6.0, 2.6.1, 2.6.2, 2.6.3, 2.6.4, 2.6.5, 2.6.6, 2.6.7, 2.6.8, 2.6.9, 2.6.10, 2.6.11, 2.6.12, 2.6.13, 2.6.14, 2.6.15, 2.6.16, 2.6.17, 2.6.18, 2.6.19, 2.6.20, 2.6.21, 2.6.22, 2.6.23, 2.6.24, 2.6.25, 2.6.26, 2.6.27, 2.6.28, 2.6.29, 2.6.30, 2.6.31, 2.6.32, 2.6.33, 2.6.34, 2.6.35, 2.6.36)

CVE-2010-4258  [full-nelson]

(2.6.31, 2.6.32, 2.6.35, 2.6.37)

CVE-2010-4073  [half_nelson]

(2.6.0, 2.6.1, 2.6.2, 2.6.3, 2.6.4, 2.6.5, 2.6.6, 2.6.7, 2.6.8, 2.6.9, 2.6.10, 2.6.11, 2.6.12, 2.6.13, 2.6.14, 2.6.15, 2.6.16, 2.6.17, 2.6.18, 2.6.19, 2.6.20, 2.6.21, 2.6.22, 2.6.23, 2.6.24, 2.6.25, 2.6.26, 2.6.27, 2.6.28, 2.6.29, 2.6.30, 2.6.31, 2.6.32, 2.6.33, 2.6.34, 2.6.35, 2.6.36)

CVE-2010-3904  [rds]

(2.6.30, 2.6.31, 2.6.32, 2.6.33, 2.6.34, 2.6.35, 2.6.36)

CVE-2010-3437  [pktcdvd]

(2.6.0, 2.6.1, 2.6.2, 2.6.3, 2.6.4, 2.6.5, 2.6.6, 2.6.7, 2.6.8, 2.6.9, 2.6.10, 2.6.11, 2.6.12, 2.6.13, 2.6.14, 2.6.15, 2.6.16, 2.6.17, 2.6.18, 2.6.19, 2.6.20, 2.6.21, 2.6.22, 2.6.23, 2.6.24, 2.6.25, 2.6.26, 2.6.27, 2.6.28, 2.6.29, 2.6.30, 2.6.31, 2.6.32, 2.6.33, 2.6.34, 2.6.35, 2.6.36)

CVE-2010-3301  [ptrace_kmod2]

(2.6.26, 2.6.27, 2.6.28, 2.6.29, 2.6.30, 2.6.31, 2.6.32, 2.6.33, 2.6.34)

CVE-2010-3081  [video4linux]

(2.6.0, 2.6.1, 2.6.2, 2.6.3, 2.6.4, 2.6.5, 2.6.6, 2.6.7, 2.6.8, 2.6.9, 2.6.10, 2.6.11, 2.6.12, 2.6.13, 2.6.14, 2.6.15, 2.6.16, 2.6.17, 2.6.18, 2.6.19, 2.6.20, 2.6.21, 2.6.22, 2.6.23, 2.6.24, 2.6.25, 2.6.26, 2.6.27, 2.6.28, 2.6.29, 2.6.30, 2.6.31, 2.6.32, 2.6.33)

CVE-2010-2959  [can_bcm]

(2.6.18, 2.6.19, 2.6.20, 2.6.21, 2.6.22, 2.6.23, 2.6.24, 2.6.25, 2.6.26, 2.6.27, 2.6.28, 2.6.29, 2.6.30, 2.6.31, 2.6.32, 2.6.33, 2.6.34, 2.6.35, 2.6.36)

CVE-2010-1146  [reiserfs]

(2.6.18, 2.6.19, 2.6.20, 2.6.21, 2.6.22, 2.6.23, 2.6.24, 2.6.25, 2.6.26, 2.6.27, 2.6.28, 2.6.29, 2.6.30, 2.6.31, 2.6.32, 2.6.33, 2.6.34)

CVE-2010-0415  [do_pages_move]

(2.6.18, 2.6.19, 2.6.20, 2.6.21, 2.6.22, 2.6.23, 2.6.24, 2.6.25, 2.6.26, 2.6.27, 2.6.28, 2.6.29, 2.6.30, 2.6.31)

CVE-2009-3547  [pipe.c_32bit]

(2.4.4, 2.4.5, 2.4.6, 2.4.7, 2.4.8, 2.4.9, 2.4.10, 2.4.11, 2.4.12, 2.4.13, 2.4.14, 2.4.15, 2.4.16, 2.4.17, 2.4.18, 2.4.19, 2.4.20, 2.4.21, 2.4.22, 2.4.23, 2.4.24, 2.4.25, 2.4.26, 2.4.27, 2.4.28, 2.4.29, 2.4.30, 2.4.31, 2.4.32, 2.4.33, 2.4.34, 2.4.35, 2.4.36, 2.4.37, 2.6.15, 2.6.16, 2.6.17, 2.6.18, 2.6.19, 2.6.20, 2.6.21, 2.6.22, 2.6.23, 2.6.24, 2.6.25, 2.6.26, 2.6.27, 2.6.28, 2.6.29, 2.6.30, 2.6.31)

CVE-2009-2698  [udp_sendmsg_32bit]

(2.6.1, 2.6.2, 2.6.3, 2.6.4, 2.6.5, 2.6.6, 2.6.7, 2.6.8, 2.6.9, 2.6.10, 2.6.11, 2.6.12, 2.6.13, 2.6.14, 2.6.15, 2.6.16, 2.6.17, 2.6.18, 2.6.19)

CVE-2009-2692  [sock_sendpage]

(2.4.4, 2.4.5, 2.4.6, 2.4.7, 2.4.8, 2.4.9, 2.4.10, 2.4.11, 2.4.12, 2.4.13, 2.4.14, 2.4.15, 2.4.16, 2.4.17, 2.4.18, 2.4.19, 2.4.20, 2.4.21, 2.4.22, 2.4.23, 2.4.24, 2.4.25, 2.4.26, 2.4.27, 2.4.28, 2.4.29, 2.4.30, 2.4.31, 2.4.32, 2.4.33, 2.4.34, 2.4.35, 2.4.36, 2.4.37, 2.6.0, 2.6.1, 2.6.2, 2.6.3, 2.6.4, 2.6.5, 2.6.6, 2.6.7, 2.6.8, 2.6.9, 2.6.10, 2.6.11, 2.6.12, 2.6.13, 2.6.14, 2.6.15, 2.6.16, 2.6.17, 2.6.18, 2.6.19, 2.6.20, 2.6.21, 2.6.22, 2.6.23, 2.6.24, 2.6.25, 2.6.26, 2.6.27, 2.6.28, 2.6.29, 2.6.30)

CVE-2009-2692  [sock_sendpage2]

(2.4.4, 2.4.5, 2.4.6, 2.4.7, 2.4.8, 2.4.9, 2.4.10, 2.4.11, 2.4.12, 2.4.13, 2.4.14, 2.4.15, 2.4.16, 2.4.17, 2.4.18, 2.4.19, 2.4.20, 2.4.21, 2.4.22, 2.4.23, 2.4.24, 2.4.25, 2.4.26, 2.4.27, 2.4.28, 2.4.29, 2.4.30, 2.4.31, 2.4.32, 2.4.33, 2.4.34, 2.4.35, 2.4.36, 2.4.37, 2.6.0, 2.6.1, 2.6.2, 2.6.3, 2.6.4, 2.6.5, 2.6.6, 2.6.7, 2.6.8, 2.6.9, 2.6.10, 2.6.11, 2.6.12, 2.6.13, 2.6.14, 2.6.15, 2.6.16, 2.6.17, 2.6.18, 2.6.19, 2.6.20, 2.6.21, 2.6.22, 2.6.23, 2.6.24, 2.6.25, 2.6.26, 2.6.27, 2.6.28, 2.6.29, 2.6.30)

CVE-2009-1337  [exit_notify]

(2.6.25, 2.6.26, 2.6.27, 2.6.28, 2.6.29)

CVE-2009-1185  [udev]

(2.6.25, 2.6.26, 2.6.27, 2.6.28, 2.6.29)

CVE-2008-4210  [ftrex]

(2.6.11, 2.6.12, 2.6.13, 2.6.14, 2.6.15, 2.6.16, 2.6.17, 2.6.18, 2.6.19, 2.6.20, 2.6.21, 2.6.22)

CVE-2008-0600  [vmsplice2]

(2.6.23, 2.6.24)

CVE-2008-0600  [vmsplice1]

(2.6.17, 2.6.18, 2.6.19, 2.6.20, 2.6.21, 2.6.22, 2.6.23, 2.6.24, 2.6.24.1)

CVE-2006-3626  [h00lyshit]

(2.6.8, 2.6.10, 2.6.11, 2.6.12, 2.6.13, 2.6.14, 2.6.15, 2.6.16)

CVE-2006-2451  [raptor_prctl]

(2.6.13, 2.6.14, 2.6.15, 2.6.16, 2.6.17)

CVE-2005-0736  [krad3]

(2.6.5, 2.6.7, 2.6.8, 2.6.9, 2.6.10, 2.6.11)

CVE-2005-1263  [binfmt_elf.c]

(Linux kernel 2.x.x to 2.2.27-rc2, 2.4.x to 2.4.31-pre1, and 2.6.x to 2.6.12-rc4)

CVE-2004-1235  [elflbl]

(2.4.29)

CVE-N/A  [caps_to_root]

(2.6.34, 2.6.35, 2.6.36)

CVE-2004-0077  [mremap_pte]

(2.4.20, 2.2.24, 2.4.25, 2.4.26, 2.4.27)

arm linux漏洞,GitHub - armjirawat/linux-kernel-exploits: linux-kernel-exploits Linux平台提权漏洞集合...相关推荐

  1. Android提权root漏洞,【转】结合init源码剖析android root提权漏洞(CVE

    这篇文章是上一篇博客的后续分析,主要介绍向init进程发送热拔插信息后init进程的处理流程 首先我们来了解一个数据结构,uevent,如下 struct uevent { const char *a ...

  2. linux内核漏洞查询,GitHub - F1uYu4n/linux-kernel-exploits: linux-kernel-exploits Linux平台提权漏洞集合...

    CVE–2018–1000001 [glibc] (glibc <= 2.26) CVE-2017-1000367 [Sudo] (Sudo 1.8.6p7 - 1.8.20) CVE-2017 ...

  3. php挖洞提权,挖洞经验 | 看我如何发现GitHub提权漏洞获得$10000赏金

    之前,我从没参加过GitHub官方的一些漏洞众测项目,在HackerOne发起的HackTheWorld比赛中,主办方宣传除了赏金以外,还有机会获得Github提供的终身无限制私有库(unlimite ...

  4. 【权限提升】windows平台-提权项目MSFCS溢出漏洞

    基本知识点 Windows系统内置了许多本地用户组,这些用户组本身都已经被赋予一些权限(permissions),它们具有管理本地计算机或访问本地资源的权限.只要用户账户加入到这些本地组内,这回用户账 ...

  5. win10注入漏洞跳出计算机,win10操作系统本地提权漏洞

    2018年8月27日,安全研究人员在github上公布了最新的win10x64版的本地提权漏洞,并且在推特上对其提权的demo进行了演示.在github上的SandboxEscaper上有着完整的漏洞 ...

  6. Linux Privilege Escalation Kernel Exploits | Linux本地内核提权漏洞复现 CVE-2015-1328

    Linux Privilege Escalation Kernel Exploits | Linux本地内核提权漏洞复现 CVE-2015-1328 文章目录 Linux Privilege Esca ...

  7. Metasploit上使用RPC方式复现一个Linux提权漏洞

    序 学习了几天pwn的栈溢出知识后,收到了期待已久的任务--在metasploit上使用RPC的方式复现一个Linux提权漏洞,学长说这是一个偏向探索性质的,为了督促自己和提高效率,利用这种方式记录下 ...

  8. linux内核通用提权漏洞expliot 脏牛Dirty COW

    0x01 漏洞简介 Linux内核在处理内存写时拷贝(Copy-on-Write)时存在条件竞争漏洞,导致可以破坏私有只读内存映射.一个低权限的本地用户能够利用此漏洞获取其他只读内存映射的写权限,有可 ...

  9. str045漏洞提权linux,Linux运维知识之CVE-2016-5195 Dirtycow: Linux内核提权漏洞

    本文主要向大家介Linux运维知识之CVE-2016-5195 Dirtycow: Linux内核提权漏洞绍了,通过具体的内容向大家展现,希望对大家学习Linux运维知识有所帮助. CVE-2016- ...

最新文章

  1. 墨卡托坐标转换成经纬度
  2. Zepto源码分析-架构
  3. python回调函数实例详解_Python回调函数用法实例详解
  4. mysql修改root用户的密码
  5. 酷酷实训计划及测试计划
  6. 安卓真机如何连接本地服务器_一分钟搭建可供手机访问的本地服务器 (安卓,ios手机通用)...
  7. Spring Cloud Alibaba —— Seata 分布式事务框架
  8. Python3 标准库及相关内容
  9. python模块实例化_python中zipfile模块实例化解析
  10. C语言按位运算符 按位逻辑运算 移位运算 及其用法
  11. Java 8:一文掌握 Lambda 表达式 | CSDN 博文精选
  12. 服务器脱机状态,从脱机工作切换到联机工作
  13. 大华NVR接入海康摄像机的设置
  14. 免费模板 | 高颜值超实用,这套财务分析模版自带BUFF加成
  15. 纯干货:LCD屏和OLED屏的区别?手机屏幕材质各有什么区别?
  16. Python3爬虫韩寒新浪博客文章
  17. matlab方差分析盒型图
  18. Zimbra部署https证书的操作方法
  19. 读取股票数据存储到本地MySQL数据库(三)
  20. 使用final来修饰方法

热门文章

  1. 总结python换源的方法:Linux与windows系统
  2. Python中如何在一行里获取多个异常
  3. 动态规划 - Floyd算法求最短路径 - (Matlab建模)
  4. 解决The total number of locks exceeds the lock table size错误
  5. 召回粗排精排-级联漏斗(下)
  6. 【错误纠正】关于文章《绕开数学,讲讲信息论》
  7. 论文浅尝 | 基于常识知识图谱感知和图注意力机制的对话生成
  8. {ACL2020}In Layman’s Terms: Semi-Open Relation Extraction from Scientific Texts(关系抽取,半开放关系抽取)
  9. springCloud(微服务的概念)1-1
  10. Leetcode 82. Remove Duplicates from Sorted List II