[*] Exploit summary:
openssl : 1.0.2f : CVE-2022-2068 : 9.8 : STAT : Exploit (Github: backloop-biz_CVE_checks (G) jntass_TASSL-1.1.1 (G) mawinkler_c1-cs-scan-result (G) tianocore-docs_ThirdPartySecurityAdvisories (G))
openssl : 1.0.2f : CVE-2022-1292 : 9.8 : STAT : Exploit (Snyk: SNYK-UNMANAGED-OPENSSL-2807816 (S) / Github: WhooAmii_POC_to_review (G) alcaparra_CVE-2022-1292 (G) backloop-biz_CVE_checks (G) fdl66_openssl-1.0.2u-fix-cve (G) greek0x0_CVE-2022-1292 (G) jntass_TASSL-1.1.1 (G) li8u99_CVE-2022-1292 (G) manas3c_CVE-POC (G) mawinkler_c1-cs-scan-result (G) nidhi7598_openssl-OpenSSL_1_1_1g_AOSP_10_r33_CVE-2022-1292 (G) nomi-sec_PoC-in-GitHub (G) rama291041610_CVE-2022-1292 (G) tianocore-docs_ThirdPartySecurityAdvisories (G) trhacknon_CVE-2022-1292 (G) und3sc0n0c1d0_CVE-2022-1292 (G))
openssl : 1.0.2f : CVE-2016-6303 : 9.8 : STAT : Exploit (Github: imhunterand_hackerone-publicy-disclosed (G) tomwillfixit_alpine-cvecheck (G))
openssl : 1.0.2f : CVE-2016-2182 : 9.8 : STAT : Exploit (Github: imhunterand_hackerone-publicy-disclosed (G) tomwillfixit_alpine-cvecheck (G))
openssl : 1.0.2f : CVE-2016-2177 : 9.8 : STAT : Exploit (Github: imhunterand_hackerone-publicy-disclosed (G) tomwillfixit_alpine-cvecheck (G))
openssl : 1.0.2f : CVE-2016-0799 : 9.8 : STAT : Exploit (Github: imhunterand_hackerone-publicy-disclosed (G) xinali_articles (G))
openssl : 1.0.0 : CVE-2018-16395 : 9.8 : STAT : Exploit (Github: sonatype-nexus-community_cheque (G))
libcurl : 7.36.0 : CVE-2019-3822 : 9.8 : STAT : Exploit (Github: KorayAgaya_TrivyWeb (G) Mohzeela_external-secret (G) Yuki0x80_BlackHat2019 (G) saiyuki1919_BlackHat2019 (G) siddharthraopotukuchi_trivy (G) simiyo_trivy (G) t31m0_Vulnerability-Scanner-for-Containers (G) umahari_security (G))
libcurl : 7.36.0 : CVE-2018-14618 : 9.8 : STAT : Exploit (Github: KorayAgaya_TrivyWeb (G) Mohzeela_external-secret (G) cloudogu_ces-build-lib (G) ibrokethecloud_enforcer (G) siddharthraopotukuchi_trivy (G) simiyo_trivy (G) t31m0_Vulnerability-Scanner-for-Containers (G) umahari_security (G))
libcurl : 7.36.0 : CVE-2017-8817 : 9.8 : STAT : Exploit (Github: lnick2023_nicenice (G) qazbnm456_awesome-cve-poc (G) xbl3_awesome-cve-poc_qazbnm456 (G))
kernel : 3.10.14 : CVE-2017-18017 : 9.8 : STAT : Exploit (Github: danielnmuner_about-linux-Azure (G) hiboma_hiboma (G) intrajp_network-magic (G))
kernel : 3.10.14 : CVE-2016-7117 : 9.8 : STAT : Exploit (Github: R0B1NL1N_linux-kernel-exploitation (G) Technoashofficial_kernel-exploitation-linux (G) kdn111_linux-kernel-exploitation (G) khanhdn111_linux-kernel-exploitation (G) khanhdz-06_linux-kernel-exploitation (G) khanhdz191_linux-kernel-exploitation (G) khanhhdz_linux-kernel-exploitation (G) khanhhdz06_linux-kernel-exploitation (G) khanhnd123_linux-kernel-exploitation (G) skbasava_Linux-Kernel-exploit (G) xairy_linux-kernel-exploitation (G))
kernel : 3.10.14 : CVE-2016-3955 : 9.8 : STAT : Exploit (Github: pqsec_uboatdemo (G))
kernel : 3.10.14 : CVE-2014-9410 : 9.8 : STAT : Exploit (Github: CVE-2015-0568" title="betalphafai_CVE-2015-0568" target="_blank" >betalphafai_CVE-2015-0568 (G))
busybox : 1.22.1 : CVE-2016-2148 : 9.8 : STAT/UEMU : Exploit (PSS: 154361/Cisco-Device-Hardcoded-Credentials-GNU-glibc-BusyBox.html (P) 153278/WAGO-852-Industrial-Managed-Switch-Series-Code-Execution-Hardcoded-Credentials.html (P))
libcurl : 7.36.0 : CVE-2017-1000257 : 9.1 : STAT : Exploit (Github: geeknik_cve-fuzzing-poc (G))
kernel : 3.10.14 : CVE-2015-4002 : 9 (v2) : STAT : Exploit (Github: torvalds_linux_commit_9a59029bc218b48eff8b5d4dde5662fd79d3e1a8 (G) torvalds_linux_commit_d114b9fe78c8d6fc6e70808c2092aa307c36dc8e (G))
kernel : 3.10.14 : CVE-2015-4001 : 9 (v2) : STAT : Exploit (Github: torvalds_linux_commit_b1bb5b49373b61bf9d2c73a4d30058ba6f069e4c (G))
kernel : 3.10.14 : CVE-2022-42896 : 8.8 : STAT : Exploit (Github: Satheesh575555_linux-4.19.72_CVE-2022-42896 (G) Trinadh465_linux-4.19.72_CVE-2022-42896 (G) hshivhare67_kernel_v4.19.72_CVE-2022-42896_new (G) hshivhare67_kernel_v4.19.72_CVE-2022-42896_old (G) kdn111_linux-kernel-exploitation (G) khanhdn111_linux-kernel-exploitation (G) khanhdz-06_linux-kernel-exploitation (G) khanhdz191_linux-kernel-exploitation (G) khanhhdz_linux-kernel-exploitation (G) khanhhdz06_linux-kernel-exploitation (G) khanhnd123_linux-kernel-exploitation (G) nidhi7598_linux-4.1.15_CVE-2022-42896 (G) nomi-sec_PoC-in-GitHub (G) xairy_linux-kernel-exploitation (G))
kernel : 3.10.14 : CVE-2021-3653 : 8.8 : STAT : Exploit (Github: CVE-2021-3656-Demo" title="rami08448_CVE-2021-3656-Demo" target="_blank" >rami08448_CVE-2021-3656-Demo (G))
kernel : 3.10.14 : CVE-2019-17666 : 8.8 : STAT : Exploit (Github: alphaSeclab_sec-daily-2019 (G))
busybox : 1.22.1 : CVE-2022-28391 : 8.8 : STAT/UEMU : Exploit (Github: KazKobara_dockerfile_fswiki_local (G) grggls_crypto-devops-test (G) isgo-golgo13_gokit-gorillakit-enginesvc (G))
busybox : 1.22.1 : CVE-2017-16544 : 8.8 : STAT/UEMU : Exploit (PSS: 154361/Cisco-Device-Hardcoded-Credentials-GNU-glibc-BusyBox.html (P) 167552/Nexans-FTTO-GigaSwitch-Outdated-Components-Hardcoded-Backdoor.html (P) / Github: lnick2023_nicenice (G) qazbnm456_awesome-cve-poc (G) xbl3_awesome-cve-poc_qazbnm456 (G))
kernel : 3.10.14 : CVE-2016-3134 : 8.4 : STAT : Exploit (EDB ID: 39545)
openssl : 1.0.2f : CVE-2016-2176 : 8.2 : STAT : Exploit (Github: imhunterand_hackerone-publicy-disclosed (G) tomwillfixit_alpine-cvecheck (G))
openssl : 1.0.0 : CVE-2016-2176 : 8.2 : STAT : Exploit (Github: imhunterand_hackerone-publicy-disclosed (G) tomwillfixit_alpine-cvecheck (G))
kernel : 3.10.14 : CVE-2022-1012 : 8.2 : STAT : Exploit (Github: manas3c_CVE-POC (G) nomi-sec_PoC-in-GitHub (G))
kernel : 3.10.14 : CVE-2019-19770 : 8.2 : STAT : Exploit (Github: mcgrof_break-blktrace (G))
kernel : 3.10.14 : CVE-2019-6974 : 8.1 : STAT : Exploit (EDB ID: 46388 / PSS: 151690/Linux-kvm_ioctl_create_device-Reference-Flow-Failure.html (P) / Github: Sec20-Paper310_Paper310 (G))
busybox : 1.22.1 : CVE-2018-1000500 : 8.1 : STAT/UEMU : Exploit (Github: alphaSeclab_sec-daily-2020 (G))
kernel : 3.10.14 : CVE-2017-1000251" title="CVE-2017-1000251" target="_blank" >CVE-2017-1000251 : 8 : STAT : Exploit (EDB ID: 42762 / PSS: 144307/BlueBorne-BlueTooth-Buffer-Overflow-Proof-Of-Concept.html (D) / Github: CVE-2017-0785-BlueBorne-PoC" title="Alfa100001_-CVE-2017-0785-BlueBorne-PoC" target="_blank" >Alfa100001_-CVE-2017-0785-BlueBorne-PoC (G) ArmisSecurity_blueborne (G) AxelRoudaut_THC_BlueBorne (G) CrackSoft900_Blue-Borne (G) JeffroMF_awesome-bluetooth-security321 (G) Lexus89_blueborne (G) R0B1NL1N_linux-kernel-exploitation (G) Technoashofficial_kernel-exploitation-linux (G) chankruze_blueborne (G) chouaibhm_Bleuborn-POC-overflow (G) engn33r_awesome-bluetooth-security (G) hayzamjs_Blueborne-CVE-2017-1000251 (G) hw5773_blueborne (G) kaosagnt_ansible-everyday (G) kdn111_linux-kernel-exploitation (G) khanhdn111_linux-kernel-exploitation (G) khanhdz-06_linux-kernel-exploitation (G) khanhdz191_linux-kernel-exploitation (G) khanhhdz_linux-kernel-exploitation (G) khanhhdz06_linux-kernel-exploitation (G) khanhnd123_linux-kernel-exploitation (G) lnick2023_nicenice (G) marcinguy_blueborne-CVE-2017-1000251 (G) marcinguy_kernel-exploitation (G) own2pwn_blueborne-CVE-2017-1000251-POC (G) qazbnm456_awesome-cve-poc (G) tlatkdgus1_blueborne-CVE-2017-1000251 (G) xairy_linux-kernel-exploitation (G) xbl3_awesome-cve-poc_qazbnm456 (G))
kernel : 3.10.14 : CVE-2023-3269 : 7.8 : STAT : Exploit (Github: LumaKernel_awesome-stars (G) aneasystone_github-trending (G) izj007_wechat (G) kherrick_hacker-news (G) kun-g_Scraping-Github-trending (G) lrh2000_StackRot (G) nomi-sec_PoC-in-GitHub (G))
kernel : 3.10.14 : CVE-2023-32233 : 7.8 : STAT : Exploit (Github: CVEDB_awesome-cve-repo (G) CVEDB_top (G) Liuk3r_CVE-2023-32233 (G) Mr-xn_Penetration_Testing_POC (G) PIDAN-HEIDASHUAI_CVE-2023-32233 (G) Threekiii_CVE (G) hktalent_TOP (G) nomi-sec_PoC-in-GitHub (G) oferchen_POC-CVE-2023-32233 (G) xairy_linux-kernel-exploitation (G) xyxj1024_xyxj1024.github.io (G))
kernel : 3.10.14 : CVE-2023-23559 : 7.8 : STAT : Exploit (Github: szymonh_szymonh (G))
kernel : 3.10.14 : CVE-2023-2008 : 7.8 : STAT : Exploit (Github: Mr-xn_Penetration_Testing_POC (G) bluefrostsecurity_CVE-2023-2008 (G) em1ga3l_cve-msrc-extractor (G) nomi-sec_PoC-in-GitHub (G) xairy_linux-kernel-exploitation (G))
kernel : 3.10.14 : CVE-2023-1829 : 7.8 : STAT : Exploit (Github: Threekiii_CVE (G) star-sg_CVE (G) xairy_linux-kernel-exploitation (G))
kernel : 3.10.14 : CVE-2022-45934 : 7.8 : STAT : Exploit (Github: Satheesh575555_linux-4.1.15_CVE-2022-45934 (G) Trinadh465_linux-4.1.15_CVE-2022-45934 (G) Trinadh465_linux-4.19.72_CVE-2022-45934 (G) manas3c_CVE-POC (G) nidhi7598_linux-3.0.35_CVE-2022-45934 (G) nomi-sec_PoC-in-GitHub (G))
kernel : 3.10.14 : CVE-2022-36123 : 7.8 : STAT : Exploit (Github: sickcodes_security_blob_master_advisories_SICK-2022-128.md (G))
kernel : 3.10.14 : CVE-2022-30594 : 7.8 : STAT : Exploit (PSS: 170362/Linux-PT_SUSPEND_SECCOMP-Permission-Bypass-Ptracer-Death-Race.html (P) / Github: WhooAmii_POC_to_review (G) manas3c_CVE-POC (G) nidhi7598_linux-4.19.72_CVE-2022-30594 (G) nomi-sec_PoC-in-GitHub (G))
kernel : 3.10.14 : CVE-2022-29968 : 7.8 : STAT : Exploit (Snyk: SNYK-UNMANAGED-TORVALDSLINUX-3006622 (S) / Github: Mr-xn_Penetration_Testing_POC (G) WhooAmii_POC_to_review (G) jprx_CVE-2022-29968 (G) manas3c_CVE-POC (G) nomi-sec_PoC-in-GitHub (G) xuetusummer_Penetration_Testing_POC (G))
kernel : 3.10.14 : CVE-2022-27666 : 7.8 : STAT : Exploit (Github: Albocoder_cve-2022-27666-exploits (G) CVEDB_awesome-cve-repo (G) CVEDB_top (G) Ch4nc3n_PublicExploitation (G) JERRY123S_all-poc (G) JlSakuya_Linux-Privilege-Escalation-Exploits (G) Metarget_metarget (G) Mr-xn_Penetration_Testing_POC (G) WhooAmii_POC_to_review (G) bsauce_kernel-exploit-factory (G) bsauce_kernel-security-learning (G) cyberanand1337x_bug-bounty-2022 (G) hktalent_TOP (G) j4k0m_really-good-cybersec (G) kdn111_linux-kernel-exploitation (G) khanhdn111_linux-kernel-exploitation (G) khanhdz-06_linux-kernel-exploitation (G) khanhdz191_linux-kernel-exploitation (G) khanhhdz_linux-kernel-exploitation (G) khanhhdz06_linux-kernel-exploitation (G) khanhnd123_linux-kernel-exploitation (G) manas3c_CVE-POC (G) nomi-sec_PoC-in-GitHub (G) plummm_CVE-2022-27666 (G) weeka10_-hktalent-TOP (G) xairy_linux-kernel-exploitation (G) xuetusummer_Penetration_Testing_POC (G))
kernel : 3.10.14 : CVE-2022-25265 : 7.8 : STAT : Exploit (Github: nomi-sec_PoC-in-GitHub (G) x0reaxeax_exec-prot-bypass (G))
kernel : 3.10.14 : CVE-2022-1011 : 7.8 : STAT : Exploit (PSS: 166772/Linux-FUSE-Use-After-Free.html (P) / Github: PazDak_feathers-macos-detections (G) nomi-sec_PoC-in-GitHub (G) xkaneiki_CVE-2022-1011 (G))
kernel : 3.10.14 : CVE-2022-0492 : 7.8 : STAT : Exploit (Github: JadenQ_Cloud-Computing-Security-ProjectPage (G) LeoPer02_IDS-Dataset (G) Metarget_metarget (G) PaloAltoNetworks_can-ctr-escape-cve-2022-0492 (G) SPuerBRead_shovel (G) SgtMate_container_escape_showcase (G) SofianeHamlaoui_CVE-2022-0492-Checker (G) T1erno_CVE-2022-0492-Docker-Breakout-Checker-and-PoC (G) Trinadh465_device_renesas_kernel_AOSP10_r33_CVE-2022-0492 (G) WhooAmii_POC_to_review (G) adavarski_HomeLab-Proxmox-k8s-DevSecOps-playground (G) adavarski_HomeLab-k8s-DevSecOps-playground (G) bashofmann_hacking-kubernetes (G) bigpick_cve-reading-list (G) cdk-team_CDK (G) chenaotian_CVE-2022-0492 (G) hardenedvault_ved (G) kvesta_vesta (G) manas3c_CVE-POC (G) marksowell_my-stars (G) marksowell_starred (G) marksowell_stars (G) nomi-sec_PoC-in-GitHub (G) puckiestyle_CVE-2022-0492 (G) sam8k_Dynamic-and-Static-Analysis-of-SOUPs (G) soosmile_POC (G) ssst0n3_ssst0n3 (G) teamssix_container-escape-check (G) ttauveron_cheatsheet (G) yoeelingBin_CVE-2022-0492-Container-Escape (G))
kernel : 3.10.14 : CVE-2021-42008 : 7.8 : STAT : Exploit (Github: 0xdevil_CVE-2021-42008 (G) Al1ex_LinuxEelvation (G) BachoSeven_stellestelline (G) JlSakuya_Linux-Privilege-Escalation-Exploits (G) WhooAmii_POC_to_review (G) bcoles_kasld (G) bsauce_kernel-exploit-factory (G) bsauce_kernel-security-learning (G) hardenedvault_ved (G) kdn111_linux-kernel-exploitation (G) khanhdn111_linux-kernel-exploitation (G) khanhdz-06_linux-kernel-exploitation (G) khanhdz191_linux-kernel-exploitation (G) khanhhdz_linux-kernel-exploitation (G) khanhhdz06_linux-kernel-exploitation (G) khanhnd123_linux-kernel-exploitation (G) nomi-sec_PoC-in-GitHub (G) numanturle_CVE-2021-42008 (G) soosmile_POC (G) xairy_linux-kernel-exploitation (G))
kernel : 3.10.14 : CVE-2021-3612 : 7.8 : STAT : Exploit (Github: actions-marketplace-validations_doshyt_cve-monitor (G))
kernel : 3.10.14 : CVE-2021-3444 : 7.8 : STAT : Exploit (Github: Wi1L-Y_News (G))
kernel : 3.10.14 : CVE-2021-3347 : 7.8 : STAT : Exploit (Github: WhooAmii_POC_to_review (G) manas3c_CVE-POC (G) nanopathi_linux-4.19.72_CVE-2021-3347 (G) nomi-sec_PoC-in-GitHub (G))
kernel : 3.10.14 : CVE-2021-33034 : 7.8 : STAT : Exploit (Github: Trinadh465_device_renesas_kernel_AOSP10_r33_CVE-2021-33034 (G) WhooAmii_POC_to_review (G) nomi-sec_PoC-in-GitHub (G))
kernel : 3.10.14 : CVE-2021-27365 : 7.8 : STAT : Exploit (linux-exploit-suggester / Github: JlSakuya_Linux-Privilege-Escalation-Exploits (G) aaronxie55_Presentation2_Markdown (G) c4pt000_kernel-5.11.6-expSEHDsec-HAXM-cgroup-virtio-nvidia-amd-kaliwifi (G) eeenvik1_scripts_for_YouTrack (G) gipi_cve-cemetery (G) kdn111_linux-kernel-exploitation (G) khanhdn111_linux-kernel-exploitation (G) khanhdz-06_linux-kernel-exploitation (G) khanhdz191_linux-kernel-exploitation (G) khanhhdz_linux-kernel-exploitation (G) khanhhdz06_linux-kernel-exploitation (G) khanhnd123_linux-kernel-exploitation (G) xairy_linux-kernel-exploitation (G))
kernel : 3.10.14 : CVE-2021-23134 : 7.8 : STAT : Exploit (Github: kdn111_linux-kernel-exploitation (G) khanhdn111_linux-kernel-exploitation (G) khanhdz-06_linux-kernel-exploitation (G) khanhdz191_linux-kernel-exploitation (G) khanhhdz_linux-kernel-exploitation (G) khanhhdz06_linux-kernel-exploitation (G) khanhnd123_linux-kernel-exploitation (G) xairy_linux-kernel-exploitation (G))
kernel : 3.10.14 : CVE-2021-22555" title="CVE-2021-22555" target="_blank" >CVE-2021-22555 : 7.8 : STAT : Exploit (linux-exploit-suggester / EDB ID: 50135 / MSF: netfilter_xtables_heap_oob_write_priv_esc (L) / PSS: 163528/Linux-Kernel-Netfilter-Heap-Out-Of-Bounds-Write.html (D) / Github: Al1ex_LinuxEelvation (G) CVE-2022-0995" title="AndreevSemen_CVE-2022-0995" target="_blank" >AndreevSemen_CVE-2022-0995 (G) AvavaAYA_ctf-writeup-collection (G) B0nfee_CVE-2022-0995 (G) Bonfee_CVE-2022-0995 (G) Ch4nc3n_PublicExploitation (G) ChoKyuWon_exploit_articles (G) JlSakuya_Linux-Privilege-Escalation-Exploits (G) JoneyJunior_cve-2021-22555 (G) Metarget_awesome-cloud-native-security (G) Metarget_metarget (G) Mr-xn_Penetration_Testing_POC (G) PIG-007_kernelAll (G) Snoopy-Sec_Localroot-ALL-CVE (G) WhooAmii_POC_to_review (G) YunDingLab_struct_sanitizer (G) adavarski_HomeLab-Proxmox-k8s-DevSecOps-playground (G) adavarski_HomeLab-k8s-DevSecOps-playground (G) arttnba3_D3CTF2023_d3kcache (G) atesemre_awesome-cloud-native-security (G) bcoles_kasld (G) bcoles_kernel-exploits (G) bsauce_kernel-exploit-factory (G) bsauce_kernel-security-learning (G) cgwalters_container-cve-2021-22555 (G) cpuu_LinuxKernelCVE (G) ctrsploit_ctrsploit (G) daletoniris_CVE-2021-22555-esc-priv (G) google_security-research (G) google_security-research_security_advisories_GHSA-xxx5-8mvq-3528 (G) hac425xxx_heap-exploitation-in-real-world (G) hacking-kubernetes_hacking-kubernetes.info (G) hardenedvault_ved (G) huike007_penetration_poc (G) j4k0m_really-good-cybersec (G) joydo_CVE-Writeups (G) kdn111_linux-kernel-exploitation (G) khanhdn111_linux-kernel-exploitation (G) khanhdz-06_linux-kernel-exploitation (G) khanhdz191_linux-kernel-exploitation (G) khanhhdz_linux-kernel-exploitation (G) khanhhdz06_linux-kernel-exploitation (G) khanhnd123_linux-kernel-exploitation (G) makoto56_penetration-suite-toolkit (G) manas3c_CVE-POC (G) masjohncook_netsec-project (G) nomi-sec_PoC-in-GitHub (G) reni2study_Cloud-Native-Security2 (G) ssst0n3_ctrsploit_archived (G) teamssix_container-escape-check (G) veritas501_CVE-2021-22555-PipeVersion (G) veritas501_pipe-primitive (G) winterwolf32_CVE-S---Penetration_Testing_POC- (G) xairy_linux-kernel-exploitation (G) xuetusummer_Penetration_Testing_POC (G) xyjl-ly_CVE-2021-22555-Exploit (G))
kernel : 3.10.14 : CVE-2021-20268 : 7.8 : STAT : Exploit (Github: dylandreimerink_gobpfld (G))
kernel : 3.10.14 : CVE-2020-29661 : 7.8 : STAT : Exploit (PSS: 160681/Linux-TIOCSPGRP-Broken-Locking.html (P))
kernel : 3.10.14 : CVE-2020-27786 : 7.8 : STAT : Exploit (Github: c0ld21_ndays (G) kdn111_linux-kernel-exploitation (G) khanhdn111_linux-kernel-exploitation (G) khanhdz-06_linux-kernel-exploitation (G) khanhdz191_linux-kernel-exploitation (G) khanhhdz_linux-kernel-exploitation (G) khanhhdz06_linux-kernel-exploitation (G) khanhnd123_linux-kernel-exploitation (G) kiks7_CVE-2020-27786-Kernel-Exploit (G) xairy_linux-kernel-exploitation (G))
kernel : 3.10.14 : CVE-2020-14381 : 7.8 : STAT : Exploit (Github: kdn111_linux-kernel-exploitation (G) khanhdn111_linux-kernel-exploitation (G) khanhdz-06_linux-kernel-exploitation (G) khanhdz191_linux-kernel-exploitation (G) khanhhdz_linux-kernel-exploitation (G) khanhhdz06_linux-kernel-exploitation (G) khanhnd123_linux-kernel-exploitation (G) nanopathi_linux-4.19.72_CVE-2020-14381 (G) nomi-sec_PoC-in-GitHub (G) xairy_linux-kernel-exploitation (G))
kernel : 3.10.14 : CVE-2019-7221 : 7.8 : STAT : Exploit (PSS: 151713/KVM-VMX-Preemption-Timer-Use-After-Free.html (P) / Github: torvalds_linux_commits_master_arch_x86_kvm (G))
kernel : 3.10.14 : CVE-2019-19816 : 7.8 : STAT : Exploit (Github: bobfuzzer_CVE_tree_master_CVE-2019-19816 (G))
kernel : 3.10.14 : CVE-2019-19241 : 7.8 : STAT : Exploit (EDB ID: 47779 / PSS: 155669/Linux-sendmsg-Privilege-Escalation.html (P))
kernel : 3.10.14 : CVE-2019-18675 : 7.8 : STAT : Exploit (Github: deShal3v_Public-Vulnerabilities (G) kdn111_linux-kernel-exploitation (G) khanhdn111_linux-kernel-exploitation (G) khanhdz-06_linux-kernel-exploitation (G) khanhdz191_linux-kernel-exploitation (G) khanhhdz_linux-kernel-exploitation (G) khanhhdz06_linux-kernel-exploitation (G) khanhnd123_linux-kernel-exploitation (G) xairy_linux-kernel-exploitation (G))
kernel : 3.10.14 : CVE-2019-14835 : 7.8 : STAT : Exploit (Github: alphaSeclab_sec-daily-2019 (G) kaosagnt_ansible-everyday (G))
kernel : 3.10.14 : CVE-2018-9568 : 7.8 : STAT : Exploit (Github: QuestEscape_research (G) kdn111_linux-kernel-exploitation (G) khanhdn111_linux-kernel-exploitation (G) khanhdz-06_linux-kernel-exploitation (G) khanhdz191_linux-kernel-exploitation (G) khanhhdz_linux-kernel-exploitation (G) khanhhdz06_linux-kernel-exploitation (G) khanhnd123_linux-kernel-exploitation (G) xairy_linux-kernel-exploitation (G))
kernel : 3.10.14 : CVE-2018-8781 : 7.8 : STAT : Exploit (Github: R0B1NL1N_linux-kernel-exploitation (G) kdn111_linux-kernel-exploitation (G) khanhdn111_linux-kernel-exploitation (G) khanhdz-06_linux-kernel-exploitation (G) khanhdz191_linux-kernel-exploitation (G) khanhhdz_linux-kernel-exploitation (G) khanhhdz06_linux-kernel-exploitation (G) khanhnd123_linux-kernel-exploitation (G) xairy_linux-kernel-exploitation (G))
kernel : 3.10.14 : CVE-2018-6555 : 7.8 : STAT : Exploit (Github: kdn111_linux-kernel-exploitation (G) khanhdn111_linux-kernel-exploitation (G) khanhdz-06_linux-kernel-exploitation (G) khanhdz191_linux-kernel-exploitation (G) khanhhdz_linux-kernel-exploitation (G) khanhhdz06_linux-kernel-exploitation (G) khanhnd123_linux-kernel-exploitation (G) xairy_linux-kernel-exploitation (G))
kernel : 3.10.14 : CVE-2018-25015 : 7.8 : STAT : Exploit (Github: plummm_SyzScope (G))
kernel : 3.10.14 : CVE-2018-18281 : 7.8 : STAT : Exploit (PSS: 150001/Linux-mremap-TLB-Flush-Too-Late.html (P) / Github: jiayy_android_vuln_poc-exp (G) kdn111_linux-kernel-exploitation (G) khanhdn111_linux-kernel-exploitation (G) khanhdz-06_linux-kernel-exploitation (G) khanhdz191_linux-kernel-exploitation (G) khanhhdz_linux-kernel-exploitation (G) khanhhdz06_linux-kernel-exploitation (G) khanhnd123_linux-kernel-exploitation (G) xairy_linux-kernel-exploitation (G))
kernel : 3.10.14 : CVE-2018-14634 : 7.8 : STAT : Exploit (EDB ID: 45516 / PSS: 149567/Linux-create_elf_tables-Integer-Overflow.html (P) / Github: 0xT11_CVE-POC (G) ARGOeu-Metrics_secmon-probes (G) ARGOeu_secmon-probes (G) anoaghost_Localroot_Compile (G) kdn111_linux-kernel-exploitation (G) khanhdn111_linux-kernel-exploitation (G) khanhdz-06_linux-kernel-exploitation (G) khanhdz191_linux-kernel-exploitation (G) khanhhdz_linux-kernel-exploitation (G) khanhhdz06_linux-kernel-exploitation (G) khanhnd123_linux-kernel-exploitation (G) lnick2023_nicenice (G) luan0ap_cve-2018-14634 (G) qazbnm456_awesome-cve-poc (G) xairy_linux-kernel-exploitation (G) xbl3_awesome-cve-poc_qazbnm456 (G))
kernel : 3.10.14 : CVE-2018-13405 : 7.8 : STAT : Exploit (EDB ID: 45033)
kernel : 3.10.14 : CVE-2018-12233 : 7.8 : STAT : Exploit (Github: shankarapailoor_moonshine (G))
kernel : 3.10.14 : CVE-2017-9077 : 7.8 : STAT : Exploit (Github: idhyt_androotzf (G))
kernel : 3.10.14 : CVE-2017-8890 : 7.8 : STAT : Exploit (Github: 7043mcgeep_cve-2017-8890-msf (G) Al1ex_LinuxEelvation (G) JlSakuya_Linux-Privilege-Escalation-Exploits (G) beraphin_CVE-2017-8890 (G) bsauce_kernel-exploit-factory (G) bsauce_kernel-security-learning (G) dadreamer_lsm_trasher (G) idhyt_androotzf (G) lnick2023_nicenice (G) mudongliang_LinuxFlaw (G) oneoy_cve- (G) qazbnm456_awesome-cve-poc (G) snorez_exploits (G) tangsilian_android-vuln (G) thinkycx_CVE-2017-8890 (G) xbl3_awesome-cve-poc_qazbnm456 (G))
kernel : 3.10.14 : CVE-2017-8824 : 7.8 : STAT : Exploit (EDB ID: 43234 / PSS: 145235/Linux-Kernel-DCCP-Socket-Use-After-Free.html (P))
kernel : 3.10.14 : CVE-2017-7541 : 7.8 : STAT : Exploit (Github: freener_pocs (G))
kernel : 3.10.14 : CVE-2017-7308 : 7.8 : STAT : Exploit (linux-exploit-suggester / EDB ID: 44654 / MSF: af_packet_packet_set_ring_priv_esc (L) / Github: Al1ex_LinuxEelvation (G) C0dak_linux-kernel-exploits (G) C0dak_local-root-exploit- (G) CKmaenn_kernel-exploits (G) De4dCr0w_Linux-kernel-EoP-exp (G) Feng4_linux-kernel-exploits (G) JlSakuya_Linux-Privilege-Escalation-Exploits (G) Mecyu_googlecontainers (G) Metarget_metarget (G) Micr067_linux-kernel-exploits (G) QChiLan_linux-exp (G) R0B1NL1N_Linux-Kernal-Exploits-m- (G) R0B1NL1N_Linux-Kernel-Exploites (G) R0B1NL1N_linux-kernel-exploitation (G) RLee063_RLee063 (G) RouNNdeL_anti-rootkit-lkm (G) SecWiki_linux-kernel-exploits (G) Shadowshusky_linux-kernel-exploits (G) Singlea-lyh_linux-kernel-exploits (G) Snoopy-Sec_Localroot-ALL-CVE (G) Technoashofficial_kernel-exploitation-linux (G) albinjoshy03_linux-kernel-exploits (G) amrelsadane123_Ecploit-kernel-4.10-linux-local (G) anoaghost_Localroot_Compile (G) arttnba3_D3CTF2023_d3kcache (G) bcoles_kernel-exploits (G) bitdefender_vbh_sample (G) bsauce_kernel-exploit-factory (G) bsauce_kernel-security-learning (G) coffee727_linux-exp (G) copperfieldd_linux-kernel-exploits (G) distance-vector_linux-kernel-exploits (G) fei9747_LinuxEelvation (G) ferovap_Tools (G) h4x0r-dz_local-root-exploit- (G) jiayy_android_vuln_poc-exp (G) kdn111_linux-kernel-exploitation (G) khanhdn111_linux-kernel-exploitation (G) khanhdz-06_linux-kernel-exploitation (G) khanhdz191_linux-kernel-exploitation (G) khanhhdz_linux-kernel-exploitation (G) khanhhdz06_linux-kernel-exploitation (G) khanhnd123_linux-kernel-exploitation (G) kkamagui_linux-kernel-exploits (G) kumardineshwar_linux-kernel-exploits (G) lnick2023_nicenice (G) m0mkris_linux-kernel-exploits (G) mateeuslinno_kernel-linux-xpls (G) mudongliang_LinuxFlaw (G) n3t1nv4d3_kernel-exploits (G) oneoy_cve- (G) ozkanbilge_Linux-Kernel-Exploits (G) password520_linux-kernel-exploits (G) qazbnm456_awesome-cve-poc (G) qiantu88_Linux--exp (G) rakjong_LinuxElevation (G) seclab-ucr_KOOBE (G) skbasava_Linux-Kernel-exploit (G) spencerdodd_kernelpop (G) vusec_blindside (G) xairy_kernel-exploits (G) xairy_linux-kernel-exploitation (G) xbl3_awesome-cve-poc_qazbnm456 (G) xfinest_linux-kernel-exploits (G) xssfile_linux-kernel-exploits (G) yige666_linux-kernel-exploits (G) zyjsuper_linux-kernel-exploits (G))
kernel : 3.10.14 : CVE-2017-7184 : 7.8 : STAT : Exploit (Github: R0B1NL1N_linux-kernel-exploitation (G) Technoashofficial_kernel-exploitation-linux (G) bsauce_kernel-security-learning (G) kdn111_linux-kernel-exploitation (G) khanhdn111_linux-kernel-exploitation (G) khanhdz-06_linux-kernel-exploitation (G) khanhdz191_linux-kernel-exploitation (G) khanhhdz_linux-kernel-exploitation (G) khanhhdz06_linux-kernel-exploitation (G) khanhnd123_linux-kernel-exploitation (G) mudongliang_LinuxFlaw (G) oneoy_cve- (G) purplewall1206_PET (G) ret2p4nda_kernel-pwn (G) skbasava_Linux-Kernel-exploit (G) snorez_blog (G) snorez_exploits (G) xairy_linux-kernel-exploitation (G) xyongcn_exploit (G))
kernel : 3.10.14 : CVE-2017-6074 : 7.8 : STAT : Exploit (linux-exploit-suggester / EDB ID: 41457 / PSS: 141339/Linux-Kernel-4.4.0-Ubuntu-DCCP-Double-Free-Crash.html (D) 141331/Linux-Kernel-4.4.0-Ubuntu-DCCP-Double-Free-Privilege-Escalation.html (P) / Github: Al1ex_LinuxEelvation (G) Amet13_vulncontrol (G) AtaraxiaCoLtd_vlun_report (G) BimsaraMalinda_Linux-Kernel-4.4.0-Ubuntu---DCCP-Double-Free-Privilege-Escalation-CVE-2017-6074 (G) C0dak_linux-kernel-exploits (G) C0dak_local-root-exploit- (G) CKmaenn_kernel-exploits (G) De4dCr0w_Linux-kernel-EoP-exp (G) Dk0n9_linux_exploit (G) Feng4_linux-kernel-exploits (G) JlSakuya_Linux-Privilege-Escalation-Exploits (G) Metarget_metarget (G) Micr067_linux-kernel-exploits (G) QChiLan_linux-exp (G) R0B1NL1N_Linux-Kernal-Exploits-m- (G) R0B1NL1N_Linux-Kernel-Exploites (G) R0B1NL1N_linux-kernel-exploitation (G) SecWiki_linux-kernel-exploits (G) Shadowshusky_linux-kernel-exploits (G) Singlea-lyh_linux-kernel-exploits (G) Snoopy-Sec_Localroot-ALL-CVE (G) Technoashofficial_kernel-exploitation-linux (G) WhaleShark-Team_murasame (G) albinjoshy03_linux-kernel-exploits (G) amrelsadane123_Ecploit-kernel-4.10-linux-local (G) anoaghost_Localroot_Compile (G) bsauce_kernel-exploit-factory (G) bsauce_kernel-security-learning (G) coffee727_linux-exp (G) copperfieldd_linux-kernel-exploits (G) distance-vector_linux-kernel-exploits (G) fei9747_LinuxEelvation (G) ferovap_Tools (G) h4x0r-dz_local-root-exploit- (G) imhunterand_hackerone-publicy-disclosed (G) jiayy_android_vuln_poc-exp (G) kaosagnt_ansible-everyday (G) kdn111_linux-kernel-exploitation (G) khanhdn111_linux-kernel-exploitation (G) khanhdz-06_linux-kernel-exploitation (G) khanhdz191_linux-kernel-exploitation (G) khanhhdz_linux-kernel-exploitation (G) khanhhdz06_linux-kernel-exploitation (G) khanhnd123_linux-kernel-exploitation (G) kkamagui_linux-kernel-exploits (G) kumardineshwar_linux-kernel-exploits (G) lnick2023_nicenice (G) m0mkris_linux-kernel-exploits (G) mateeuslinno_kernel-linux-xpls (G) ozkanbilge_Linux-Kernel-Exploits (G) password520_linux-kernel-exploits (G) qazbnm456_awesome-cve-poc (G) qiantu88_Linux--exp (G) rakjong_LinuxElevation (G) skbasava_Linux-Kernel-exploit (G) spencerdodd_kernelpop (G) xairy_kernel-exploits (G) xairy_linux-kernel-exploitation (G) xbl3_awesome-cve-poc_qazbnm456 (G) xfinest_linux-kernel-exploits (G) xssfile_linux-kernel-exploits (G) xyongcn_exploit (G) yige666_linux-kernel-exploits (G) zyjsuper_linux-kernel-exploits (G))
kernel : 3.10.14 : CVE-2017-5669 : 7.8 : STAT : Exploit (Github: omniosorg_lx-port-data (G))
kernel : 3.10.14 : CVE-2017-16939 : 7.8 : STAT : Exploit (EDB ID: 44049 / Github: Al1ex_LinuxEelvation (G) De4dCr0w_Linux-kernel-EoP-exp (G) JlSakuya_Linux-Privilege-Escalation-Exploits (G) Micr067_linux-kernel-exploits (G) QChiLan_linux-exp (G) R0B1NL1N_Linux-Kernal-Exploits-m- (G) SecWiki_linux-kernel-exploits (G) Snoopy-Sec_Localroot-ALL-CVE (G) albinjoshy03_linux-kernel-exploits (G) distance-vector_linux-kernel-exploits (G) fei9747_LinuxEelvation (G) kumardineshwar_linux-kernel-exploits (G) ozkanbilge_Linux-Kernel-Exploits (G) password520_linux-kernel-exploits (G) qiantu88_Linux--exp (G) rakjong_LinuxElevation (G) xfinest_linux-kernel-exploits (G) xssfile_linux-kernel-exploits (G) yige666_linux-kernel-exploits (G) zyjsuper_linux-kernel-exploits (G))
kernel : 3.10.14 : CVE-2017-15649 : 7.8 : STAT : Exploit (EDB ID: 44053)
kernel : 3.10.14 : CVE-2017-11176 : 7.8 : STAT : Exploit (EDB ID: 45553 / PSS: 149707/Linux-Kernel-mq_notify-double-sock_put-Local-Privilege-Escalation.html (L) / Github: Al1ex_LinuxEelvation (G) CERTCC_Linux-Kernel-Analysis-Environment (G) DoubleMice_cve-2017-11176 (G) Flerov_WindowsExploitDev (G) HckEX_CVE-2017-11176 (G) JlSakuya_Linux-Privilege-Escalation-Exploits (G) Norido_kernel (G) ahpaleus_ahp_cheatsheet (G) anoaghost_Localroot_Compile (G) bsauce_kernel-exploit-factory (G) bsauce_kernel-security-learning (G) c3r34lk1ll3r_CVE-2017-11176 (G) CVE-2017-5123" title="c3r34lk1ll3r_CVE-2017-5123" target="_blank" >c3r34lk1ll3r_CVE-2017-5123 (G) cranelab_exploit-development (G) gladiopeace_awesome-stars (G) jopraveen_exploit-development (G) kdn111_linux-kernel-exploitation (G) khanhdn111_linux-kernel-exploitation (G) khanhdz-06_linux-kernel-exploitation (G) khanhdz191_linux-kernel-exploitation (G) khanhhdz_linux-kernel-exploitation (G) khanhhdz06_linux-kernel-exploitation (G) khanhnd123_linux-kernel-exploitation (G) klecko_exploits (G) leonardo1101_cve-2017-11176 (G) lexfo_cve-2017-11176 (G) paulveillard_cybersecurity-exploit-development (G) pjlantz_optee-qemu (G) prince-stark_Exploit-Developement (G) xairy_linux-kernel-exploitation (G))
kernel : 3.10.14 : CVE-2017-1000379 : 7.8 : STAT : Exploit (EDB ID: 42275 / PSS: 143205/Linux-Kernel-ldso_hwcap_64-Stack-Clash-Privilege-Escalation.html (P) / Github: ferovap_Tools (G) jedai47_lastcve (G) lnick2023_nicenice (G) qazbnm456_awesome-cve-poc (G) spencerdodd_kernelpop (G) xbl3_awesome-cve-poc_qazbnm456 (G))
kernel : 3.10.14 : CVE-2017-1000365 : 7.8 : STAT : Exploit (Github: lnick2023_nicenice (G) qazbnm456_awesome-cve-poc (G) xbl3_awesome-cve-poc_qazbnm456 (G))
kernel : 3.10.14 : CVE-2017-1000363 : 7.8 : STAT : Exploit (Github: R0B1NL1N_linux-kernel-exploitation (G) Technoashofficial_kernel-exploitation-linux (G) kdn111_linux-kernel-exploitation (G) khanhdn111_linux-kernel-exploitation (G) khanhdz-06_linux-kernel-exploitation (G) khanhdz191_linux-kernel-exploitation (G) khanhhdz_linux-kernel-exploitation (G) khanhhdz06_linux-kernel-exploitation (G) khanhnd123_linux-kernel-exploitation (G) xairy_linux-kernel-exploitation (G))
kernel : 3.10.14 : CVE-2017-1000253 : 7.8 : STAT : Exploit (linux-exploit-suggester / EDB ID: 42887 / Github: JlSakuya_Linux-Privilege-Escalation-Exploits (G) RicterZ_PIE-Stack-Clash-CVE-2017-1000253 (G) kaosagnt_ansible-everyday (G))
kernel : 3.10.14 : CVE-2016-9793 : 7.8 : STAT : Exploit (EDB ID: 41995 / PSS: 142487/Linux-Kernel-SO_SNDBUFFORCE-SO_RCVBUFFORCE-Local-Privilege-Escalation.html (L) / Github: Al1ex_LinuxEelvation (G) C0dak_linux-kernel-exploits (G) C0dak_local-root-exploit- (G) CKmaenn_kernel-exploits (G) De4dCr0w_Linux-kernel-EoP-exp (G) Feng4_linux-kernel-exploits (G) JlSakuya_Linux-Privilege-Escalation-Exploits (G) Micr067_linux-kernel-exploits (G) QChiLan_linux-exp (G) R0B1NL1N_Linux-Kernal-Exploits-m- (G) R0B1NL1N_Linux-Kernel-Exploites (G) SecWiki_linux-kernel-exploits (G) Shadowshusky_linux-kernel-exploits (G) Singlea-lyh_linux-kernel-exploits (G) Snoopy-Sec_Localroot-ALL-CVE (G) albinjoshy03_linux-kernel-exploits (G) amrelsadane123_Ecploit-kernel-4.10-linux-local (G) anoaghost_Localroot_Compile (G) bcoles_kernel-exploits (G) bsauce_kernel-exploit-factory (G) bsauce_kernel-security-learning (G) coffee727_linux-exp (G) copperfieldd_linux-kernel-exploits (G) distance-vector_linux-kernel-exploits (G) fei9747_LinuxEelvation (G) h4x0r-dz_local-root-exploit- (G) jiayy_android_vuln_poc-exp (G) kumardineshwar_linux-kernel-exploits (G) lnick2023_nicenice (G) m0mkris_linux-kernel-exploits (G) ozkanbilge_Linux-Kernel-Exploits (G) password520_linux-kernel-exploits (G) qazbnm456_awesome-cve-poc (G) qiantu88_Linux--exp (G) rakjong_LinuxElevation (G) xairy_kernel-exploits (G) xairy_kernel-exploits_tree_master_CVE-2016-9793 (G) xbl3_awesome-cve-poc_qazbnm456 (G) xfinest_linux-kernel-exploits (G) xssfile_linux-kernel-exploits (G) xyongcn_exploit (G) yige666_linux-kernel-exploits (G) zyjsuper_linux-kernel-exploits (G))
kernel : 3.10.14 : CVE-2016-8655 : 7.8 : STAT : Exploit (EDB ID: 44696 / MSF: af_packet_chocobo_root_priv_esc (L) / PSS: 140063/Linux-Kernel-4.4.0-AF_PACKET-Race-Condition-Privilege-Escalation.html (P) / Github: 84KaliPleXon3_linux-exploit-suggester (G) JlSakuya_Linux-Privilege-Escalation-Exploits (G) KosukeShimofuji_CVE-2016-8655 (G) LakshmiDesai_CVE-2016-8655 (G) LucidOfficial_Linux-exploit-suggestor (G) Metarget_metarget (G) R0B1NL1N_linux-kernel-exploitation (G) Realradioactive_archive-linux-exploit-suggester-master (G) SeaJae_exploitPlayground (G) Snoopy-Sec_Localroot-ALL-CVE (G) Technoashofficial_kernel-exploitation-linux (G) The-Z-Labs_linux-exploit-suggester (G) TheJoyOfHacking_mzet-linux-exploit-suggester (G) agkunkle_chocobo (G) anoaghost_Localroot_Compile (G) bcoles_kernel-exploits (G) bsauce_kernel-exploit-factory (G) externalist_exploit_playground (G) go-bi_go-bi-soft (G) jondonas_linux-exploit-suggester-2 (G) kdn111_linux-kernel-exploitation (G) khanhdn111_linux-kernel-exploitation (G) khanhdz-06_linux-kernel-exploitation (G) khanhdz191_linux-kernel-exploitation (G) khanhhdz_linux-kernel-exploitation (G) khanhhdz06_linux-kernel-exploitation (G) khanhnd123_linux-kernel-exploitation (G) kkamagui_linux-kernel-exploits (G) likescam_exploit_playground_lists_androidCVE (G) martinmullins_CVE-2016-8655_Android (G) mudongliang_LinuxFlaw (G) mzet-_linux-exploit-suggester (G) n3t1nv4d3_kernel-exploits (G) oneoy_cve- (G) retr0-13_linux_exploit_suggester (G) rodrigosilvaluz_linux-exploit-suggester (G) scarvell_cve-2016-8655 (G) skbasava_Linux-Kernel-exploit (G) stefanocutelle_linux-exploit-suggester (G) xairy_linux-kernel-exploitation (G) xyongcn_exploit (G))
kernel : 3.10.14 : CVE-2016-7911 : 7.8 : STAT : Exploit (Github: wcventure_PERIOD (G))
kernel : 3.10.14 : CVE-2016-5342 : 7.8 : STAT : Exploit (Github: SeaJae_exploitPlayground (G) externalist_exploit_playground (G) freener_exploits (G) likescam_exploit_playground_lists_androidCVE (G) tangsilian_android-vuln (G))
kernel : 3.10.14 : CVE-2016-5340 : 7.8 : STAT : Exploit (Github: kdn111_linux-kernel-exploitation (G) khanhdn111_linux-kernel-exploitation (G) khanhdz-06_linux-kernel-exploitation (G) khanhdz191_linux-kernel-exploitation (G) khanhhdz_linux-kernel-exploitation (G) khanhhdz06_linux-kernel-exploitation (G) khanhnd123_linux-kernel-exploitation (G) xairy_linux-kernel-exploitation (G))
kernel : 3.10.14 : CVE-2016-5195" title="CVE-2016-5195" target="_blank" >CVE-2016-5195" title="CVE-2016-5195" target="_blank" >CVE-2016-5195" title="CVE-2016-5195" target="_blank" >CVE-2016-5195" title="CVE-2016-5195" target="_blank" >CVE-2016-5195" title="CVE-2016-5195" target="_blank" >CVE-2016-5195" title="CVE-2016-5195" target="_blank" >CVE-2016-5195 : 7.8 : STAT : Exploit (linux-exploit-suggester / EDB ID: 40616 / Snyk: SNYK-UNMANAGED-TORVALDSLINUX-3004738 (S) / PSS: 139286/DirtyCow-Linux-Kernel-Race-Condition.html (P) 139287/DirtyCow-Local-Root-Proof-Of-Concept.html (L) 139922/Linux-Kernel-Dirty-COW-PTRACE_POKEDATA-Privilege-Escalation.html (P) 139923/Linux-Kernel-Dirty-COW-PTRACE_POKEDATA-Privilege-Escalation.html (P) / Github: 0xS3rgI0_OSCP (G) 0xdecae_TuruT (G) 0xs3rgi0_OSCP (G) 15866095848_15866095848 (G) 20142995_pocsuite (G) 20142995_sectool (G) 26597925_cowroot (G) 3TH1N_Kali (G) 3sc4p3_oscp-notes (G) 4n6strider_The-Security-Handbook (G) 56KbModem_Internship (G) ARGOeu-Metrics_secmon-probes (G) ARGOeu_secmon-probes (G) ASRTeam_CVE-2016-5195 (G) Ahsanzia_OSCP (G) AidenPearce369_OSCP-Notes (G) Ak500k_oscp-notes (G) Al1ex_LinuxEelvation (G) ArkAngeL43_CVE-2016-5195 (G) Brucetg_DirtyCow-EXP (G) C0dak_linux-kernel-exploits (G) C0dak_local-root-exploit- (G) CVEDB_awesome-cve-repo (G) CVEDB_top (G) DanielEbert_CVE-2016-5195 (G) DanielEbert_dirtycow-vdso (G) DanielEbert_dirtycow-vdsopart2 (G) DavidBuchanan314_cowroot (G) De4dCr0w_Linux-kernel-EoP-exp (G) DictionaryHouse_The-Security-Handbook-Kali-Linux (G) DotSight7_Cheatsheet (G) EliasPond_otus-security-hw (G) Elinpf_OSCP-survival-guide (G) Feng4_linux-kernel-exploits (G) FloridSleeves_os-experiment-4 (G) Gajasurve_The-Security-Handbook (G) Getshell_LinuxTQ (G) GhostScreaming_os-experiment-4 (G) CVE-2022-0847" title="CVE-2022-0847" target="_blank" >CVE-2022-0847" title="CVE-2022-0847" target="_blank" >CVE-2022-0847" title="CVE-2022-0847" target="_blank" >CVE-2022-0847-DirtyPipe" title="Greetdawn_CVE-2022-0847-DirtyPipe" target="_blank" >Greetdawn_CVE-2022-0847-DirtyPipe (G) Hellnino18_ansible-dirty-cow (G) Hellnino18_ansible-dirty-cow-2 (G) Hetti_PoC-Exploitchain-GS-VBox-DirtyCow- (G) IchiiDev_random-scripts (G) JERRY123S_all-poc (G) Jean-Francois-C_Boot2root-CTFs-Writeups (G) JlSakuya_Linux-Privilege-Escalation-Exploits (G) JoyChou93_sks (G) KasunPriyashan_Y2S1-Project-Linux-Exploitaion-using-CVE-2016-5195-Vulnerability (G) KaviDk_dirtyCow (G) KoreaSecurity_Container_attack (G) Ly0nt4r_OSCP (G) MCANMCAN_TheDirtyPipeExploit (G) MLGBSec_os-survival (G) Metarget_awesome-cloud-native-security (G) Metarget_cloud-native-security-book (G) Metarget_k0otkit (G) Metarget_metarget (G) Micr067_Pentest_Note (G) Micr067_linux-kernel-exploits (G) Mr-e5908de784a1e38197_PenetrationTestCheatSheet (G) NATHAN76543217_snow_crash (G) Oakesh_The-Security-Handbook (G) OrangeGzY_security-research-learning (G) QChiLan_linux-exp (G) R0B1NL1N_Linux-Kernal-Exploits-m- (G) R0B1NL1N_Linux-Kernel-Exploites (G) R0B1NL1N_linux-kernel-exploitation (G) Raavan353_Pentest-notes (G) RoqueNight_Linux-Privilege-Escalation-Basics (G) Satya42_OSCP-Guide (G) SecWiki_linux-kernel-exploits (G) SenpaiX00_OSCP-Survival (G) SexyBeast233_SecBooks (G) Shadowshusky_linux-kernel-exploits (G) Shadowven_Vulnerability_Reproduction (G) Singlea-lyh_linux-kernel-exploits (G) Snoopy-Sec_Localroot-ALL-CVE (G) Somchandra17_Privilege-Escalation-For-Linux (G) SunWeb3Sec_Kubernetes-security (G) T3b0g025_PWK-CheatSheet (G) Technoashofficial_kernel-exploitation-linux (G) V0WKeep3r_CVE-2022-0847-DirtyPipe-Exploit (G) WangYihang_Exploit-Framework (G) X0RW3LL_XenSpawn (G) XiaoGwo_XiaoGwo (G) XingtongGe_BIT_NetworkSecurity2021Spring (G) Ygodsec_- (G) acidburnmi_CVE-2016-5195-master (G) adavarski_HomeLab-Proxmox-k8s-DevSecOps-playground (G) adavarski_HomeLab-k8s-DevSecOps-playground (G) agrim123_reading-material (G) aishee_scan-dirtycow (G) akr3ch_OSCP-Survival-Guide (G) aktechnohacker_OSCP-Notes (G) albinjoshy03_linux-kernel-exploits (G) alizain51_OSCP-Notes-ALL-CREDITS-TO-OPTIXAL- (G) amane312_Linux_menthor (G) ambynotcoder_C-libraries (G) anoaghost_Localroot_Compile (G) arbll_dirtycow (G) artemgurzhii_dirty-cow-root-exploit (G) arttnba3_CVE-2016-5195 (G) arttnba3_XDU-SCE_OS-Experiment_2021 (G) arya07071992_oscp_guide (G) atesemre_awesome-cloud-native-security (G) aymankhder_OSCPvipNOTES (G) baselsayeh_custombackdoorlshserver (G) bitdefender_vbh_sample (G) brant-ruan_awesome-container-escape (G) chreniuc_CTF (G) codeage_root-honda (G) coffee727_linux-exp (G) coollce_coollce (G) copperfieldd_linux-kernel-exploits (G) cpardue_OSCP-PWK-Notes-Public (G) cyberanand1337x_bug-bounty-2022 (G) czq945659538_-study (G) davidqphan_DirtyCow (G) davidqphan_dirtycow-android-poc (G) deepamkanjani_The-Security-Handbook (G) dirtycow_dirtycow.github.io_wiki_PoCs (G) distance-vector_linux-kernel-exploits (G) doduytrung_The-Security-Handbook (G) doffensive_wired-courtyard (G) droidvoider_dirtycow-replacer (G) dulanjaya23_Dirty-Cow-CVE-2016-5195- (G) e-hakson_OSCP (G) echohun_tools (G) eliesaba_Hack_The_Box (G) eljosep_OSCP-Guide (G) ellietoulabi_Dirty-Cow (G) elorion_The-Security-Handbook (G) elzerjp_OSCP (G) esc0rtd3w_org.cowpoop.moooooo (G) fei9747_LinuxEelvation (G) fengjixuchui_RedTeamer (G) ferovap_Tools (G) firefart_dirtycow (G) flux10n_dirtycow (G) flyme2bluemoon_thm-advent (G) freddierice_farm-root (G) freddierice_trident (G) frizb_Linux-Privilege-Escalation (G) gaahrdner_starred (G) gameFace22_vulnmachine-walkthrough (G) gbonacini_CVE-2016-5195 (G) gebl_dirtycow-docker-vdso (G) geeksniper_Linux-privilege-escalation (G) gipi_cve-cemetery (G) go-bi_go-bi-soft (G) gurkylee_Linux-Privilege-Escalation-Basics (G) gurpreetsinghsaluja_dirtycow (G) h4x0r-dz_local-root-exploit- (G) hack-parthsharma_Personal-OSCP-Notes (G) hafizgemilang_notes (G) hafizgemilang_oscp-notes (G) hj-hsu_avar2019_frida (G) hktalent_TOP (G) hyln9_VIKIROOT (G) iamthefrogy_FYI (G) iantal_The-Security-Handbook (G) ibr2_pwk-cheatsheet (G) idhyt_androotzf (G) ifding_radare2-tutorial (G) iljaSL_boot2root (G) imfiver_CVE-2022-0847 (G) imust6226_dirtcow (G) ismailvc1111_Linux_Privilege (G) istenrot_centos-dirty-cow-ansible (G) j0nk0_GetRoot-Android-DirtyCow (G) jackyzyb_os-experiment-4 (G) jamiechap_oscp (G) jas502n_CVE-2016-5195 (G) jeansgit_Pentest (G) jenriquezv_OSCP-Cheat-Sheets (G) jersacct_2016PilotOneClick (G) jiayy_android_vuln_poc-exp (G) joker2a_OSCP (G) jondonas_linux-exploit-suggester-2 (G) jpacg_awesome-stars (G) jrobertson5877_TuruT (G) kai5263499_awesome-container-security (G) katlol_stars (G) kcgthb_RHEL6.x-COW (G) kdn111_linux-kernel-exploitation (G) khanhdn111_linux-kernel-exploitation (G) khanhdz-06_linux-kernel-exploitation (G) khanhdz191_linux-kernel-exploitation (G) khanhhdz_linux-kernel-exploitation (G) khanhhdz06_linux-kernel-exploitation (G) khanhnd123_linux-kernel-exploitation (G) kkamagui_linux-kernel-exploits (G) kmeaw_cowcleaner (G) kumardineshwar_linux-kernel-exploits (G) kwxk_Rutgers_Cyber_Range (G) kzwkt_lkrt (G) ldenevi_CVE-2016-5195 (G) linhlt247_DirtyCOW_CVE-2016-5195 (G) lizhi16_dirtycow (G) lmarqueta_exploits (G) lnick2023_nicenice (G) lp008_Hack-readme (G) luizmlo_ctf-writeups (G) m0mkris_linux-kernel-exploits (G) m0nad_awesome-privilege-escalation (G) make0day_pentest (G) malinthag62_The-exploitation-of-Dirty-Cow-CVE-2016-5195 (G) maririn312_Linux_menthor (G) mariuspod_dirty_c0w (G) mark0519_mark0519.github.io (G) CVE-2016-8655_Android" title="martinmullins_CVE-2016-8655_Android" target="_blank" >martinmullins_CVE-2016-8655_Android (G) matteoserva_dirtycow-arm32 (G) merlinepedra_K0OTKIT (G) merlinepedra25_K0OTKIT (G) mkorthof_pc-engines-apu (G) mmt55_kalilinux (G) monkeysm8_OSCP_HELP (G) naftalyava_DirtyCow-Exploit (G) nazgul6092_2nd-Year-Project-01-Linux-Exploitation-using-CVE-20166-5195 (G) ndobson_inspec_CVE-2016-5195 (G) ne2der_AKLab (G) neargle_my-re0-k8s-security (G) nemo294840653_os-experiment-4 (G) ngadminq_Bei-Gai-penetration-test-guide (G) ngoclesydney_Cyber-Security-for-Mobile-Platforms (G) nirae_boot2root (G) nitishbadole_hacking_30 (G) nitishbadole_oscp-note-3 (G) nixawk_labs (G) nndhanasekaran_redhat_cve2016 (G) nullport_The-Security-Handbook (G) nvagus_os-experiment-4 (G) old-sceext-2020_android_img (G) oleg-fiksel_ansible_CVE-2016-5195_check (G) oneoy_DirtyCow-EXP (G) oneplus-x_MS17-010 (G) orgTestCodacy11KRepos110MB_repo-3574-my-re0-k8s-security (G) osogi_NTO_2022 (G) ozkanbilge_Linux-Kernel-Exploits (G) p00h00_linux-exploits (G) passionchenjianyegmail8_scumjrs (G) password520_RedTeamer (G) password520_linux-kernel-exploits (G) pathakabhi24_Awesome-C (G) paulveillard_cybersecurity-container-security (G) paulveillard_cybersecurity-pam (G) pbnj_The-Security-Handbook (G) personaone_OSCP (G) pgporada_ansible-role-cve (G) pyCity_Wiggles (G) qazbnm456_awesome-cve-poc (G) qiantu88_Linux--exp (G) r0eXpeR_pentest (G) r0ug3_The-Security-Handbook (G) r1is_CVE-2022-0847 (G) rakjong_LinuxElevation (G) redteampa1_my-learning (G) reni2study_Cloud-Native-Security2 (G) retr0-13_Linux-Privilege-Escalation-Basics (G) reybango_The-Security-Handbook (G) riquebatalha_single-multithreading_android (G) ruobing-wang_os_hacking_lab (G) rvolosatovs_mooshy (G) samknp_killcow (G) samknp_realcow (G) sandeeparth07_CVE-2016_5195-vulnarability (G) satyamkumar420_KaliLinuxPentestingCommands (G) scumjr_dirtycow-vdso (G) shafeekzamzam_MyOSCPresources (G) shanuka-ashen_Dirty-Cow-Explanation-CVE-2016-5195- (G) shayideep_DataSecurity- (G) shindman_ansi-playbooks (G) sideeffect42_DirtyCOWTester (G) sim1_stars (G) simp_pupmod-simp-dirtycow (G) skbasava_Linux-Kernel-exploit (G) sonu7519_linux-priv-Esc (G) source-xu_docker-vuls (G) spencerdodd_kernelpop (G) sphinxs329_OSCP-PWK-Notes-Public (G) sribaba_android-CVE-2016-5195 (G) sv3nbeast_Attack-Notes (G) tangsilian_android-vuln (G) teamssix_container-escape-check (G) CVE-2017-5123" title="teawater_CVE-2017-5123" target="_blank" >teawater_CVE-2017-5123 (G) th3-5had0w_DirtyCOW-PoC (G) thaddeuspearson_Understanding_DirtyCOW (G) timwr_CVE-2016-5195 (G) titanhp_Dirty-COW-CVE-2016-5195-Testing (G) tranquac_Linux-Privilege-Escalation (G) twfb_DVWA-Note (G) tzwlhack_DirtyCow-EXP (G) uhub_awesome-c (G) usamaelshazly_Linux-Privilege-Escalation (G) vapvin_OSCP (G) weeka10_-hktalent-TOP (G) whackmanic_OSCP_Found (G) whitephone_farm-root (G) whu-enjoy_CVE-2016-5195 (G) www-glasswall-nl_UT-DirtyCow (G) xXxhagenxXx_OSCP_Cheat_sheet (G) xairy_linux-kernel-exploitation (G) xbl3_awesome-cve-poc_qazbnm456 (G) xcsrf_OSCP-PWK-Notes-Public (G) xfinest_dirtycow (G) xfinest_linux-kernel-exploits (G) xiaoy-sec_Pentest_Note (G) xlucas_dirtycow.cr (G) xpcmdshell_derpyc0w (G) xssfile_linux-kernel-exploits (G) xyongcn_exploit (G) yatt-ze_DirtyCowAndroid (G) ycdxsb_Exploits (G) yige666_linux-kernel-exploits (G) yunmoxyz_os-experiment-4 (G) yuvaly0_exploits (G) zakariamaaraki_Dirty-COW-CVE-2016-5195- (G) zaoqi_polaris-dict-a63-arch (G) zhang040723_web (G) zyjsuper_linux-kernel-exploits (G) (X))
kernel : 3.10.14 : CVE-2016-4997 : 7.8 : STAT : Exploit (EDB ID: 40489 / MSF: netfilter_priv_esc_ipv4 (L) / Github: JlSakuya_Linux-Privilege-Escalation-Exploits (G))
kernel : 3.10.14 : CVE-2016-3672 : 7.8 : STAT : Exploit (EDB ID: 39669)
kernel : 3.10.14 : CVE-2016-2854 : 7.8 : STAT : Exploit (EDB ID: 41761 / PSS: 141914/AUFS-Ubuntu-15.10-Privilege-Escalation.html (P))
kernel : 3.10.14 : CVE-2016-2853 : 7.8 : STAT : Exploit (EDB ID: 41761 / PSS: 141914/AUFS-Ubuntu-15.10-Privilege-Escalation.html (P))
kernel : 3.10.14 : CVE-2016-2067 : 7.8 : STAT : Exploit (Github: hhj4ck_CVE-2016-2067 (G))
kernel : 3.10.14 : CVE-2016-1583 : 7.8 : STAT : Exploit (EDB ID: 39992 / PSS: 137560/Linux-ecryptfs-Stack-Overflow.html (P) / Github: R0B1NL1N_linux-kernel-exploitation (G) Technoashofficial_kernel-exploitation-linux (G) kdn111_linux-kernel-exploitation (G) khanhdn111_linux-kernel-exploitation (G) khanhdz-06_linux-kernel-exploitation (G) khanhdz191_linux-kernel-exploitation (G) khanhhdz_linux-kernel-exploitation (G) khanhhdz06_linux-kernel-exploitation (G) khanhnd123_linux-kernel-exploitation (G) skbasava_Linux-Kernel-exploit (G) xairy_linux-kernel-exploitation (G))
kernel : 3.10.14 : CVE-2016-1576 : 7.8 : STAT : Exploit (EDB ID: 41763)
kernel : 3.10.14 : CVE-2016-1575 : 7.8 : STAT : Exploit (EDB ID: 41762)
kernel : 3.10.14 : CVE-2016-0728 : 7.8 : STAT : Exploit (linux-exploit-suggester / EDB ID: 39277 / PSS: 137633/Linux-Kernel-4.4.1-REFCOUNT-Overflow-Use-After-Free.html (L) 135330/Linux-Kernel-REFCOUNT-Overflow-Use-After-Free.html (P) / Github: 1946139405_community-templates (G) Al1ex_LinuxEelvation (G) C0dak_linux-kernel-exploits (G) C0dak_local-root-exploit- (G) De30_zabbix_community-templates (G) De4dCr0w_Linux-kernel-EoP-exp (G) Feng4_linux-kernel-exploits (G) JlSakuya_Linux-Privilege-Escalation-Exploits (G) Michael-Git-Web_templateszbx (G) Micr067_linux-kernel-exploits (G) QChiLan_linux-exp (G) R0B1NL1N_Linux-Kernal-Exploits-m- (G) R0B1NL1N_Linux-Kernel-Exploites (G) R0B1NL1N_linux-kernel-exploitation (G) SecWiki_linux-kernel-exploits (G) Shadowshusky_linux-kernel-exploits (G) Singlea-lyh_linux-kernel-exploits (G) Snoopy-Sec_Localroot-ALL-CVE (G) Technoashofficial_kernel-exploitation-linux (G) albinjoshy03_linux-kernel-exploits (G) bathien_starred (G) bittorrent3389_cve-2016-0728 (G) bjzz_cve_2016_0728_exploit (G) coffee727_linux-exp (G) copperfieldd_linux-kernel-exploits (G) distance-vector_linux-kernel-exploits (G) fedoraredteam_elem (G) fei9747_LinuxEelvation (G) ferovap_Tools (G) fochess_cve_2016_0728 (G) googleweb_CVE-2016-0728 (G) h4x0r-dz_local-root-exploit- (G) hal0taso_CVE-2016-0728 (G) isnuryusuf_cve_2016_0728 (G) kdn111_linux-kernel-exploitation (G) kennetham_cve_2016_0728 (G) khanhdn111_linux-kernel-exploitation (G) khanhdz-06_linux-kernel-exploitation (G) khanhdz191_linux-kernel-exploitation (G) khanhhdz_linux-kernel-exploitation (G) khanhhdz06_linux-kernel-exploitation (G) khanhnd123_linux-kernel-exploitation (G) kumardineshwar_linux-kernel-exploits (G) lnick2023_nicenice (G) m0mkris_linux-kernel-exploits (G) mfer_cve_2016_0728 (G) mudongliang_LinuxFlaw (G) nardholio_cve-2016-0728 (G) neuschaefer_cve-2016-0728-testbed (G) oneoy_cve- (G) ozkanbilge_Linux-Kernel-Exploits (G) p00h00_linux-exploits (G) password520_linux-kernel-exploits (G) qazbnm456_awesome-cve-poc (G) qiantu88_Linux--exp (G) rakjong_LinuxElevation (G) redteam-project_lem (G) skbasava_Linux-Kernel-exploit (G) slunart_Zabbix-Templates (G) spencerdodd_kernelpop (G) sugarvillela_CVE (G) sunnyjiang_cve_2016_0728 (G) th30d00r_Linux-Vulnerability-CVE-2016-0728-and-Exploit (G) tndud042713_cve (G) whiteHat001_Kernel-Security (G) xairy_linux-kernel-exploitation (G) xbl3_awesome-cve-poc_qazbnm456 (G) xfinest_linux-kernel-exploits (G) xssfile_linux-kernel-exploits (G) xyongcn_exploit (G) yige666_linux-kernel-exploits (G) zabbix_community-templates (G) zvjaceslavs_intshare (G) zyjsuper_linux-kernel-exploits (G))
kernel : 3.10.14 : CVE-2015-8966 : 7.8 : STAT : Exploit (Github: ThomasKing2014_android-Vulnerability-PoC (G))
kernel : 3.10.14 : CVE-2015-4003 : 7.8 (v2) : STAT : Exploit (Github: torvalds_linux_commit_04bf464a5dfd9ade0dda918e44366c2c61fce80b (G))
kernel : 3.10.14 : CVE-2015-1328 : 7.8 : STAT : Exploit (EDB ID: 40688 / MSF: overlayfs_priv_esc (L) / PSS: 132334/Ubuntu-12.04-14.04-14.10-15.04-overlayfs-Local-Root.html (P) / Github: 0x1ns4n3_CVE-2015-1328-GoldenEye (G) AfvanMoopen_tryhackme- (G) Al1ex_LinuxEelvation (G) C0dak_linux-kernel-exploits (G) C0dak_local-root-exploit- (G) DarkenCode_PoC (G) De4dCr0w_Linux-kernel-EoP-exp (G) Feng4_linux-kernel-exploits (G) Jean-Francois-C_Boot2root-CTFs-Writeups (G) JlSakuya_Linux-Privilege-Escalation-Exploits (G) Micr067_linux-kernel-exploits (G) QChiLan_linux-exp (G) QuantumPhysx2_CVE-Cheat-Sheet (G) R0B1NL1N_Linux-Kernal-Exploits-m- (G) R0B1NL1N_Linux-Kernel-Exploites (G) SR7-HACKING_LINUX-VULNERABILITY-CVE-2015-1328 (G) SecWiki_linux-kernel-exploits (G) SexyBeast233_SecBooks (G) Shadowshusky_linux-kernel-exploits (G) Shadowven_Vulnerability_Reproduction (G) Singlea-lyh_linux-kernel-exploits (G) Snoopy-Sec_Localroot-ALL-CVE (G) albinjoshy03_linux-kernel-exploits (G) amtzespinosa_tr0ll-walkthrough (G) anoaghost_Localroot_Compile (G) catsecorg_CatSec-TryHackMe-WriteUps (G) coffee727_linux-exp (G) copperfieldd_linux-kernel-exploits (G) distance-vector_linux-kernel-exploits (G) fei9747_LinuxEelvation (G) ferovap_Tools (G) h4x0r-dz_local-root-exploit- (G) j-info_ctfsite (G) kerk1_ShellShock-Scenario (G) kumardineshwar_linux-kernel-exploits (G) m0mkris_linux-kernel-exploits (G) makoto56_penetration-suite-toolkit (G) notlikethis_CVE-2015-1328 (G) ozkanbilge_Linux-Kernel-Exploits (G) p00h00_linux-exploits (G) password520_linux-kernel-exploits (G) qiantu88_Linux--exp (G) rakjong_LinuxElevation (G) redteam-project_cyber-range-scenarios (G) spencerdodd_kernelpop (G) testermas_tryhackme (G) uoanlab_vultest (G) xfinest_linux-kernel-exploits (G) xssfile_linux-kernel-exploits (G) xyongcn_exploit (G) yige666_linux-kernel-exploits (G) zyjsuper_linux-kernel-exploits (G))
kernel : 3.10.14 : CVE-2015-0570 : 7.8 : STAT : Exploit (Github: R0B1NL1N_linux-kernel-exploitation (G) Technoashofficial_kernel-exploitation-linux (G) kdn111_linux-kernel-exploitation (G) khanhdn111_linux-kernel-exploitation (G) khanhdz-06_linux-kernel-exploitation (G) khanhdz191_linux-kernel-exploitation (G) khanhhdz_linux-kernel-exploitation (G) khanhhdz06_linux-kernel-exploitation (G) khanhnd123_linux-kernel-exploitation (G) skbasava_Linux-Kernel-exploit (G) xairy_linux-kernel-exploitation (G))
kernel : 3.10.14 : CVE-2015-0569 : 7.8 : STAT : Exploit (EDB ID: 39308 / PSS: 135372/Linux-Kernel-prima-WLAN-Driver-Heap-Overflow.html (P) / Github: tangsilian_android-vuln (G))
kernel : 3.10.14 : CVE-2015-0568 : 7.8 : STAT : Exploit (Github: betalphafai_CVE-2015-0568 (G) kdn111_linux-kernel-exploitation (G) khanhdn111_linux-kernel-exploitation (G) khanhdz-06_linux-kernel-exploitation (G) khanhdz191_linux-kernel-exploitation (G) khanhhdz_linux-kernel-exploitation (G) khanhhdz06_linux-kernel-exploitation (G) khanhnd123_linux-kernel-exploitation (G) xairy_linux-kernel-exploitation (G))
kernel : 3.10.14 : CVE-2014-9322 : 7.8 : STAT : Exploit (EDB ID: 44205 / PSS: 130593/Linux-CVE-2014-9322-Proof-Of-Concept.html (L) / Github: Flerov_WindowsExploitDev (G) JlSakuya_Linux-Privilege-Escalation-Exploits (G) R0B1NL1N_linux-kernel-exploitation (G) RKX1209_CVE-2014-9322 (G) Technoashofficial_kernel-exploitation-linux (G) cranelab_exploit-development (G) dyjakan_exploit-development-case-studies (G) kdn111_linux-kernel-exploitation (G) khanhdn111_linux-kernel-exploitation (G) khanhdz-06_linux-kernel-exploitation (G) khanhdz191_linux-kernel-exploitation (G) khanhhdz_linux-kernel-exploitation (G) khanhhdz06_linux-kernel-exploitation (G) khanhnd123_linux-kernel-exploitation (G) paulveillard_cybersecurity-exploit-development (G) skbasava_Linux-Kernel-exploit (G) tangsilian_android-vuln (G) xairy_linux-kernel-exploitation (G))
kernel : 3.10.14 : CVE-2014-0101 : 7.8 (v2) : STAT : Exploit (Github: KPN-CISO_DRA_writeup (G))
kernel : 3.10.14 : CVE-2013-7445 : 7.8 (v2) : STAT : Exploit (Github: sjourdan_clair-lab (G))
openssl : 1.0.2f : CVE-2023-2650 : 7.5 : STAT : Exploit (Github: hshivhare67_OpenSSL_1.1.1g_CVE-2023-2650 (G) nomi-sec_PoC-in-GitHub (G))
openssl : 1.0.2f : CVE-2023-0464 : 7.5 : STAT : Exploit (Github: 1g-v_DevSec_Docker_lab (G) Trinadh465_Openssl_1.1.1g_CVE-2023-0464 (G) cloudogu_ces-build-lib (G) nomi-sec_PoC-in-GitHub (G) ortelius_ms-textfile-crud (G))
openssl : 1.0.2f : CVE-2023-0215 : 7.5 : STAT : Exploit (Github: Tuttu7_Yum-command (G) bluesentinelsec_landing-zone (G) nidhi7598_OPENSSL_1.0.2_G2.5_CVE-2023-0215 (G) nidhi7598_OPENSSL_1.1.1g_G3_CVE-2023-0215 (G) nomi-sec_PoC-in-GitHub (G) rootameen_vulpine (G))
openssl : 1.0.2f : CVE-2022-0778 : 7.5 : STAT : Exploit (Snyk: SNYK-UNMANAGED-OPENSSL-2426984 (S) / PSS: 167344/OpenSSL-1.0.2-1.1.1-3.0-BN_mod_sqrt-Infinite-Loop.html (P) / Github: 0xUhaw_CVE-2022-0778 (G) BobTheShoplifter_CVE-2022-0778-POC (G) CVEDB_awesome-cve-repo (G) CVEDB_top (G) EnableSecurity_awesome-rtc-hacking (G) JERRY123S_all-poc (G) Mr-xn_Penetration_Testing_POC (G) Mrlucas5550100_PoC-CVE-2022-0778- (G) SnailDev_github-hot-hub (G) WhooAmii_POC_to_review (G) actions-marketplace-validations_neuvector_scan-action (G) bashofmann_neuvector-image-scan-action (G) cyberanand1337x_bug-bounty-2022 (G) drago-96_CVE-2022-0778 (G) fdl66_openssl-1.0.2u-fix-cve (G) gatecheckdev_gatecheck (G) halon_changelog (G) hktalent_TOP (G) isgo-golgo13_gokit-gorillakit-enginesvc (G) jkakavas_CVE-2022-0778-POC (G) jmartinezl_jmartinezl (G) jntass_TASSL-1.1.1 (G) lonnyzhang423_github-hot-hub (G) manas3c_CVE-POC (G) neuvector_scan-action (G) nomi-sec_PoC-in-GitHub (G) soosmile_POC (G) spaquet_docker-alpine-mailcatcher (G) tianocore-docs_ThirdPartySecurityAdvisories (G) weeka10_-hktalent-TOP (G) wllm-rbnt_asn1template (G) xuetusummer_Penetration_Testing_POC (G) yywing_cve-2022-0778 (G))
openssl : 1.0.2f : CVE-2021-23840 : 7.5 : STAT : Exploit (Github: falk-werner_cve-check (G) fdl66_openssl-1.0.2u-fix-cve (G) fredrkl_trivy-demo (G) isgo-golgo13_gokit-gorillakit-enginesvc (G) jntass_TASSL-1.1.1k (G) thecyberbaby_Trivy-by-AquaSecurity (G) thecyberbaby_Trivy-by-aquaSecurity (G) vinamra28_tekton-image-scan-trivy (G))
openssl : 1.0.2f : CVE-2018-0732 : 7.5 : STAT : Exploit (Github: imhunterand_hackerone-publicy-disclosed (G) intrigueio_intrigue-ident (G) javirodriguezzz_Shodan-Browser (G) mrodden_vyger (G))
openssl : 1.0.2f : CVE-2017-3731 : 7.5 : STAT : Exploit (Github: CAF-Extended_external_honggfuzz (G) Corvus-AOSP_android_external_honggfuzz (G) DennissimOS_platform_external_honggfuzz (G) ForkLineageOS_external_honggfuzz (G) HavocR_external_honggfuzz (G) Ozone-OS_external_honggfuzz (G) ProtonAOSP-platina_android_external_honggfuzz (G) ProtonAOSP_android_external_honggfuzz (G) StatiXOS_android_external_honggfuzz (G) TheXPerienceProject_android_external_honggfuzz (G) TinkerBoard-Android_external-honggfuzz (G) TinkerBoard-Android_rockchip-android-external-honggfuzz (G) TinkerBoard2-Android_external-honggfuzz (G) TinkerEdgeR-Android_external_honggfuzz (G) Tomoms_android_external_honggfuzz (G) aosp-caf-upstream_platform_external_honggfuzz (G) bananadroid_android_external_honggfuzz (G) crdroid-r_external_honggfuzz (G) crdroidandroid_android_external_honggfuzz (G) ep-infosec_50_google_honggfuzz (G) google_honggfuzz (G) imbaya2466_honggfuzz_READ (G) jingpad-bsp_android_external_honggfuzz (G) khadas_android_external_honggfuzz (G) lllnx_lllnx (G) r3p3r_nixawk-honggfuzz (G) random-aosp-stuff_android_external_honggfuzz (G) yaap_external_honggfuzz (G))
openssl : 1.0.2f : CVE-2016-8610 : 7.5 : STAT : Exploit (Github: cujanovic_CVE-2016-8610-PoC (G))
openssl : 1.0.2f : CVE-2016-6304 : 7.5 : STAT : Exploit (PSS: 139091/OpenSSL-x509-Parsing-Double-Free-Invalid-Free.html (P) / Github: guidovranken_openssl-x509-vulnerabilities (G) halon_changelog (G) imhunterand_hackerone-publicy-disclosed (G))
openssl : 1.0.2f : CVE-2016-6302 : 7.5 : STAT : Exploit (Github: imhunterand_hackerone-publicy-disclosed (G) tomwillfixit_alpine-cvecheck (G))
openssl : 1.0.2f : CVE-2016-2183 : 7.5 : STAT : Exploit (PSS: 142756/IBM-Informix-Dynamic-Server-DLL-Injection-Code-Execution.html (P) / Github: Artem-Salnikov_devops-netology (G) Artem-Tvr_sysadmin-09-security (G) Justic-D_Dev_net_home_1 (G) Kapotov_3.9.1 (G) Vainoord_devops-netology (G) Valdem88_dev-17_ib-yakovlev_vs (G) Vladislav-Pugachev_netology-DevOps-dz_-14 (G) WiktorMysz_devops-netology (G) alexandrburyakov_Rep2 (G) alexgro1982_devops-netology (G) aous-al-salek_crypto (G) biswajitde_dsm_ips (G) bysart_devops-netology (G) dmitrii1312_03-sysadmin-09 (G) gabrieljcs_ips-assessment-reports (G) geon071_netolofy_12 (G) ilya-starchikov_devops-netology (G) jeffaizenbr_Cipher-TLS-removing-vulnerabilities-from-openvas (G) kampfcl3_lineBOT (G) kthy_desmos (G) mikemackintosh_ruby-qualys (G) nikolay480_devops-netology (G) odolezal_D-Link-DIR-655 (G) pashicop_3.9_1 (G) vitaliivakhr_NETOLOGY (G) yellownine_netology-DevOps (G) yurkao_python-ssl-deprecated (G))
openssl : 1.0.2f : CVE-2016-2181 : 7.5 : STAT : Exploit (Github: tomwillfixit_alpine-cvecheck (G))
openssl : 1.0.2f : CVE-2016-2180 : 7.5 : STAT : Exploit (Github: imhunterand_hackerone-publicy-disclosed (G) tomwillfixit_alpine-cvecheck (G))
openssl : 1.0.2f : CVE-2016-2179 : 7.5 : STAT : Exploit (Github: tomwillfixit_alpine-cvecheck (G))
openssl : 1.0.2f : CVE-2016-2109 : 7.5 : STAT : Exploit (Github: imhunterand_hackerone-publicy-disclosed (G) tomwillfixit_alpine-cvecheck (G))
openssl : 1.0.2f : CVE-2016-2106 : 7.5 : STAT : Exploit (Github: imhunterand_hackerone-publicy-disclosed (G) tomwillfixit_alpine-cvecheck (G))
openssl : 1.0.2f : CVE-2016-2105 : 7.5 : STAT : Exploit (Github: imhunterand_hackerone-publicy-disclosed (G) securityrouter_changelog (G) tomwillfixit_alpine-cvecheck (G))
openssl : 1.0.2f : CVE-2016-0797 : 7.5 : STAT : Exploit (Github: imhunterand_hackerone-publicy-disclosed (G))
openssl : 1.0.0 : CVE-2016-2109 : 7.5 : STAT : Exploit (Github: imhunterand_hackerone-publicy-disclosed (G) tomwillfixit_alpine-cvecheck (G))
openssl : 1.0.0 : CVE-2016-2106 : 7.5 : STAT : Exploit (Github: imhunterand_hackerone-publicy-disclosed (G) tomwillfixit_alpine-cvecheck (G))
openssl : 1.0.0 : CVE-2015-1789 : 7.5 : STAT : Exploit (Github: CAF-Extended_external_honggfuzz (G) Corvus-AOSP_android_external_honggfuzz (G) DennissimOS_platform_external_honggfuzz (G) ForkLineageOS_external_honggfuzz (G) HavocR_external_honggfuzz (G) Ozone-OS_external_honggfuzz (G) ProtonAOSP-platina_android_external_honggfuzz (G) ProtonAOSP_android_external_honggfuzz (G) StatiXOS_android_external_honggfuzz (G) TheXPerienceProject_android_external_honggfuzz (G) TinkerBoard-Android_external-honggfuzz (G) TinkerBoard-Android_rockchip-android-external-honggfuzz (G) TinkerBoard2-Android_external-honggfuzz (G) TinkerEdgeR-Android_external_honggfuzz (G) Tomoms_android_external_honggfuzz (G) aosp-caf-upstream_platform_external_honggfuzz (G) bananadroid_android_external_honggfuzz (G) crdroid-r_external_honggfuzz (G) crdroidandroid_android_external_honggfuzz (G) ep-infosec_50_google_honggfuzz (G) google_honggfuzz (G) imbaya2466_honggfuzz_READ (G) jingpad-bsp_android_external_honggfuzz (G) khadas_android_external_honggfuzz (G) lllnx_lllnx (G) r3p3r_nixawk-honggfuzz (G) random-aosp-stuff_android_external_honggfuzz (G) yaap_external_honggfuzz (G))
openssl : 1.0.0 : CVE-2012-2110 : 7.5 (v2) : STAT : Exploit (EDB ID: 18756)
libcurl : 7.36.0 : CVE-2019-3823 : 7.5 : STAT : Exploit (Github: KorayAgaya_TrivyWeb (G) Mohzeela_external-secret (G) siddharthraopotukuchi_trivy (G) simiyo_trivy (G) t31m0_Vulnerability-Scanner-for-Containers (G) umahari_security (G))
libcurl : 7.36.0 : CVE-2018-16890 : 7.5 : STAT : Exploit (Github: 0xT11_CVE-POC (G) KorayAgaya_TrivyWeb (G) Mohzeela_external-secret (G) siddharthraopotukuchi_trivy (G) simiyo_trivy (G) t31m0_Vulnerability-Scanner-for-Containers (G) umahari_security (G) zjw88282740_CVE-2018-16890 (G))
libcurl : 7.36.0 : CVE-2017-1000254 : 7.5 : STAT : Exploit (Github: tencentbladeteam_Exploit-Amazon-Echo (G))
libcurl : 7.36.0 : CVE-2015-3145 : 7.5 (v2) : STAT : Exploit (Github: Serz999_CVE-2015-3145 (G) mrash_afl-cve (G))
kernel : 3.10.14 : CVE-2023-0045 : 7.5 : STAT : Exploit (Snyk: SNYK-UNMANAGED-TORVALDSLINUX-3318159 (S) / Github: ASkyeye_CVE-2023-0045 (G) es0j_CVE-2023-0045 (G) manas3c_CVE-POC (G) nomi-sec_PoC-in-GitHub (G))
kernel : 3.10.14 : CVE-2022-36946 : 7.5 : STAT : Exploit (Github: Mr-xn_Penetration_Testing_POC (G) Pwnzer0tt1_CVE-2022-36946 (G) Satheesh575555_linux-4.19.72_CVE-2022-36946 (G) WhooAmii_POC_to_review (G) XmasSnowISBACK_CVE-2022-36946 (G) manas3c_CVE-POC (G) nik012003_nik012003 (G) nomi-sec_PoC-in-GitHub (G) xuetusummer_Penetration_Testing_POC (G))
kernel : 3.10.14 : CVE-2021-45485 : 7.5 : STAT : Exploit (Github: Satheesh575555_linux-4.19.72_CVE-2021-45485 (G) WhooAmii_POC_to_review (G) nomi-sec_PoC-in-GitHub (G))
kernel : 3.10.14 : CVE-2019-11478 : 7.5 : STAT : Exploit (Github: hightemp_docLinux (G) kaosagnt_ansible-everyday (G) misanthropos_FFFFM (G))
kernel : 3.10.14 : CVE-2019-11477 : 7.5 : STAT : Exploit (Github: 0xT11_CVE-POC (G) developer3000S_PoC-in-GitHub (G) fengjian_kpatch-sack-panic (G) hectorgie_PoC-in-GitHub (G) hightemp_docLinux (G) kaosagnt_ansible-everyday (G) lucassbeiler_linux_hardening_arsenal (G) misanthropos_FFFFM (G) sasqwatch_cve-2019-11477-poc (G) sonoransun_tcp_sack_fix (G))
kernel : 3.10.14 : CVE-2018-5391 : 7.5 : STAT : Exploit (Github: chetanshirke_my_ref (G))
kernel : 3.10.14 : CVE-2017-5972 : 7.5 : STAT : Exploit (EDB ID: 41350 / PSS: 141083/CentOS7-Kernel-Denial-Of-Service.html (D))
kernel : 3.10.14 : CVE-2017-5970 : 7.5 : STAT : Exploit (Github: 0xca7_SNF (G))
kernel : 3.10.14 : CVE-2017-1000410 : 7.5 : STAT : Exploit (Github: JeffroMF_awesome-bluetooth-security321 (G) engn33r_awesome-bluetooth-security (G))
kernel : 3.10.14 : CVE-2014-4323 : 7.5 (v2) : STAT : Exploit (Github: CVEDB_awesome-cve-repo (G) CVEDB_top (G) JERRY123S_all-poc (G) cyberanand1337x_bug-bounty-2022 (G) hktalent_TOP (G) marcograss_cve-2014-4323 (G) tangsilian_android-vuln (G) weeka10_-hktalent-TOP (G))
busybox : 1.22.1 : CVE-2019-5747 : 7.5 : STAT/UEMU : Exploit (PSS: 154361/Cisco-Device-Hardcoded-Credentials-GNU-glibc-BusyBox.html (P))
busybox : 1.22.1 : CVE-2018-20679 : 7.5 : STAT/UEMU : Exploit (PSS: 154361/Cisco-Device-Hardcoded-Credentials-GNU-glibc-BusyBox.html (P))
busybox : 1.22.1 : CVE-2016-6301 : 7.5 : STAT/UEMU : Exploit (PSS: 154361/Cisco-Device-Hardcoded-Credentials-GNU-glibc-BusyBox.html (P) 153278/WAGO-852-Industrial-Managed-Switch-Series-Code-Execution-Hardcoded-Credentials.html (P))
busybox : 1.22.1 : CVE-2016-2147 : 7.5 : STAT/UEMU : Exploit (PSS: 154361/Cisco-Device-Hardcoded-Credentials-GNU-glibc-BusyBox.html (P) 153278/WAGO-852-Industrial-Managed-Switch-Series-Code-Execution-Hardcoded-Credentials.html (P))
openssl : 1.0.2f : CVE-2023-0286 : 7.4 : STAT : Exploit (Github: Tuttu7_Yum-command (G) dejanb_guac-rs (G) nidhi7598_OPENSSL_1.1.11g_G3_CVE-2023-0286 (G) nidhi7598_OPENSSL_1.1.1g_G3_CVE-2023-0286 (G) nomi-sec_PoC-in-GitHub (G) xkcd-2347_trust-api (G))
openssl : 1.0.2f : CVE-2021-3712 : 7.4 : STAT : Exploit (Github: Frannc0_test2 (G) NeXTLinux_griffon (G) anchore_grype (G) aymankhder_scanner-for-container (G) fdl66_openssl-1.0.2u-fix-cve (G) giantswarm_starboard-exporter (G) isgo-golgo13_gokit-gorillakit-enginesvc (G) jntass_TASSL-1.1.1 (G) leonov-av_scanvus (G) lucky-sideburn_secpod_wrap (G) metapull_attackfinder (G) tianocore-docs_ThirdPartySecurityAdvisories (G))
openssl : 1.0.0 : CVE-2014-0224 : 7.4 : STAT : Exploit (MSF: openssl_ccs / Snyk: SNYK-COCOAPODS-OPENSSL-470915 (S) / Github: 0nopnop_qualysparser (G) 1N3_MassBleed (G) 84KaliPleXon3_a2sv (G) Artem-Salnikov_devops-netology (G) Artem-Tvr_sysadmin-09-security (G) CertifiedCEH_DB (G) DButter_whitehat_public (G) F4RM0X_script_a2sv (G) H4CK3RT3CH_a2sv (G) Justic-D_Dev_net_home_1 (G) Kapotov_3.9.1 (G) Mre11i0t_a2sv (G) SSLyze410-SSLGrader-wCipherSuite-info_ssl-grader (G) SSLyze410-SSLGrader-wCipherSuite-info_ssl-wrapping-grader (G) TheRipperJhon_a2sv (G) Tripwire_OpenSSL-CCS-Inject-Test (G) Vainoord_devops-netology (G) Valdem88_dev-17_ib-yakovlev_vs (G) Vladislav-Pugachev_netology-DevOps-dz_-14 (G) WiktorMysz_devops-netology (G) alexandrburyakov_Rep2 (G) alexgro1982_devops-netology (G) arthepsy_cve-tests (G) bysart_devops-netology (G) clic-kbait_A2SV--SSL-VUL-Scan (G) cyberdeception_deepdig (G) dmitrii1312_03-sysadmin-09 (G) droptables_ccs-eval (G) epicpewpew_qualysparser (G) fireorb_SSL-Scanner (G) fireorb_sslscanner (G) geon071_netolofy_12 (G) giusepperuggiero96_Network-Security-2021 (G) hahwul_a2sv (G) iSECPartners_ccs-testing-tool (G) ilya-starchikov_devops-netology (G) imhunterand_hackerone-publicy-disclosed (G) iph0n3_CVE-2014-0224 (G) korotkov-dmitry_03-sysadmin-09-security (G) krabelize_openbsd-httpd-tls-perfect-ssllabs-score (G) niharika2810_android-development-best-practices (G) nikolay480_devops-netology (G) nkiselyov_devops-netology (G) odolezal_D-Link-DIR-655 (G) pashicop_3.9_1 (G) r3p3r_1N3-MassBleed (G) secretnonempty_CVE-2014-0224 (G) ssllabs_openssl-ccs-cve-2014-0224 (G) takuzoo3868_laputa (G) vitaliivakhr_NETOLOGY (G) vshaliii_Hacklab-Vulnix (G) yellownine_netology-DevOps (G) yurkao_python-ssl-deprecated (G))
kernel : 3.10.14 : CVE-2020-25705 : 7.4 : STAT : Exploit (Github: developer3000S_PoC-in-GitHub (G) hectorgie_PoC-in-GitHub (G) nanopathi_linux-4.19.72_CVE-2020-25705 (G) nomi-sec_PoC-in-GitHub (G) tdwyer_CVE-2020-25705 (G))
kernel : 3.10.14 : CVE-2017-1000364 : 7.4 : STAT : Exploit (EDB ID: 45625 / MSF: rsh_stack_clash_priv_esc (L) / Github: lnick2023_nicenice (G) pelucky_Read-Wechat-Subscription-in-email (G) qazbnm456_awesome-cve-poc (G) xbl3_awesome-cve-poc_qazbnm456 (G))
kernel : 3.10.14 : CVE-2016-6516 : 7.4 : STAT : Exploit (Github: mudongliang_LinuxFlaw (G) oneoy_cve- (G) wpengfei_CVE-2016-6516-exploit (G))
kernel : 3.10.14 : CVE-2020-25643 : 7.2 : STAT : Exploit (Github: DNTYO_F5_Vulnerability (G))
kernel : 3.10.14 : CVE-2015-3290 : 7.2 (v2) : STAT : Exploit (EDB ID: 37722 / PSS: 132994/Linux-Nested-NMIs-Privilege-Escalation.html (P))
kernel : 3.10.14 : CVE-2015-1805 : 7.2 (v2) : STAT : Exploit (Github: CVEDB_awesome-cve-repo (G) CVEDB_top (G) FloatingGuy_cve-2015-1805 (G) JERRY123S_all-poc (G) JyotsnaSharma598_cybersecurity_case_studies (G) R0B1NL1N_linux-kernel-exploitation (G) Technoashofficial_kernel-exploitation-linux (G) cyberanand1337x_bug-bounty-2022 (G) dosomder_iovyroot (G) hktalent_TOP (G) hoangcuongflp_MobileSecurity2016-recap (G) idhyt_androotzf (G) ireshchaminda1_Android-Privilege-Escalation-Remote-Access-Vulnerability-CVE-2015-1805 (G) jpacg_awesome-stars (G) kdn111_linux-kernel-exploitation (G) khanhdn111_linux-kernel-exploitation (G) khanhdz-06_linux-kernel-exploitation (G) khanhdz191_linux-kernel-exploitation (G) khanhhdz_linux-kernel-exploitation (G) khanhhdz06_linux-kernel-exploitation (G) khanhnd123_linux-kernel-exploitation (G) makaitoushi_iovyroot_kyv37 (G) mobilelinux_iovy_root_research (G) panyu6325_CVE-2015-1805 (G) skbasava_Linux-Kernel-exploit (G) snorez_exploits (G) tangsilian_android-vuln (G) weeka10_-hktalent-TOP (G) xairy_linux-kernel-exploitation (G))
kernel : 3.10.14 : CVE-2014-7822 : 7.2 (v2) : STAT : Exploit (EDB ID: 36743 / PSS: 131402/Linux-splice_write-Kernel-Panic.html (D))
kernel : 3.10.14 : CVE-2014-4322" title="CVE-2014-4322" target="_blank" >CVE-2014-4322" title="CVE-2014-4322" target="_blank" >CVE-2014-4322 : 7.2 (v2) : STAT : Exploit (EDB ID: 35711 / PSS: CVE-2014-7911" title="CVE-2014-7911" target="_blank" >CVE-2014-7911" title="CVE-2014-7911" target="_blank" >CVE-2014-7911-CVE-2014-4322-Local-Exploit.html" title="130112/Android-CVE-2014-7911-CVE-2014-4322-Local-Exploit.html" target="_blank" >130112/Android-CVE-2014-7911-CVE-2014-4322-Local-Exploit.html (L) / Github: CVEDB_awesome-cve-repo (G) CVEDB_top (G) IMCG_awesome-c (G) JERRY123S_all-poc (G) R0B1NL1N_linux-kernel-exploitation (G) Technoashofficial_kernel-exploitation-linux (G) ambynotcoder_C-libraries (G) askk_CVE-2014-4322_adaptation (G) cyberanand1337x_bug-bounty-2022 (G) hktalent_TOP (G) kdn111_linux-kernel-exploitation (G) khanhdn111_linux-kernel-exploitation (G) khanhdz-06_linux-kernel-exploitation (G) khanhdz191_linux-kernel-exploitation (G) khanhhdz_linux-kernel-exploitation (G) khanhhdz06_linux-kernel-exploitation (G) khanhnd123_linux-kernel-exploitation (G) koozxcv_CVE-2014-4322 (G) koozxcv_CVE-2014-7911-CVE-2014-4322_get_root_privilege (G) laginimaineb_cve-2014-4322 (G) lushtree-cn-honeyzhao_awesome-c (G) retme7_CVE-2014-4322_poc (G) retme7_CVE-2014-7911_poc (G) skbasava_Linux-Kernel-exploit (G) tangsilian_android-vuln (G) weeka10_-hktalent-TOP (G) xairy_linux-kernel-exploitation (G))
kernel : 3.10.14 : CVE-2014-3631 : 7.2 (v2) : STAT : Exploit (EDB ID: 36268 / PSS: 130591/Linux-CVE-2014-3631-Proof-Of-Concept.html (D))
kernel : 3.10.14 : CVE-2014-3153 : 7.2 (v2) : STAT : Exploit (EDB ID: 35370 / MSF: futex_requeue (L) / Github: Al1ex_LinuxEelvation (G) C0dak_linux-kernel-exploits (G) C0dak_local-root-exploit- (G) CVEDB_awesome-cve-repo (G) CVEDB_top (G) De4dCr0w_Linux-kernel-EoP-exp (G) Feng4_linux-kernel-exploits (G) I-Prashanth-S_CybersecurityTIFAC (G) IMCG_awesome-c (G) JERRY123S_all-poc (G) JlSakuya_Linux-Privilege-Escalation-Exploits (G) LHerrmeyer_c1000a_sec (G) Micr067_linux-kernel-exploits (G) MikeStorrs_cyber (G) QChiLan_linux-exp (G) Qamar4P_awesome-android-cpp (G) R0B1NL1N_Linux-Kernal-Exploits-m- (G) R0B1NL1N_Linux-Kernel-Exploites (G) R0B1NL1N_linux-kernel-exploitation (G) SecWiki_linux-kernel-exploits (G) Shadowshusky_linux-kernel-exploits (G) Shark2016_vulklab (G) Singlea-lyh_linux-kernel-exploits (G) Snoopy-Sec_Localroot-ALL-CVE (G) Technoashofficial_kernel-exploitation-linux (G) albinjoshy03_linux-kernel-exploits (G) ambynotcoder_C-libraries (G) android-rooting-tools_libfutex_exploit (G) anoaghost_Localroot_Compile (G) c3c_CVE-2014-3153 (G) c4mx_Linux-kernel-code-injection_CVE-2014-3153 (G) coffee727_linux-exp (G) copperfieldd_linux-kernel-exploits (G) cyberanand1337x_bug-bounty-2022 (G) dangtunguyen_TowelRoot (G) distance-vector_linux-kernel-exploits (G) elongl_CVE-2014-3153 (G) fei9747_LinuxEelvation (G) ferovap_Tools (G) gbrsh_exploits (G) gbrsh_kernel_exploits (G) geekben_towelroot (G) h4x0r-dz_local-root-exploit- (G) hktalent_TOP (G) joydo_CVE-Writeups (G) kdn111_linux-kernel-exploitation (G) kerk1_ShellShock-Scenario (G) khanhdn111_linux-kernel-exploitation (G) khanhdz-06_linux-kernel-exploitation (G) khanhdz191_linux-kernel-exploitation (G) khanhhdz_linux-kernel-exploitation (G) khanhhdz06_linux-kernel-exploitation (G) khanhnd123_linux-kernel-exploitation (G) kumardineshwar_linux-kernel-exploits (G) lieanu_CVE-2014-3153 (G) lushtree-cn-honeyzhao_awesome-c (G) m0mkris_linux-kernel-exploits (G) ozkanbilge_Linux-Kernel-Exploits (G) password520_linux-kernel-exploits (G) qiantu88_Linux--exp (G) rakjong_LinuxElevation (G) redteam-project_cyber-range-scenarios (G) sin4ts_CVE2014-3153 (G) skbasava_Linux-Kernel-exploit (G) spencerdodd_kernelpop (G) tangsilian_android-vuln (G) timwr_CVE-2014-3153 (G) tymat_android_futex_root (G) weeka10_-hktalent-TOP (G) xairy_linux-kernel-exploitation (G) xfinest_linux-kernel-exploits (G) xssfile_linux-kernel-exploits (G) yige666_linux-kernel-exploits (G) zerodavinci_CVE-2014-3153-exploit (G) zyjsuper_linux-kernel-exploits (G) (X))
busybox : 1.22.1 : CVE-2021-42386 : 7.2 : STAT/UEMU : Exploit (Github: isgo-golgo13_gokit-gorillakit-enginesvc (G))
busybox : 1.22.1 : CVE-2021-42385 : 7.2 : STAT/UEMU : Exploit (Github: isgo-golgo13_gokit-gorillakit-enginesvc (G))
busybox : 1.22.1 : CVE-2021-42384 : 7.2 : STAT/UEMU : Exploit (Github: isgo-golgo13_gokit-gorillakit-enginesvc (G))
busybox : 1.22.1 : CVE-2021-42381 : 7.2 : STAT/UEMU : Exploit (Github: isgo-golgo13_gokit-gorillakit-enginesvc (G))
busybox : 1.22.1 : CVE-2021-42379 : 7.2 : STAT/UEMU : Exploit (Github: isgo-golgo13_gokit-gorillakit-enginesvc (G))
busybox : 1.22.1 : CVE-2021-42378 : 7.2 : STAT/UEMU : Exploit (Github: isgo-golgo13_gokit-gorillakit-enginesvc (G))
kernel : 3.10.14 : CVE-2021-4204 : 7.1 : STAT : Exploit (Github: Metarget_metarget (G) Mr-xn_Penetration_Testing_POC (G) WhooAmii_POC_to_review (G) kdn111_linux-kernel-exploitation (G) khanhdn111_linux-kernel-exploitation (G) khanhdz-06_linux-kernel-exploitation (G) khanhdz191_linux-kernel-exploitation (G) khanhhdz_linux-kernel-exploitation (G) khanhhdz06_linux-kernel-exploitation (G) khanhnd123_linux-kernel-exploitation (G) manas3c_CVE-POC (G) nomi-sec_PoC-in-GitHub (G) tr3ee_CVE-2021-4204 (G) xairy_linux-kernel-exploitation (G) xuetusummer_Penetration_Testing_POC (G))
kernel : 3.10.14 : CVE-2021-27364 : 7.1 : STAT : Exploit (Github: aaronxie55_Presentation2_Markdown (G) c4pt000_kernel-5.11.6-expSEHDsec-HAXM-cgroup-virtio-nvidia-amd-kaliwifi (G) kdn111_linux-kernel-exploitation (G) khanhdn111_linux-kernel-exploitation (G) khanhdz-06_linux-kernel-exploitation (G) khanhdz191_linux-kernel-exploitation (G) khanhhdz_linux-kernel-exploitation (G) khanhhdz06_linux-kernel-exploitation (G) khanhnd123_linux-kernel-exploitation (G) xairy_linux-kernel-exploitation (G))
kernel : 3.10.14 : CVE-2016-4998 : 7.1 : STAT : Exploit (MSF: netfilter_priv_esc_ipv4 (L))
kernel : 3.10.14 : CVE-2013-4348 : 7.1 (v2) : STAT : Exploit (Github: bl4ck5un_cve-2013-4348 (G))
kernel : 3.10.14 : CVE-2023-35829 : 7 : STAT : Exploit (Github: 20142995_sectool (G) apkc_CVE-2023-35829-poc (G) nomi-sec_PoC-in-GitHub (G) timb-machine_linux-malware (G))
kernel : 3.10.14 : CVE-2022-41222 : 7 : STAT : Exploit (PSS: 168466/Linux-Stable-5.4-5.10-Use-After-Free-Race-Condition.html (P))
kernel : 3.10.14 : CVE-2022-29582 : 7 : STAT : Exploit (Github: Ruia-ruia_CVE-2022-29582-Exploit (G) WhooAmii_POC_to_review (G) kdn111_linux-kernel-exploitation (G) khanhdn111_linux-kernel-exploitation (G) khanhdz-06_linux-kernel-exploitation (G) khanhdz191_linux-kernel-exploitation (G) khanhhdz_linux-kernel-exploitation (G) khanhhdz06_linux-kernel-exploitation (G) khanhnd123_linux-kernel-exploitation (G) manas3c_CVE-POC (G) nomi-sec_PoC-in-GitHub (G) tr3ss_gofetch (G) xairy_linux-kernel-exploitation (G))
kernel : 3.10.14 : CVE-2022-1734 : 7 : STAT : Exploit (Github: torvalds_linux_commit_d270453a0d9ec10bb8a802a142fb1b3601a83098 (G))
kernel : 3.10.14 : CVE-2021-44733 : 7 : STAT : Exploit (Github: WhooAmii_POC_to_review (G) joydo_CVE-Writeups (G) kdn111_linux-kernel-exploitation (G) khanhdn111_linux-kernel-exploitation (G) khanhdz-06_linux-kernel-exploitation (G) khanhdz191_linux-kernel-exploitation (G) khanhhdz_linux-kernel-exploitation (G) khanhhdz06_linux-kernel-exploitation (G) khanhnd123_linux-kernel-exploitation (G) nomi-sec_PoC-in-GitHub (G) pjlantz_optee-qemu (G) pjlantz_optee-qemu_blob_main_README.md (G) soosmile_POC (G) xairy_linux-kernel-exploitation (G))
kernel : 3.10.14 : CVE-2021-4083 : 7 : STAT : Exploit (PSS: 165504/Linux-Garbage-Collection-Memory-Corruption.html (P) / Github: advxrsary_vuln-scanner (G) sam8k_Dynamic-and-Static-Analysis-of-SOUPs (G))
kernel : 3.10.14 : CVE-2021-40490 : 7 : STAT : Exploit (Github: Nivaskumark_CVE-2021-40490_kernel_v4.19.72 (G) sam8k_Dynamic-and-Static-Analysis-of-SOUPs (G))
kernel : 3.10.14 : CVE-2021-3609 : 7 : STAT : Exploit (Github: kdn111_linux-kernel-exploitation (G) khanhdn111_linux-kernel-exploitation (G) khanhdz-06_linux-kernel-exploitation (G) khanhdz191_linux-kernel-exploitation (G) khanhhdz_linux-kernel-exploitation (G) khanhhdz06_linux-kernel-exploitation (G) khanhnd123_linux-kernel-exploitation (G) nrb547_kernel-exploitation_blob_main_cve-2021-3609_cve-2021-3609.md (G) xairy_linux-kernel-exploitation (G))
kernel : 3.10.14 : CVE-2021-32399 : 7 : STAT : Exploit (Github: WhooAmii_POC_to_review (G) nanopathi_linux-4.19.72_CVE-2021-32399 (G) nomi-sec_PoC-in-GitHub (G))
kernel : 3.10.14 : CVE-2020-29370 : 7 : STAT : Exploit (Github: nanopathi_linux-4.19.72_CVE-2020-29370 (G))
kernel : 3.10.14 : CVE-2020-25212 : 7 : STAT : Exploit (Github: 404notf0und_CVE-Flow (G))
kernel : 3.10.14 : CVE-2019-18683 : 7 : STAT : Exploit (Github: 0xT11_CVE-POC (G) De4dCr0w_Linux-kernel-EoP-exp (G) Limesss_cve-2019-18683 (G) developer3000S_PoC-in-GitHub (G) hectorgie_PoC-in-GitHub (G) kdn111_linux-kernel-exploitation (G) khanhdn111_linux-kernel-exploitation (G) khanhdz-06_linux-kernel-exploitation (G) khanhdz191_linux-kernel-exploitation (G) khanhhdz_linux-kernel-exploitation (G) khanhhdz06_linux-kernel-exploitation (G) khanhnd123_linux-kernel-exploitation (G) lnick2023_nicenice (G) qazbnm456_awesome-cve-poc (G) sanjana123-cloud_CVE-2019-18683 (G) xairy_linux-kernel-exploitation (G) xbl3_awesome-cve-poc_qazbnm456 (G))
kernel : 3.10.14 : CVE-2019-13233 : 7 : STAT : Exploit (Github: Sec20-Paper310_Paper310 (G))
kernel : 3.10.14 : CVE-2019-11599 : 7 : STAT : Exploit (EDB ID: 46781 / PSS: 152663/Linux-Missing-Lockdown.html (P) / Github: HaleyWei_POC-available (G) Sec20-Paper310_Paper310 (G))
kernel : 3.10.14 : CVE-2019-11486 : 7 : STAT : Exploit (Github: Sec20-Paper310_Paper310 (G))
kernel : 3.10.14 : CVE-2017-6346 : 7 : STAT : Exploit (Github: wcventure_PERIOD (G))
kernel : 3.10.14 : CVE-2017-6001 : 7 : STAT : Exploit (Github: Amet13_vulncontrol (G))
kernel : 3.10.14 : CVE-2017-2636 : 7 : STAT : Exploit (Github: R0B1NL1N_linux-kernel-exploitation (G) Technoashofficial_kernel-exploitation-linux (G) alexzorin_cve-2017-2636-el (G) integeruser_on-pwning (G) kdn111_linux-kernel-exploitation (G) khanhdn111_linux-kernel-exploitation (G) khanhdz-06_linux-kernel-exploitation (G) khanhdz191_linux-kernel-exploitation (G) khanhhdz_linux-kernel-exploitation (G) khanhhdz06_linux-kernel-exploitation (G) khanhnd123_linux-kernel-exploitation (G) lnick2023_nicenice (G) qazbnm456_awesome-cve-poc (G) skbasava_Linux-Kernel-exploit (G) snorez_blog (G) snorez_exploits (G) xairy_linux-kernel-exploitation (G) xbl3_awesome-cve-poc_qazbnm456 (G) xyongcn_exploit (G))
kernel : 3.10.14 : CVE-2017-15265 : 7 : STAT : Exploit (Github: wcventure_PERIOD (G))
kernel : 3.10.14 : CVE-2017-10661 : 7 : STAT : Exploit (EDB ID: 43345 / Github: GeneBlue_CVE-2017-10661_POC (G) kdn111_linux-kernel-exploitation (G) khanhdn111_linux-kernel-exploitation (G) khanhdz-06_linux-kernel-exploitation (G) khanhdz191_linux-kernel-exploitation (G) khanhhdz_linux-kernel-exploitation (G) khanhhdz06_linux-kernel-exploitation (G) khanhnd123_linux-kernel-exploitation (G) lnick2023_nicenice (G) qazbnm456_awesome-cve-poc (G) tangsilian_android-vuln (G) xairy_linux-kernel-exploitation (G) xbl3_awesome-cve-poc_qazbnm456 (G))
kernel : 3.10.14 : CVE-2017-1000112 : 7 : STAT : Exploit (EDB ID: 45147 / MSF: ufo_privilege_escalation (L) / Github: 84KaliPleXon3_linux-exploit-suggester (G) Al1ex_LinuxEelvation (G) C0dak_linux-kernel-exploits (G) C0dak_local-root-exploit- (G) De4dCr0w_Linux-kernel-EoP-exp (G) Feng4_linux-kernel-exploits (G) IT19083124_SNP-Assignment (G) LucidOfficial_Linux-exploit-suggestor (G) Metarget_metarget (G) Micr067_linux-kernel-exploits (G) QChiLan_linux-exp (G) R0B1NL1N_Linux-Kernal-Exploits-m- (G) R0B1NL1N_Linux-Kernel-Exploites (G) R0B1NL1N_linux-kernel-exploitation (G) Realradioactive_archive-linux-exploit-suggester-master (G) SecWiki_linux-kernel-exploits (G) Shadowshusky_linux-kernel-exploits (G) Singlea-lyh_linux-kernel-exploits (G) Snoopy-Sec_Localroot-ALL-CVE (G) Technoashofficial_kernel-exploitation-linux (G) The-Z-Labs_linux-exploit-suggester (G) TheJoyOfHacking_mzet-linux-exploit-suggester (G) adavarski_HomeLab-Proxmox-k8s-DevSecOps-playground (G) adavarski_HomeLab-k8s-DevSecOps-playground (G) albinjoshy03_linux-kernel-exploits (G) amane312_Linux_menthor (G) amrelsadane123_Ecploit-kernel-4.10-linux-local (G) anoaghost_Localroot_Compile (G) bcoles_kernel-exploits (G) bsauce_kernel-exploit-factory (G) bsauce_kernel-security-learning (G) christianjohnbt_it-links (G) cjongithub_it-links (G) coffee727_linux-exp (G) copperfieldd_linux-kernel-exploits (G) distance-vector_linux-kernel-exploits (G) ferovap_Tools (G) frizb_Linux-Privilege-Escalation (G) h4x0r-dz_local-root-exploit- (G) hikame_docker_escape_pwn (G) ismailvc1111_Linux_Privilege (G) jiayy_android_vuln_poc-exp (G) kdn111_linux-kernel-exploitation (G) khanhdn111_linux-kernel-exploitation (G) khanhdz-06_linux-kernel-exploitation (G) khanhdz191_linux-kernel-exploitation (G) khanhhdz_linux-kernel-exploitation (G) khanhhdz06_linux-kernel-exploitation (G) khanhnd123_linux-kernel-exploitation (G) kkamagui_linux-kernel-exploits (G) kumardineshwar_linux-kernel-exploits (G) lnick2023_nicenice (G) m0mkris_linux-kernel-exploits (G) maririn312_Linux_menthor (G) milabs_lkrg-bypass (G) mzet-_linux-exploit-suggester (G) n3t1nv4d3_kernel-exploits (G) nikaiw_rump (G) ol0273st-s_CVE-2017-1000112-Adpated (G) ozkanbilge_Linux-Kernel-Exploits (G) password520_linux-kernel-exploits (G) qazbnm456_awesome-cve-poc (G) qiantu88_Linux--exp (G) rakjong_LinuxElevation (G) retr0-13_linux_exploit_suggester (G) rodrigosilvaluz_linux-exploit-suggester (G) santoshankr_smep_detector (G) seclab-ucr_KOOBE (G) spencerdodd_kernelpop (G) stefanocutelle_linux-exploit-suggester (G) teamssix_container-escape-check (G) xairy_kernel-exploits (G) xairy_kernel-exploits_tree_master_CVE-2017-1000112 (G) xairy_linux-kernel-exploitation (G) xbl3_awesome-cve-poc_qazbnm456 (G) xfinest_linux-kernel-exploits (G) xssfile_linux-kernel-exploits (G) yige666_linux-kernel-exploits (G) zyjsuper_linux-kernel-exploits (G))
kernel : 3.10.14 : CVE-2016-6787 : 7 : STAT : Exploit (Github: R0B1NL1N_linux-kernel-exploitation (G) Technoashofficial_kernel-exploitation-linux (G) kdn111_linux-kernel-exploitation (G) khanhdn111_linux-kernel-exploitation (G) khanhdz-06_linux-kernel-exploitation (G) khanhdz191_linux-kernel-exploitation (G) khanhhdz_linux-kernel-exploitation (G) khanhhdz06_linux-kernel-exploitation (G) khanhnd123_linux-kernel-exploitation (G) lnick2023_nicenice (G) qazbnm456_awesome-cve-poc (G) whiteHat001_Kernel-Security (G) xairy_linux-kernel-exploitation (G) xbl3_awesome-cve-poc_qazbnm456 (G))
kernel : 3.10.14 : CVE-2016-2059 : 7 : STAT : Exploit (Github: kdn111_linux-kernel-exploitation (G) khanhdn111_linux-kernel-exploitation (G) khanhdz-06_linux-kernel-exploitation (G) khanhdz191_linux-kernel-exploitation (G) khanhhdz_linux-kernel-exploitation (G) khanhhdz06_linux-kernel-exploitation (G) khanhnd123_linux-kernel-exploitation (G) xairy_linux-kernel-exploitation (G))
kernel : 3.10.14 : CVE-2015-8543 : 7 : STAT : Exploit (Github: bittorrent3389_CVE-2015-8543_for_SLE12SP1 (G) guoygang_vul-guoygang (G))
kernel : 3.10.14 : CVE-2015-2925 : 6.9 (v2) : STAT : Exploit (Github: Kagami_docker_cve-2015-2925 (G) xxg1413_docker-security (G))
kernel : 3.10.14 : CVE-2014-4943 : 6.9 (v2) : STAT : Exploit (linux-exploit-suggester / EDB ID: 36267 / PSS: 130592/Linux-CVE-2014-4943-Proof-Of-Concept.html (L) / Github: R0B1NL1N_linux-kernel-exploitation (G) Technoashofficial_kernel-exploitation-linux (G) kdn111_linux-kernel-exploitation (G) khanhdn111_linux-kernel-exploitation (G) khanhdz-06_linux-kernel-exploitation (G) khanhdz191_linux-kernel-exploitation (G) khanhhdz_linux-kernel-exploitation (G) khanhhdz06_linux-kernel-exploitation (G) khanhnd123_linux-kernel-exploitation (G) redes-2015_l2tp-socket-bug (G) skbasava_Linux-Kernel-exploit (G) xairy_linux-kernel-exploitation (G))
kernel : 3.10.14 : CVE-2014-4699 : 6.9 (v2) : STAT : Exploit (EDB ID: 34134 / PSS: 127573/Linux-Kernel-ptrace-sysret-Local-Privilege-Escalation.html (L) / Github: Al1ex_LinuxEelvation (G) C0dak_linux-kernel-exploits (G) C0dak_local-root-exploit- (G) De4dCr0w_Linux-kernel-EoP-exp (G) Feng4_linux-kernel-exploits (G) JlSakuya_Linux-Privilege-Escalation-Exploits (G) Micr067_linux-kernel-exploits (G) QChiLan_linux-exp (G) R0B1NL1N_Linux-Kernal-Exploits-m- (G) R0B1NL1N_Linux-Kernel-Exploites (G) R0B1NL1N_linux-kernel-exploitation (G) SecWiki_linux-kernel-exploits (G) Shadowshusky_linux-kernel-exploits (G) Singlea-lyh_linux-kernel-exploits (G) Snoopy-Sec_Localroot-ALL-CVE (G) Technoashofficial_kernel-exploitation-linux (G) albinjoshy03_linux-kernel-exploits (G) anoaghost_Localroot_Compile (G) coffee727_linux-exp (G) copperfieldd_linux-kernel-exploits (G) distance-vector_linux-kernel-exploits (G) fei9747_LinuxEelvation (G) ferovap_Tools (G) gipi_cve-cemetery (G) h4x0r-dz_local-root-exploit- (G) kdn111_linux-kernel-exploitation (G) khanhdn111_linux-kernel-exploitation (G) khanhdz-06_linux-kernel-exploitation (G) khanhdz191_linux-kernel-exploitation (G) khanhhdz_linux-kernel-exploitation (G) khanhhdz06_linux-kernel-exploitation (G) khanhnd123_linux-kernel-exploitation (G) kumardineshwar_linux-kernel-exploits (G) m0mkris_linux-kernel-exploits (G) msecrist-couchbase_smallcb-training-capella (G) ozkanbilge_Linux-Kernel-Exploits (G) password520_linux-kernel-exploits (G) qiantu88_Linux--exp (G) rakjong_LinuxElevation (G) skbasava_Linux-Kernel-exploit (G) spencerdodd_kernelpop (G) vnik5287_cve-2014-4699-ptrace (G) xairy_linux-kernel-exploitation (G) xfinest_linux-kernel-exploits (G) xssfile_linux-kernel-exploits (G) yige666_linux-kernel-exploits (G) zyjsuper_linux-kernel-exploits (G))
kernel : 3.10.14 : CVE-2014-2851 : 6.9 (v2) : STAT : Exploit (linux-exploit-suggester / EDB ID: 32926 / PSS: 126220/Linux-group_info-Denial-Of-Service.html (D) / Github: R0B1NL1N_linux-kernel-exploitation (G) Technoashofficial_kernel-exploitation-linux (G) kdn111_linux-kernel-exploitation (G) khanhdn111_linux-kernel-exploitation (G) khanhdz-06_linux-kernel-exploitation (G) khanhdz191_linux-kernel-exploitation (G) khanhhdz_linux-kernel-exploitation (G) khanhhdz06_linux-kernel-exploitation (G) khanhnd123_linux-kernel-exploitation (G) mudongliang_LinuxFlaw (G) oneoy_cve- (G) skbasava_Linux-Kernel-exploit (G) thomaxxl_group_info (G) xairy_linux-kernel-exploitation (G))
kernel : 3.10.14 : CVE-2014-0196 : 6.9 (v2) : STAT : Exploit (linux-exploit-suggester / EDB ID: 33516 / PSS: 126603/Linux-Kernel-3.15-rc4-PTY-Race-Condition.html (L) / Github: 20142995_pocsuite (G) Al1ex_LinuxEelvation (G) C0dak_linux-kernel-exploits (G) C0dak_local-root-exploit- (G) De4dCr0w_Linux-kernel-EoP-exp (G) Feng4_linux-kernel-exploits (G) JlSakuya_Linux-Privilege-Escalation-Exploits (G) Micr067_linux-kernel-exploits (G) QChiLan_linux-exp (G) R0B1NL1N_Linux-Kernal-Exploits-m- (G) R0B1NL1N_Linux-Kernel-Exploites (G) R0B1NL1N_linux-kernel-exploitation (G) SecWiki_linux-kernel-exploits (G) Shadowshusky_linux-kernel-exploits (G) Singlea-lyh_linux-kernel-exploits (G) Snoopy-Sec_Localroot-ALL-CVE (G) SunRain_CVE-2014-0196 (G) Technoashofficial_kernel-exploitation-linux (G) albinjoshy03_linux-kernel-exploits (G) anoaghost_Localroot_Compile (G) coffee727_linux-exp (G) copperfieldd_linux-kernel-exploits (G) distance-vector_linux-kernel-exploits (G) dyjakan_exploit-development-case-studies (G) ex4722_kernel_exploitation (G) fei9747_LinuxEelvation (G) ferovap_Tools (G) h4x0r-dz_local-root-exploit- (G) kdn111_linux-kernel-exploitation (G) khanhdn111_linux-kernel-exploitation (G) khanhdz-06_linux-kernel-exploitation (G) khanhdz191_linux-kernel-exploitation (G) khanhhdz_linux-kernel-exploitation (G) khanhhdz06_linux-kernel-exploitation (G) khanhnd123_linux-kernel-exploitation (G) kumardineshwar_linux-kernel-exploits (G) m0mkris_linux-kernel-exploits (G) ozkanbilge_Linux-Kernel-Exploits (G) p00h00_linux-exploits (G) password520_linux-kernel-exploits (G) qiantu88_Linux--exp (G) rakjong_LinuxElevation (G) skbasava_Linux-Kernel-exploit (G) spencerdodd_kernelpop (G) tangsilian_android-vuln (G) tempbottle_CVE-2014-0196 (G) xairy_linux-kernel-exploitation (G) xfinest_linux-kernel-exploits (G) xssfile_linux-kernel-exploits (G) ycdxsb_Exploits (G) yige666_linux-kernel-exploits (G) zyjsuper_linux-kernel-exploits (G) (X))
kernel : 3.10.14 : CVE-2014-0038 : 6.9 (v2) : STAT : Exploit (linux-exploit-suggester / EDB ID: 31305 / MSF: recvmmsg_priv_esc (L) / PSS: 125034/Linux-3.4-CONFIG_X86_X32-y-Local-Root.html (L) 125033/X86_X32-recvmmsg-Arbitrary-Write-Local-Root.html (P) / Github: Al1ex_LinuxEelvation (G) C0dak_linux-kernel-exploits (G) C0dak_local-root-exploit- (G) CVEDB_awesome-cve-repo (G) CVEDB_top (G) De4dCr0w_Linux-kernel-EoP-exp (G) Feng4_linux-kernel-exploits (G) IMCG_awesome-c (G) JERRY123S_all-poc (G) JlSakuya_Linux-Privilege-Escalation-Exploits (G) Micr067_linux-kernel-exploits (G) QChiLan_linux-exp (G) R0B1NL1N_Linux-Kernal-Exploits-m- (G) R0B1NL1N_Linux-Kernel-Exploites (G) R0B1NL1N_linux-kernel-exploitation (G) SecWiki_linux-kernel-exploits (G) Shadowshusky_linux-kernel-exploits (G) Singlea-lyh_linux-kernel-exploits (G) Snoopy-Sec_Localroot-ALL-CVE (G) Technoashofficial_kernel-exploitation-linux (G) albinjoshy03_linux-kernel-exploits (G) ambynotcoder_C-libraries (G) anoaghost_Localroot_Compile (G) coffee727_linux-exp (G) copperfieldd_linux-kernel-exploits (G) cyberanand1337x_bug-bounty-2022 (G) distance-vector_linux-kernel-exploits (G) dyjakan_exploit-development-case-studies (G) fei9747_LinuxEelvation (G) h4x0r-dz_local-root-exploit- (G) hktalent_TOP (G) kdn111_linux-kernel-exploitation (G) khanhdn111_linux-kernel-exploitation (G) khanhdz-06_linux-kernel-exploitation (G) khanhdz191_linux-kernel-exploitation (G) khanhhdz_linux-kernel-exploitation (G) khanhhdz06_linux-kernel-exploitation (G) khanhnd123_linux-kernel-exploitation (G) kiruthikan99_IT19115276 (G) kumardineshwar_linux-kernel-exploits (G) lushtree-cn-honeyzhao_awesome-c (G) m0mkris_linux-kernel-exploits (G) ozkanbilge_Linux-Kernel-Exploits (G) p00h00_linux-exploits (G) password520_linux-kernel-exploits (G) qiantu88_Linux--exp (G) rakjong_LinuxElevation (G) saelo_cve-2014-0038 (G) skbasava_Linux-Kernel-exploit (G) spencerdodd_kernelpop (G) sujayadkesar_Linux-Privilege-Escalation (G) weeka10_-hktalent-TOP (G) xairy_linux-kernel-exploitation (G) xfinest_linux-kernel-exploits (G) xssfile_linux-kernel-exploits (G) yige666_linux-kernel-exploits (G) zyjsuper_linux-kernel-exploits (G))
openssl : 1.0.0 : CVE-2015-1791 : 6.8 (v2) : STAT : Exploit (Github: SysSec-KAIST_FirmKit (G) buptsseGJ_BinSeeker (G) buptsseGJ_VulSeeker (G))
openssl : 1.0.0 : CVE-2014-3509 : 6.8 (v2) : STAT : Exploit (Github: Ypnose_ahrf (G))
openssl : 1.0.0 : CVE-2014-0195 : 6.8 (v2) : STAT : Exploit (MSF: dtls_fragment_overflow (D) / Github: SF4bin_SEEKER_dataset (G) halon_changelog (G) ricedu_CVE-2014-0195 (G) securityrouter_changelog (G))
kernel : 3.10.14 : CVE-2023-2002 : 6.8 : STAT : Exploit (Snyk: SNYK-UNMANAGED-TORVALDSLINUX-5507220 (S) / Github: CVEDB_awesome-cve-repo (G) CVEDB_top (G) hktalent_TOP (G) lrh2000_CVE-2023-2002 (G) nomi-sec_PoC-in-GitHub (G))
kernel : 3.10.14 : CVE-2021-4203 : 6.8 : STAT : Exploit (Github: sam8k_Dynamic-and-Static-Analysis-of-SOUPs (G))
kernel : 3.10.14 : CVE-2016-8633 : 6.8 : STAT : Exploit (Github: R0B1NL1N_linux-kernel-exploitation (G) Technoashofficial_kernel-exploitation-linux (G) kdn111_linux-kernel-exploitation (G) khanhdn111_linux-kernel-exploitation (G) khanhdz-06_linux-kernel-exploitation (G) khanhdz191_linux-kernel-exploitation (G) khanhhdz_linux-kernel-exploitation (G) khanhhdz06_linux-kernel-exploitation (G) khanhnd123_linux-kernel-exploitation (G) skbasava_Linux-Kernel-exploit (G) xairy_linux-kernel-exploitation (G))
kernel : 3.10.14 : CVE-2023-28772 : 6.7 : STAT : Exploit (Github: Satheesh575555_linux-4.1.15_CVE-2023-28772 (G) Trinadh465_linux-4.1.15_CVE-2023-28772 (G) hheeyywweellccoommee_linux-4.1.15_CVE-2023-28772-ipchu (G) hshivhare67_kernel_v4.1.15_CVE-2023-28772 (G) nidhi7598_linux-4.19.72_CVE-2023-28772 (G) nomi-sec_PoC-in-GitHub (G))
kernel : 3.10.14 : CVE-2022-2503 : 6.7 : STAT : Exploit (Github: google_security-research_security_advisories_GHSA-6vq3-w69p-w63m (G))
kernel : 3.10.14 : CVE-2021-42739 : 6.7 : STAT : Exploit (Github: JaskaranNarula_Host_Errata_Info (G))
kernel : 3.10.14 : CVE-2021-42327 : 6.7 : STAT : Exploit (Github: WhooAmii_POC_to_review (G) docfate111_CVE-2021-42327 (G) kdn111_linux-kernel-exploitation (G) khanhdn111_linux-kernel-exploitation (G) khanhdz-06_linux-kernel-exploitation (G) khanhdz191_linux-kernel-exploitation (G) khanhhdz_linux-kernel-exploitation (G) khanhhdz06_linux-kernel-exploitation (G) khanhnd123_linux-kernel-exploitation (G) nomi-sec_PoC-in-GitHub (G) soosmile_POC (G) xairy_linux-kernel-exploitation (G))
kernel : 3.10.14 : CVE-2022-1015" title="CVE-2022-1015" target="_blank" >CVE-2022-1015 : 6.6 : STAT : Exploit (Github: CVE-2023-0179-PoC" title="H4K6_CVE-2023-0179-PoC" target="_blank" >H4K6_CVE-2023-0179-PoC (G) JlSakuya_Linux-Privilege-Escalation-Exploits (G) Mr-xn_Penetration_Testing_POC (G) TurtleARM_CVE-2023-0179-PoC (G) WhooAmii_POC_to_review (G) bsauce_kernel-exploit-factory (G) bsauce_kernel-security-learning (G) delsploit_CVE-2022-1015 (G) flexiondotorg_CNCF-02 (G) hardenedvault_ved (G) hktalent_TOP (G) kdn111_linux-kernel-exploitation (G) khanhdn111_linux-kernel-exploitation (G) khanhdz-06_linux-kernel-exploitation (G) khanhdz191_linux-kernel-exploitation (G) khanhhdz_linux-kernel-exploitation (G) khanhhdz06_linux-kernel-exploitation (G) khanhnd123_linux-kernel-exploitation (G) manas3c_CVE-POC (G) nomi-sec_PoC-in-GitHub (G) now4yreal_linux-kernel-vulnerabilities (G) now4yreal_linux-kernel-vulnerabilities-root-cause-analysis (G) pivik271_CVE-2022-1015 (G) pqlx_CVE-2022-1015 (G) pr0ln_bob_kern_exp1 (G) shuttterman_bob_kern_exp1 (G) wlswotmd_CVE-2022-1015 (G) xairy_linux-kernel-exploitation (G) xuetusummer_Penetration_Testing_POC (G) yaobinwen_robin_on_rails (G) ysanatomic_CVE-2022-1015 (G) zanezhub_CVE-2022-1015-1016 (G))
kernel : 3.10.14 : CVE-2018-15572 : 6.5 : STAT : Exploit (Github: codexlynx_hardware-attacks-state-of-the-art (G) elivepatch_livepatch-overlay (G))
kernel : 3.10.14 : CVE-2021-3573 : 6.4 : STAT : Exploit (Github: hardenedvault_ved (G) kdn111_linux-kernel-exploitation (G) khanhdn111_linux-kernel-exploitation (G) khanhdz-06_linux-kernel-exploitation (G) khanhdz191_linux-kernel-exploitation (G) khanhhdz_linux-kernel-exploitation (G) khanhhdz06_linux-kernel-exploitation (G) khanhnd123_linux-kernel-exploitation (G) xairy_linux-kernel-exploitation (G))
kernel : 3.10.14 : CVE-2014-5207 : 6.2 (v2) : STAT : Exploit (linux-exploit-suggester / EDB ID: 34923 / PSS: 128595/Linux-Kernel-3.16.1-FUSE-Privilege-Escalation.html (L))
kernel : 3.10.14 : CVE-2014-4014 : 6.2 (v2) : STAT : Exploit (linux-exploit-suggester / EDB ID: 33824 / PSS: 137628/Linux-Kernel-3.13-Local-Privilege-Escalation.html (L) / Github: Al1ex_LinuxEelvation (G) C0dak_linux-kernel-exploits (G) C0dak_local-root-exploit- (G) De4dCr0w_Linux-kernel-EoP-exp (G) Feng4_linux-kernel-exploits (G) JlSakuya_Linux-Privilege-Escalation-Exploits (G) Micr067_linux-kernel-exploits (G) QChiLan_linux-exp (G) R0B1NL1N_Linux-Kernal-Exploits-m- (G) R0B1NL1N_Linux-Kernel-Exploites (G) R0B1NL1N_linux-kernel-exploitation (G) SecWiki_linux-kernel-exploits (G) Shadowshusky_linux-kernel-exploits (G) Singlea-lyh_linux-kernel-exploits (G) Snoopy-Sec_Localroot-ALL-CVE (G) Technoashofficial_kernel-exploitation-linux (G) albinjoshy03_linux-kernel-exploits (G) anoaghost_Localroot_Compile (G) coffee727_linux-exp (G) copperfieldd_linux-kernel-exploits (G) distance-vector_linux-kernel-exploits (G) fei9747_LinuxEelvation (G) ferovap_Tools (G) h4x0r-dz_local-root-exploit- (G) kdn111_linux-kernel-exploitation (G) khanhdn111_linux-kernel-exploitation (G) khanhdz-06_linux-kernel-exploitation (G) khanhdz191_linux-kernel-exploitation (G) khanhhdz_linux-kernel-exploitation (G) khanhhdz06_linux-kernel-exploitation (G) khanhnd123_linux-kernel-exploitation (G) kumardineshwar_linux-kernel-exploits (G) m0mkris_linux-kernel-exploits (G) ozkanbilge_Linux-Kernel-Exploits (G) password520_linux-kernel-exploits (G) qiantu88_Linux--exp (G) rakjong_LinuxElevation (G) skbasava_Linux-Kernel-exploit (G) spencerdodd_kernelpop (G) vnik5287_cve-2014-4014-privesc (G) xairy_linux-kernel-exploitation (G) xfinest_linux-kernel-exploits (G) xssfile_linux-kernel-exploits (G) yige666_linux-kernel-exploits (G) zyjsuper_linux-kernel-exploits (G))
kernel : 3.10.14 : CVE-2016-8658 : 6.1 : STAT : Exploit (Github: freener_pocs (G))
kernel : 3.10.14 : CVE-2015-5156 : 6.1 (v2) : STAT : Exploit (Github: Resery_Learning_Record (G))
kernel : 3.10.14 : CVE-2020-25211 : 6 : STAT : Exploit (Github: 404notf0und_CVE-Flow (G))
openssl : 1.0.2f : CVE-2022-4304 : 5.9 : STAT : Exploit (Github: Trinadh465_Openssl-1.1.1g_CVE-2022-4304 (G) Tuttu7_Yum-command (G) nomi-sec_PoC-in-GitHub (G))
openssl : 1.0.2f : CVE-2021-4160 : 5.9 : STAT : Exploit (Github: actions-marketplace-validations_neuvector_scan-action (G) andrewd-sysdig_nodejs-helloworld (G) bashofmann_neuvector-image-scan-action (G) fdl66_openssl-1.0.2u-fix-cve (G) neuvector_scan-action (G) tianocore-docs_ThirdPartySecurityAdvisories (G))
openssl : 1.0.2f : CVE-2021-23841 : 5.9 : STAT : Exploit (Github: Satheesh575555_Openssl_1_1_0_CVE-2021-23841 (G) Trinadh465_external_boringssl_openssl_1.1.0g_CVE-2021-23841 (G) WhooAmii_POC_to_review (G) arindam0310018_04-Apr-2022-DevOps__Scan-Images-In-ACR-Using-Trivy (G) falk-werner_cve-check (G) fdl66_openssl-1.0.2u-fix-cve (G) fredrkl_trivy-demo (G) isgo-golgo13_gokit-gorillakit-enginesvc (G) jntass_TASSL-1.1.1k (G) manas3c_CVE-POC (G) nomi-sec_PoC-in-GitHub (G) thecyberbaby_Trivy-by-AquaSecurity (G) thecyberbaby_Trivy-by-aquaSecurity (G) vinamra28_tekton-image-scan-trivy (G))
openssl : 1.0.2f : CVE-2020-1971 : 5.9 : STAT : Exploit (Github: MBHudson_CVE-2020-1971 (G) Metztli_debian-openssl-1.1.1i (G) arindam0310018_04-Apr-2022-DevOps__Scan-Images-In-ACR-Using-Trivy (G) developer-guy_image-scanning-using-trivy-as-go-library (G) developer3000S_PoC-in-GitHub (G) fdl66_openssl-1.0.2u-fix-cve (G) fredrkl_trivy-demo (G) hectorgie_PoC-in-GitHub (G) jntass_TASSL-1.1.1k (G) nomi-sec_PoC-in-GitHub (G) scott-leung_tools (G) soosmile_POC (G) stevechanieee_-5-OpenSSL_Versioning (G) thecyberbaby_Trivy-by-AquaSecurity (G) thecyberbaby_Trivy-by-aquaSecurity (G) vinamra28_tekton-image-scan-trivy (G))
openssl : 1.0.2f : CVE-2019-1559 : 5.9 : STAT : Exploit (Github: daTourist_Centos-6-openssl-1.0.1e-58.pd1trfir (G) mrodden_vyger (G) tls-attacker_TLS-Padding-Oracles (G))
openssl : 1.0.2f : CVE-2018-0737 : 5.9 : STAT : Exploit (Github: S8Cloud_sslpatch (G) hannob_tls-what-can-go-wrong (G) javirodriguezzz_Shodan-Browser (G) mrodden_vyger (G))
openssl : 1.0.2f : CVE-2018-0734 : 5.9 : STAT : Exploit (Github: javirodriguezzz_Shodan-Browser (G) mrodden_vyger (G))
openssl : 1.0.2f : CVE-2017-3737 : 5.9 : STAT : Exploit (Github: javirodriguezzz_Shodan-Browser (G))
openssl : 1.0.2f : CVE-2016-6306 : 5.9 : STAT : Exploit (Github: imhunterand_hackerone-publicy-disclosed (G))
openssl : 1.0.2f : CVE-2016-2107 : 5.9 : STAT : Exploit (EDB ID: 39768 / Github: 1o24er_Python- (G) CVEDB_awesome-cve-repo (G) CVEDB_top (G) Cherishao_Security-box (G) FiloSottile_CVE-2016-2107 (G) HiJackJTR_github_arsenal (G) JERRY123S_all-poc (G) Lilleengen_alexa-top-tls-tester (G) RUB-NDS_WS-TLS-Scanner (G) SSlvtao_CTF (G) Vxer-Lee_Hack_Tools (G) ZiDuNet_Note (G) apuentemedallia_tools-and-techniques-for-vulnerability-validation (G) birdhan_SecurityTools (G) blacksunwen_Python-tools (G) cream-sec_pentest-tools (G) cyberanand1337x_bug-bounty-2022 (G) githuberxu_Security-Resources (G) hackerso007_Sec-Box-master (G) hackstoic_hacker-tools-projects (G) hannob_tls-what-can-go-wrong (G) hantiger_- (G) hktalent_TOP (G) imhunterand_hackerone-publicy-disclosed (G) jay900323_SecurityTools (G) jerryxk_Sec-Box (G) krabelize_openbsd-httpd-tls-perfect-ssllabs-score (G) psc4re_SSLtest (G) scuechjr_Sec-Box (G) sunu11_Sec-Box (G) tmiklas_docker-cve-2016-2107 (G) tomwillfixit_alpine-cvecheck (G) weeka10_-hktalent-TOP (G) yige666_web- (G))
openssl : 1.0.2f : CVE-2016-0800 : 5.9 : STAT : Exploit (MSF: ssl_version / Github: 1N3_MassBleed (G) 84KaliPleXon3_a2sv (G) Artem-Salnikov_devops-netology (G) Artem-Tvr_sysadmin-09-security (G) F4RM0X_script_a2sv (G) H4CK3RT3CH_a2sv (G) Justic-D_Dev_net_home_1 (G) Kapotov_3.9.1 (G) Mre11i0t_a2sv (G) TheRipperJhon_a2sv (G) Tim---_drown (G) Vainoord_devops-netology (G) Valdem88_dev-17_ib-yakovlev_vs (G) Vanessapan001_pentest-2-Initial-Access-and-Internal-Recon (G) Vladislav-Pugachev_netology-DevOps-dz_-14 (G) WiktorMysz_devops-netology (G) alexandrburyakov_Rep2 (G) alexgro1982_devops-netology (G) alexoslabs_HTTPSScan (G) bysart_devops-netology (G) clic-kbait_A2SV--SSL-VUL-Scan (G) dmitrii1312_03-sysadmin-09 (G) fireorb_SSL-Scanner (G) fireorb_sslscanner (G) geon071_netolofy_12 (G) hahwul_a2sv (G) halencarjunior_HTTPSScan-PYTHON (G) halon_changelog (G) ilya-starchikov_devops-netology (G) imhunterand_hackerone-publicy-disclosed (G) nikolay480_devops-netology (G) notnarb_docker-murmur (G) odolezal_D-Link-DIR-655 (G) pashicop_3.9_1 (G) r3p3r_1N3-MassBleed (G) vitaliivakhr_NETOLOGY (G) yellownine_netology-DevOps (G))
openssl : 1.0.0 : CVE-2016-2107 : 5.9 : STAT : Exploit (EDB ID: 39768 / Github: 1o24er_Python- (G) CVEDB_awesome-cve-repo (G) CVEDB_top (G) Cherishao_Security-box (G) FiloSottile_CVE-2016-2107 (G) HiJackJTR_github_arsenal (G) JERRY123S_all-poc (G) Lilleengen_alexa-top-tls-tester (G) RUB-NDS_WS-TLS-Scanner (G) SSlvtao_CTF (G) Vxer-Lee_Hack_Tools (G) ZiDuNet_Note (G) apuentemedallia_tools-and-techniques-for-vulnerability-validation (G) birdhan_SecurityTools (G) blacksunwen_Python-tools (G) cream-sec_pentest-tools (G) cyberanand1337x_bug-bounty-2022 (G) githuberxu_Security-Resources (G) hackerso007_Sec-Box-master (G) hackstoic_hacker-tools-projects (G) hannob_tls-what-can-go-wrong (G) hantiger_- (G) hktalent_TOP (G) imhunterand_hackerone-publicy-disclosed (G) jay900323_SecurityTools (G) jerryxk_Sec-Box (G) krabelize_openbsd-httpd-tls-perfect-ssllabs-score (G) psc4re_SSLtest (G) scuechjr_Sec-Box (G) sunu11_Sec-Box (G) tmiklas_docker-cve-2016-2107 (G) tomwillfixit_alpine-cvecheck (G) weeka10_-hktalent-TOP (G) yige666_web- (G))
openssl : 1.0.0 : CVE-2016-0704 : 5.9 : STAT : Exploit (Github: imhunterand_hackerone-publicy-disclosed (G))
openssl : 1.0.0 : CVE-2016-0703 : 5.9 : STAT : Exploit (Github: Artem-Salnikov_devops-netology (G) Artem-Tvr_sysadmin-09-security (G) Justic-D_Dev_net_home_1 (G) Kapotov_3.9.1 (G) Vainoord_devops-netology (G) Valdem88_dev-17_ib-yakovlev_vs (G) Vladislav-Pugachev_netology-DevOps-dz_-14 (G) WiktorMysz_devops-netology (G) alexandrburyakov_Rep2 (G) alexgro1982_devops-netology (G) bysart_devops-netology (G) dmitrii1312_03-sysadmin-09 (G) geon071_netolofy_12 (G) ilya-starchikov_devops-netology (G) imhunterand_hackerone-publicy-disclosed (G) nikolay480_devops-netology (G) odolezal_D-Link-DIR-655 (G) pashicop_3.9_1 (G) vitaliivakhr_NETOLOGY (G) yellownine_netology-DevOps (G))
libcurl : 7.36.0 : CVE-2023-27536 : 5.9 : STAT : Exploit (Github: 1g-v_DevSec_Docker_lab (G))
libcurl : 7.36.0 : CVE-2023-27535 : 5.9 : STAT : Exploit (Github: 1g-v_DevSec_Docker_lab (G))
kernel : 3.10.14 : CVE-2020-28097 : 5.9 : STAT : Exploit (Github: sam8k_Dynamic-and-Static-Analysis-of-SOUPs (G))
kernel : 3.10.14 : CVE-2018-12232 : 5.9 : STAT : Exploit (Github: hiboma_hiboma (G) shankarapailoor_moonshine (G))
kernel : 3.10.14 : CVE-2018-1108 : 5.9 : STAT : Exploit (PSS: 147423/Linux-RNG-Flaws.html (P))
kernel : 3.10.14 : CVE-2023-1998 : 5.6 : STAT : Exploit (EDB ID: 51384 / Github: google_security-research_security_advisories_GHSA-mj4w-6495-6crx (G))
kernel : 3.10.14 : CVE-2020-14390 : 5.6 : STAT : Exploit (Github: ZIllR0_Routers (G))
kernel : 3.10.14 : CVE-2019-7308 : 5.6 : STAT : Exploit (PSS: 151475/Linux-Insufficient-eBPF-Spectre-V1-Mitigation.html (P) / Github: CKExploits_pwnlinux (G) fengjixuchui_CPU-vulnerabiility-collections (G) houjingyi233_CPU-vulnerability-collections (G) kdn111_linux-kernel-exploitation (G) khanhdn111_linux-kernel-exploitation (G) khanhdz-06_linux-kernel-exploitation (G) khanhdz191_linux-kernel-exploitation (G) khanhhdz_linux-kernel-exploitation (G) khanhhdz06_linux-kernel-exploitation (G) khanhnd123_linux-kernel-exploitation (G) xairy_linux-kernel-exploitation (G))
openssl : 1.0.2f : CVE-2016-2178 : 5.5 : STAT : Exploit (Github: tomwillfixit_alpine-cvecheck (G))
kernel : 3.10.14 : CVE-2023-23455 : 5.5 : STAT : Exploit (Github: alopresto_epss_api_demo (G) alopresto6m_epss_api_demo (G))
kernel : 3.10.14 : CVE-2023-23454 : 5.5 : STAT : Exploit (Github: alopresto_epss_api_demo (G) alopresto6m_epss_api_demo (G))
kernel : 3.10.14 : CVE-2023-1249 : 5.5 : STAT : Exploit (PSS: 171912/CentOS-Stream-9-Missing-Kernel-Security-Fix.html (L))
kernel : 3.10.14 : CVE-2022-42703 : 5.5 : STAT : Exploit (Github: Squirre17_hbp-attack-demo (G) bcoles_kasld (G) fardeen-ahmed_Bug-bounty-Writeups (G) kdn111_linux-kernel-exploitation (G) khanhdn111_linux-kernel-exploitation (G) khanhdz-06_linux-kernel-exploitation (G) khanhdz191_linux-kernel-exploitation (G) khanhhdz_linux-kernel-exploitation (G) khanhhdz06_linux-kernel-exploitation (G) khanhnd123_linux-kernel-exploitation (G) nomi-sec_PoC-in-GitHub (G) CVE-2023-3640" title="pray77_CVE-2023-3640" target="_blank" >pray77_CVE-2023-3640 (G) pray77_SCTF2023_kernelpwn (G) veritas501_hbp_attack_demo (G) xairy_linux-kernel-exploitation (G))
kernel : 3.10.14 : CVE-2022-41218 : 5.5 : STAT : Exploit (Github: V4bel_CVE-2022-41218 (G) WhooAmii_POC_to_review (G) kdn111_linux-kernel-exploitation (G) khanhdn111_linux-kernel-exploitation (G) khanhdz-06_linux-kernel-exploitation (G) khanhdz191_linux-kernel-exploitation (G) khanhhdz_linux-kernel-exploitation (G) khanhhdz06_linux-kernel-exploitation (G) khanhnd123_linux-kernel-exploitation (G) manas3c_CVE-POC (G) nomi-sec_PoC-in-GitHub (G) xairy_linux-kernel-exploitation (G))
kernel : 3.10.14 : CVE-2022-25375 : 5.5 : STAT : Exploit (Snyk: SNYK-UNMANAGED-TORVALDSLINUX-2407769 (S) / Github: WhooAmii_POC_to_review (G) manas3c_CVE-POC (G) nomi-sec_PoC-in-GitHub (G) soosmile_POC (G) szymonh_rndis-co (G) szymonh_szymonh (G))
kernel : 3.10.14 : CVE-2022-2318 : 5.5 : STAT : Exploit (Github: torvalds_linux_commit_9cc02ede696272c5271a401e4f27c262359bc2f6 (G))
kernel : 3.10.14 : CVE-2022-2078 : 5.5 : STAT : Exploit (Github: delsploit_CVE-2022-2078 (G) kdn111_linux-kernel-exploitation (G) khanhdn111_linux-kernel-exploitation (G) khanhdz-06_linux-kernel-exploitation (G) khanhdz191_linux-kernel-exploitation (G) khanhhdz_linux-kernel-exploitation (G) khanhhdz06_linux-kernel-exploitation (G) khanhnd123_linux-kernel-exploitation (G) nomi-sec_PoC-in-GitHub (G) xairy_linux-kernel-exploitation (G))
kernel : 3.10.14 : CVE-2022-1016 : 5.5 : STAT : Exploit (Github: kdn111_linux-kernel-exploitation (G) khanhdn111_linux-kernel-exploitation (G) khanhdz-06_linux-kernel-exploitation (G) khanhdz191_linux-kernel-exploitation (G) khanhhdz_linux-kernel-exploitation (G) khanhhdz06_linux-kernel-exploitation (G) khanhnd123_linux-kernel-exploitation (G) xairy_linux-kernel-exploitation (G) yaobinwen_robin_on_rails (G) CVE-2022-1015-1016" title="zanezhub_CVE-2022-1015-1016" target="_blank" >zanezhub_CVE-2022-1015-1016 (G))
kernel : 3.10.14 : CVE-2022-0487 : 5.5 : STAT : Exploit (Github: CVE-2022-0847" title="si1ent-le_CVE-2022-0847" target="_blank" >si1ent-le_CVE-2022-0847 (G))
kernel : 3.10.14 : CVE-2022-0480 : 5.5 : STAT : Exploit (Github: kata-containers_kata-containers_issues_3373 (G))
kernel : 3.10.14 : CVE-2021-45868 : 5.5 : STAT : Exploit (Snyk: SNYK-UNMANAGED-TORVALDSLINUX-3006722 (S))
kernel : 3.10.14 : CVE-2021-4155 : 5.5 : STAT : Exploit (Github: lafayette96_CVE-Errata-Tool (G))
kernel : 3.10.14 : CVE-2021-4150 : 5.5 : STAT : Exploit (Github: sam8k_Dynamic-and-Static-Analysis-of-SOUPs (G))
kernel : 3.10.14 : CVE-2021-4148 : 5.5 : STAT : Exploit (Github: sam8k_Dynamic-and-Static-Analysis-of-SOUPs (G))
kernel : 3.10.14 : CVE-2021-3679 : 5.5 : STAT : Exploit (Github: aegistudio_RingBufferDetonator (G) nomi-sec_PoC-in-GitHub (G))
kernel : 3.10.14 : CVE-2021-29650 : 5.5 : STAT : Exploit (Github: woc-hack_tutorial (G))
kernel : 3.10.14 : CVE-2021-29155 : 5.5 : STAT : Exploit (Github: Kakashiiiiy_CVE-2021-29155 (G) WhooAmii_POC_to_review (G) benschlueter_CVE-2021-29155 (G) manas3c_CVE-POC (G) nomi-sec_PoC-in-GitHub (G) soosmile_POC (G))
kernel : 3.10.14 : CVE-2020-36322 : 5.5 : STAT : Exploit (Github: JaskaranNarula_Host_Errata_Info (G))
kernel : 3.10.14 : CVE-2020-27194 : 5.5 : STAT : Exploit (Github: Al1ex_LinuxEelvation (G) JlSakuya_Linux-Privilege-Escalation-Exploits (G) OrangeGzY_security-research-learning (G) bsauce_kernel-exploit-factory (G) bsauce_kernel-security-learning (G) developer3000S_PoC-in-GitHub (G) hectorgie_PoC-in-GitHub (G) kdn111_linux-kernel-exploitation (G) khanhdn111_linux-kernel-exploitation (G) khanhdz-06_linux-kernel-exploitation (G) khanhdz191_linux-kernel-exploitation (G) khanhhdz_linux-kernel-exploitation (G) khanhhdz06_linux-kernel-exploitation (G) khanhnd123_linux-kernel-exploitation (G) kruztw_CVE (G) nomi-sec_PoC-in-GitHub (G) scannells_exploits (G) willinin_CVE-2020-27194-exp (G) xairy_linux-kernel-exploitation (G) xmzyshypnc_CVE-2020-27194 (G))
kernel : 3.10.14 : CVE-2020-25704 : 5.5 : STAT : Exploit (Github: JaskaranNarula_Host_Errata_Info (G))
kernel : 3.10.14 : CVE-2020-10720 : 5.5 : STAT : Exploit (Github: 404notf0und_CVE-Flow (G))
kernel : 3.10.14 : CVE-2019-9857 : 5.5 : STAT : Exploit (Github: hiboma_hiboma (G))
kernel : 3.10.14 : CVE-2019-7222 : 5.5 : STAT : Exploit (PSS: 151712/KVM-kvm_inject_page_fault-Uninitialized-Memory-Leak.html (P) / Github: torvalds_linux_commits_master_arch_x86_kvm (G))
kernel : 3.10.14 : CVE-2019-5489 : 5.5 : STAT : Exploit (Github: 0xT11_CVE-POC (G) developer3000S_PoC-in-GitHub (G) hectorgie_PoC-in-GitHub (G) mmxsrup_CVE-2019-5489 (G) nomi-sec_PoC-in-GitHub (G))
kernel : 3.10.14 : CVE-2019-19039 : 5.5 : STAT : Exploit (Github: bobfuzzer_CVE_tree_master_CVE-2019-19039 (G))
kernel : 3.10.14 : CVE-2019-19037 : 5.5 : STAT : Exploit (Github: bobfuzzer_CVE_tree_master_CVE-2019-19037 (G))
kernel : 3.10.14 : CVE-2019-19036 : 5.5 : STAT : Exploit (Github: DelspoN_CVE (G) bobfuzzer_CVE_tree_master_CVE-2019-19036 (G))
kernel : 3.10.14 : CVE-2019-18885 : 5.5 : STAT : Exploit (Github: 0xT11_CVE-POC (G) bobfuzzer_CVE-2019-18885 (G) developer3000S_PoC-in-GitHub (G) hectorgie_PoC-in-GitHub (G))
kernel : 3.10.14 : CVE-2019-10207 : 5.5 : STAT : Exploit (Github: 0xT11_CVE-POC (G) alphaSeclab_sec-daily-2019 (G) butterflyhack_CVE-2019-10207 (G) developer3000S_PoC-in-GitHub (G) hectorgie_PoC-in-GitHub (G))
kernel : 3.10.14 : CVE-2018-7740 : 5.5 : STAT : Exploit (Github: blurbdust_blurbdust.github.io (G))
kernel : 3.10.14 : CVE-2018-7273 : 5.5 : STAT : Exploit (EDB ID: 44325 / PSS: 146863/Linux-Kernel-show_floppy-KASLR-Address-Leak.html (P) / Github: bcoles_kasld (G) lnick2023_nicenice (G) qazbnm456_awesome-cve-poc (G) xbl3_awesome-cve-poc_qazbnm456 (G))
kernel : 3.10.14 : CVE-2018-6554 : 5.5 : STAT : Exploit (Github: hiboma_hiboma (G) kdn111_linux-kernel-exploitation (G) khanhdn111_linux-kernel-exploitation (G) khanhdz-06_linux-kernel-exploitation (G) khanhdz191_linux-kernel-exploitation (G) khanhhdz_linux-kernel-exploitation (G) khanhhdz06_linux-kernel-exploitation (G) khanhnd123_linux-kernel-exploitation (G) xairy_linux-kernel-exploitation (G))
kernel : 3.10.14 : CVE-2018-5333 : 5.5 : STAT : Exploit (EDB ID: 47957 / MSF: rds_atomic_free_op_null_pointer_deref_priv_esc (L) / Github: Al1ex_LinuxEelvation (G) De4dCr0w_Linux-kernel-EoP-exp (G) JlSakuya_Linux-Privilege-Escalation-Exploits (G) bcoles_kernel-exploits (G) bsauce_kernel-exploit-factory (G) bsauce_kernel-security-learning (G) n3t1nv4d3_kernel-exploits (G))
kernel : 3.10.14 : CVE-2018-18397 : 5.5 : STAT : Exploit (PSS: 150748/Linux-userfaultfd-tmpfs-File-Permission-Bypass.html (P))
kernel : 3.10.14 : CVE-2018-15594 : 5.5 : STAT : Exploit (Github: elivepatch_livepatch-overlay (G))
kernel : 3.10.14 : CVE-2018-11508 : 5.5 : STAT : Exploit (EDB ID: 46208 / PSS: 151241/Linux-Kernel-4.13-compat_get_timex-Kernel-Pointer-Leak.html (P) / Github: bcoles_kasld (G))
kernel : 3.10.14 : CVE-2017-9150 : 5.5 : STAT : Exploit (EDB ID: 42048)
kernel : 3.10.14 : CVE-2017-7616 : 5.5 : STAT : Exploit (Github: R0B1NL1N_linux-kernel-exploitation (G) Technoashofficial_kernel-exploitation-linux (G) kdn111_linux-kernel-exploitation (G) khanhdn111_linux-kernel-exploitation (G) khanhdz-06_linux-kernel-exploitation (G) khanhdz191_linux-kernel-exploitation (G) khanhhdz_linux-kernel-exploitation (G) khanhhdz06_linux-kernel-exploitation (G) khanhnd123_linux-kernel-exploitation (G) skbasava_Linux-Kernel-exploit (G) xairy_linux-kernel-exploitation (G))
kernel : 3.10.14 : CVE-2017-7472 : 5.5 : STAT : Exploit (EDB ID: 42136 / PSS: 142871/Linux-Kernel-keyctl_set_reqkey_keyring-Denial-Of-Service.html (P) / Github: homjxi0e_CVE-2017-7472 (G))
kernel : 3.10.14 : CVE-2017-6353 : 5.5 : STAT : Exploit (Github: simondeziel_puppet-kernel (G))
kernel : 3.10.14 : CVE-2017-5986 : 5.5 : STAT : Exploit (Github: Amet13_vulncontrol (G))
kernel : 3.10.14 : CVE-2017-2671 : 5.5 : STAT : Exploit (EDB ID: 42135 / PSS: 142872/Linux-Kernel-ping-Denial-Of-Service.html (D) / Github: danieljiang0415_android_kernel_crash_poc (G) homjxi0e_CVE-2017-2671 (G))
kernel : 3.10.14 : CVE-2017-18344 : 5.5 : STAT : Exploit (EDB ID: 45175 / PSS: 148867/Linux-Kernel-4.14.7-Ubuntu-16.04-CentOS-7-Arbitrary-File-Read.html (P) / Github: CKExploits_pwnlinux (G) anoaghost_Localroot_Compile (G) bcoles_kasld (G) echo-devim_exploit_linux_kernel4.13 (G) hikame_docker_escape_pwn (G) kdn111_linux-kernel-exploitation (G) khanhdn111_linux-kernel-exploitation (G) khanhdz-06_linux-kernel-exploitation (G) khanhdz191_linux-kernel-exploitation (G) khanhhdz_linux-kernel-exploitation (G) khanhhdz06_linux-kernel-exploitation (G) khanhnd123_linux-kernel-exploitation (G) lnick2023_nicenice (G) qazbnm456_awesome-cve-poc (G) xairy_kernel-exploits (G) xairy_linux-kernel-exploitation (G) xbl3_awesome-cve-poc_qazbnm456 (G))
kernel : 3.10.14 : CVE-2017-16994 : 5.5 : STAT : Exploit (EDB ID: 44304)
kernel : 3.10.14 : CVE-2017-14954 : 5.5 : STAT : Exploit (Github: bcoles_kasld (G) echo-devim_exploit_linux_kernel4.13 (G))
kernel : 3.10.14 : CVE-2017-14489 : 5.5 : STAT : Exploit (EDB ID: 42932 / PSS: 144476/Linux-Kernel-4-14-rc1-Denial-Of-Service.html (D))
kernel : 3.10.14 : CVE-2017-1000380 : 5.5 : STAT : Exploit (Github: R0B1NL1N_linux-kernel-exploitation (G) Technoashofficial_kernel-exploitation-linux (G) bcoles_kasld (G) kdn111_linux-kernel-exploitation (G) khanhdn111_linux-kernel-exploitation (G) khanhdz-06_linux-kernel-exploitation (G) khanhdz191_linux-kernel-exploitation (G) khanhhdz_linux-kernel-exploitation (G) khanhhdz06_linux-kernel-exploitation (G) khanhnd123_linux-kernel-exploitation (G) xairy_linux-kernel-exploitation (G))
kernel : 3.10.14 : CVE-2016-8650 : 5.5 : STAT : Exploit (Github: RUB-SysSec_kAFL (G))
kernel : 3.10.14 : CVE-2016-6828 : 5.5 : STAT : Exploit (EDB ID: 40731 / PSS: 139642/Linux-Kernel-TCP-Related-Read-Use-After-Free.html (P))
kernel : 3.10.14 : CVE-2016-4578 : 5.5 : STAT : Exploit (EDB ID: 46529 / PSS: 152031/Linux-Kernel-4.4-Ubuntu-16.04-snd_timer_user_ccallback-Kernel-Pointer-Leak.html (P))
kernel : 3.10.14 : CVE-2016-4569 : 5.5 : STAT : Exploit (Github: bcoles_kasld (G))
kernel : 3.10.14 : CVE-2016-2383 : 5.5 : STAT : Exploit (Github: dylandreimerink_gobpfld (G))
kernel : 3.10.14 : CVE-2015-7550 : 5.5 : STAT : Exploit (Github: wcventure_PERIOD (G))
kernel : 3.10.14 : CVE-2014-3646 : 5.5 : STAT : Exploit (Github: abazhaniuk_Publications (G))
busybox : 1.22.1 : CVE-2015-9261 : 5.5 : STAT/UEMU : Exploit (PSS: 154361/Cisco-Device-Hardcoded-Credentials-GNU-glibc-BusyBox.html (P) 167552/Nexans-FTTO-GigaSwitch-Outdated-Components-Hardcoded-Backdoor.html (P) 153278/WAGO-852-Industrial-Managed-Switch-Series-Code-Execution-Hardcoded-Credentials.html (P))
openssl : 1.0.2f : CVE-2023-0466 : 5.3 : STAT : Exploit (Github: bluesentinelsec_landing-zone (G))
openssl : 1.0.2f : CVE-2019-1551 : 5.3 : STAT : Exploit (Github: Mohzeela_external-secret (G) arindam0310018_04-Apr-2022-DevOps__Scan-Images-In-ACR-Using-Trivy (G) fredrkl_trivy-demo (G) garethr_snykout (G) mrodden_vyger (G) siddharthraopotukuchi_trivy (G) t31m0_Vulnerability-Scanner-for-Containers (G) thecyberbaby_Trivy-by-AquaSecurity (G) thecyberbaby_Trivy-by-aquaSecurity (G) umahari_security (G) vinamra28_tekton-image-scan-trivy (G))
libcurl : 7.36.0 : CVE-2021-22876 : 5.3 : STAT : Exploit (Github: indece-official_clair-client (G))
kernel : 3.10.14 : CVE-2018-1120 : 5.3 : STAT : Exploit (EDB ID: 44806 / PSS: 147806/Procps-ng-Audit-Report.html (P))
kernel : 3.10.14 : CVE-2013-7446 : 5.3 : STAT : Exploit (Github: mudongliang_LinuxFlaw (G) oneoy_cve- (G))
openssl : 1.0.2f : CVE-2016-0702 : 5.1 : STAT : Exploit (Github: BlaineConnaughton_ubuntuCVEScraper (G) rsumnerz_vuls (G) xmppadmin_vuls (G))
openssl : 1.0.0 : CVE-2015-0288 : 5 (v2) : STAT : Exploit (Github: mrash_afl-cve (G) shouguoyang_Robin (G) tomgu1991_IMChecker (G))
openssl : 1.0.0 : CVE-2015-0205 : 5 (v2) : STAT : Exploit (Github: neominds_JPN_RIC13351-2 (G))
openssl : 1.0.0 : CVE-2014-8275 : 5 (v2) : STAT : Exploit (Github: akircanski_coinbugs (G) neominds_JPN_RIC13351-2 (G))
openssl : 1.0.0 : CVE-2014-3572 : 5 (v2) : STAT : Exploit (Github: neominds_JPN_RIC13351-2 (G))
openssl : 1.0.0 : CVE-2014-3570 : 5 (v2) : STAT : Exploit (Github: Purdue-ECE-461_Fuzzing-Assignment (G))
openssl : 1.0.0 : CVE-2014-3507 : 5 (v2) : STAT : Exploit (Github: Ypnose_ahrf (G) ruan777_MiniProject2019 (G))
openssl : 1.0.0 : CVE-2009-1379 : 5 (v2) : STAT : Exploit (EDB ID: 8720)
kernel : 3.10.14 : CVE-2020-28974 : 5 : STAT : Exploit (Github: ZIllR0_Routers (G))
kernel : 3.10.14 : CVE-2018-12904 : 4.9 : STAT : Exploit (EDB ID: 44944)
kernel : 3.10.14 : CVE-2015-7799 : 4.9 (v2) : STAT : Exploit (Github: guoygang_vul-guoygang (G))
kernel : 3.10.14 : CVE-2015-3636 : 4.9 (v2) : STAT : Exploit (Github: CVEDB_awesome-cve-repo (G) CVEDB_top (G) JERRY123S_all-poc (G) R0B1NL1N_linux-kernel-exploitation (G) SmllXzBZ_AEGPaper (G) Technoashofficial_kernel-exploitation-linux (G) a7vinx_CVE-2015-3636 (G) ambynotcoder_C-libraries (G) android-rooting-tools_libpingpong_exploit (G) askk_libping_unhash_exploit_POC (G) betalphafai_cve-2015-3636_crash (G) cyberanand1337x_bug-bounty-2022 (G) debugfan_rattle_root (G) fi01_CVE-2015-3636 (G) hktalent_TOP (G) idhyt_androotzf (G) kdn111_linux-kernel-exploitation (G) khanhdn111_linux-kernel-exploitation (G) khanhdz-06_linux-kernel-exploitation (G) khanhdz191_linux-kernel-exploitation (G) khanhhdz_linux-kernel-exploitation (G) khanhhdz06_linux-kernel-exploitation (G) khanhnd123_linux-kernel-exploitation (G) ludongxu_cve-2015-3636 (G) ne2der_AKLab (G) skbasava_Linux-Kernel-exploit (G) tangsilian_android-vuln (G) weeka10_-hktalent-TOP (G) xairy_linux-kernel-exploitation (G))
kernel : 3.10.14 : CVE-2014-3145 : 4.9 (v2) : STAT : Exploit (Github: torvalds_linux_commit_05ab8f2647e4221cbdb3856dd7d32bd5407316b3 (G))
kernel : 3.10.14 : CVE-2014-3144 : 4.9 (v2) : STAT : Exploit (Github: torvalds_linux_commit_05ab8f2647e4221cbdb3856dd7d32bd5407316b3 (G))
kernel : 3.10.14 : CVE-2016-5696 : 4.8 : STAT : Exploit (Github: Gnoxter_mountain_goat (G) ambynotcoder_C-libraries (G) bplinux_chackd (G) eagleusb_awesome-repositories (G) jduck_challack (G) unkaktus_grill (G) violentshell_rover (G))
openssl : 1.0.2f : CVE-2019-1547 : 4.7 : STAT : Exploit (Github: Mohzeela_external-secret (G) arindam0310018_04-Apr-2022-DevOps__Scan-Images-In-ACR-Using-Trivy (G) djschleen_ash (G) fredrkl_trivy-demo (G) jntass_TASSL-1.1.1k (G) mrodden_vyger (G) siddharthraopotukuchi_trivy (G) simiyo_trivy (G) t31m0_Vulnerability-Scanner-for-Containers (G) thecyberbaby_Trivy-by-AquaSecurity (G) thecyberbaby_Trivy-by-aquaSecurity (G) umahari_security (G) vinamra28_tekton-image-scan-trivy (G))
openssl : 1.0.2f : CVE-2018-5407 : 4.7 : STAT : Exploit (EDB ID: 45785 / PSS: 150138/PortSmash-CPU-SMT-Side-Channel-Proof-Of-Concept.html (P) / Github: bbbrumley_portsmash (G) codexlynx_hardware-attacks-state-of-the-art (G) djschleen_ash (G) mrodden_vyger (G) nsacyber_Hardware-and-Firmware-Security-Guidance (G))
kernel : 3.10.14 : CVE-2022-40307 : 4.7 : STAT : Exploit (Github: SettRaziel_bsi_cert_bot (G))
kernel : 3.10.14 : CVE-2021-33624 : 4.7 : STAT : Exploit (Github: Kakashiiiiy_CVE-2021-33624 (G) WhooAmii_POC_to_review (G) benschlueter_CVE-2021-33624 (G) nomi-sec_PoC-in-GitHub (G) soosmile_POC (G))
kernel : 3.10.14 : CVE-2019-11190 : 4.7 : STAT : Exploit (Github: kdn111_linux-kernel-exploitation (G) khanhdn111_linux-kernel-exploitation (G) khanhdz-06_linux-kernel-exploitation (G) khanhdz191_linux-kernel-exploitation (G) khanhhdz_linux-kernel-exploitation (G) khanhhdz06_linux-kernel-exploitation (G) khanhnd123_linux-kernel-exploitation (G) xairy_linux-kernel-exploitation (G))
kernel : 3.10.14 : CVE-2022-25258 : 4.6 : STAT : Exploit (Github: WhooAmii_POC_to_review (G) manas3c_CVE-POC (G) nomi-sec_PoC-in-GitHub (G) soosmile_POC (G) szymonh_d-os-descriptor (G) szymonh_szymonh (G))
kernel : 3.10.14 : CVE-2016-3140 : 4.6 : STAT : Exploit (EDB ID: 39537 / PSS: 136144/Linux-digi_acceleport-Null-Pointer-Dereference.html (P))
kernel : 3.10.14 : CVE-2016-3139 : 4.6 : STAT : Exploit (EDB ID: 39538 / PSS: 136143/Linux-wacom-Multiple-Null-Pointer-Dereferences.html (P))
kernel : 3.10.14 : CVE-2016-3138 : 4.6 : STAT : Exploit (PSS: 136138/Linux-cdc_acm-Null-Pointer-Dereference.html (P))
kernel : 3.10.14 : CVE-2016-3137 : 4.6 : STAT : Exploit (PSS: 136139/Linux-cypress_m8-Null-Pointer-Dereference.html (P))
kernel : 3.10.14 : CVE-2016-3136 : 4.6 : STAT : Exploit (EDB ID: 39541 / PSS: 136140/Linux-mct_u232-Null-Pointer-Dereference.html (P))
kernel : 3.10.14 : CVE-2016-2782 : 4.6 : STAT : Exploit (EDB ID: 39539 / PSS: 136142/Linux-visor-treo_attach-Null-Pointer-Dereference.html (P) 136218/Linux-visor-treo_attach-Null-Pointer-Dereference.html (P))
kernel : 3.10.14 : CVE-2016-2384 : 4.6 : STAT : Exploit (linux-exploit-suggester / EDB ID: 41999 / PSS: 142488/Linux-Kernel-3.x-usb-midi-Local-Privilege-Escalation.html (L) / Github: Al1ex_LinuxEelvation (G) C0dak_linux-kernel-exploits (G) C0dak_local-root-exploit- (G) CKmaenn_kernel-exploits (G) De4dCr0w_Linux-kernel-EoP-exp (G) Feng4_linux-kernel-exploits (G) HackOvert_awesome-bugs (G) JlSakuya_Linux-Privilege-Escalation-Exploits (G) Micr067_linux-kernel-exploits (G) QChiLan_linux-exp (G) R0B1NL1N_Linux-Kernal-Exploits-m- (G) R0B1NL1N_Linux-Kernel-Exploites (G) R0B1NL1N_linux-kernel-exploitation (G) SecWiki_linux-kernel-exploits (G) Shadowshusky_linux-kernel-exploits (G) Singlea-lyh_linux-kernel-exploits (G) Snoopy-Sec_Localroot-ALL-CVE (G) Technoashofficial_kernel-exploitation-linux (G) albinjoshy03_linux-kernel-exploits (G) coffee727_linux-exp (G) copperfieldd_linux-kernel-exploits (G) distance-vector_linux-kernel-exploits (G) fei9747_LinuxEelvation (G) ferovap_Tools (G) h4x0r-dz_local-root-exploit- (G) jiayy_android_vuln_poc-exp (G) kdn111_linux-kernel-exploitation (G) khanhdn111_linux-kernel-exploitation (G) khanhdz-06_linux-kernel-exploitation (G) khanhdz191_linux-kernel-exploitation (G) khanhhdz_linux-kernel-exploitation (G) khanhhdz06_linux-kernel-exploitation (G) khanhnd123_linux-kernel-exploitation (G) kumardineshwar_linux-kernel-exploits (G) lnick2023_nicenice (G) m0mkris_linux-kernel-exploits (G) ozkanbilge_Linux-Kernel-Exploits (G) password520_linux-kernel-exploits (G) qazbnm456_awesome-cve-poc (G) qiantu88_Linux--exp (G) rakjong_LinuxElevation (G) skbasava_Linux-Kernel-exploit (G) spencerdodd_kernelpop (G) xairy_kernel-exploits (G) xairy_kernel-exploits_tree_master_CVE-2016-2384 (G) xairy_linux-kernel-exploitation (G) xbl3_awesome-cve-poc_qazbnm456 (G) xfinest_linux-kernel-exploits (G) xssfile_linux-kernel-exploits (G) yige666_linux-kernel-exploits (G) zyjsuper_linux-kernel-exploits (G))
kernel : 3.10.14 : CVE-2016-2188 : 4.6 : STAT : Exploit (EDB ID: 39556 / PSS: 136219/Linux-iowarrior-Null-Pointer-Dereference.html (P))
kernel : 3.10.14 : CVE-2016-2186 : 4.6 : STAT : Exploit (PSS: 136217/Linux-powermate-Null-Pointer-Dereference.html (P))
kernel : 3.10.14 : CVE-2016-2185 : 4.6 : STAT : Exploit (PSS: 136222/Linux-ati_remote2-Null-Pointer-Dereference.html (P))
kernel : 3.10.14 : CVE-2016-2184 : 4.6 : STAT : Exploit (EDB ID: 39555 / PSS: 136221/Linux-snd-usb-audio-Denial-Of-Service.html (P))
kernel : 3.10.14 : CVE-2015-7566 : 4.6 : STAT : Exploit (EDB ID: 39540 / PSS: 136141/Linux-visor-clie_5_attach-Null-Pointer-Dereference.html (P))
kernel : 3.10.14 : CVE-2015-7515 : 4.6 : STAT : Exploit (EDB ID: 39544)
kernel : 3.10.14 : CVE-2015-2041 : 4.6 (v2) : STAT : Exploit (Github: torvalds_linux_commit_6b8d9117ccb4f81b1244aafa7bc70ef8fa45fc49 (G))
kernel : 3.10.14 : CVE-2014-8989 : 4.6 (v2) : STAT : Exploit (Github: soh0ro0t_kernel-namespace (G))
kernel : 3.10.14 : CVE-2022-0494 : 4.4 : STAT : Exploit (Github: sam8k_Dynamic-and-Static-Analysis-of-SOUPs (G))
kernel : 3.10.14 : CVE-2021-4032 : 4.4 : STAT : Exploit (Github: CVE-2021-4034-NoGCC" title="EstamelGG_CVE-2021-4034-NoGCC" target="_blank" >EstamelGG_CVE-2021-4034-NoGCC (G))
kernel : 3.10.14 : CVE-2021-27363 : 4.4 : STAT : Exploit (Github: aaronxie55_Presentation2_Markdown (G) c4pt000_kernel-5.11.6-expSEHDsec-HAXM-cgroup-virtio-nvidia-amd-kaliwifi (G) kdn111_linux-kernel-exploitation (G) khanhdn111_linux-kernel-exploitation (G) khanhdz-06_linux-kernel-exploitation (G) khanhdz191_linux-kernel-exploitation (G) khanhhdz_linux-kernel-exploitation (G) khanhhdz06_linux-kernel-exploitation (G) khanhnd123_linux-kernel-exploitation (G) xairy_linux-kernel-exploitation (G))
kernel : 3.10.14 : CVE-2019-19045 : 4.4 : STAT : Exploit (Github: torvalds_linux_commit_c8c2a057fdc7de1cd16f4baa51425b932a42eb39 (G))
kernel : 3.10.14 : CVE-2019-15666 : 4.4 : STAT : Exploit (linux-exploit-suggester / Github: Al1ex_LinuxEelvation (G) De4dCr0w_Linux-kernel-EoP-exp (G) JlSakuya_Linux-Privilege-Escalation-Exploits (G) bsauce_kernel-exploit-factory (G) bsauce_kernel-security-learning (G) go-bi_go-bi-soft (G) siddicky_yotjf (G))
kernel : 3.10.14 : CVE-2017-5551 : 4.4 : STAT : Exploit (Github: Amet13_vulncontrol (G))
kernel : 3.10.14 : CVE-2016-7097 : 4.4 : STAT : Exploit (Github: Amet13_vulncontrol (G))
openssl : 1.0.0 : CVE-2015-1788 : 4.3 (v2) : STAT : Exploit (Github: mrash_afl-cve (G))
openssl : 1.0.0 : CVE-2015-0204" title="CVE-2015-0204" target="_blank" >CVE-2015-0204 : 4.3 (v2) : STAT : Exploit (Github: 84KaliPleXon3_a2sv (G) AbhishekGhosh_FREAK-Attack-CVE-2015-0204-Testing-Script (G) Artem-Salnikov_devops-netology (G) Artem-Tvr_sysadmin-09-security (G) F4RM0X_script_a2sv (G) H4CK3RT3CH_a2sv (G) Justic-D_Dev_net_home_1 (G) Kapotov_3.9.1 (G) Mre11i0t_a2sv (G) TheRipperJhon_a2sv (G) TopCaver_scz_doc_copy (G) Vainoord_devops-netology (G) Valdem88_dev-17_ib-yakovlev_vs (G) Vladislav-Pugachev_netology-DevOps-dz_-14 (G) WiktorMysz_devops-netology (G) alexandrburyakov_Rep2 (G) alexgro1982_devops-netology (G) alexoslabs_HTTPSScan (G) bysart_devops-netology (G) camel-clarkson_non-controlflow-hijacking-datasets (G) clic-kbait_A2SV--SSL-VUL-Scan (G) cryptflow_checks (G) dmitrii1312_03-sysadmin-09 (G) felmoltor_FreakVulnChecker (G) fireorb_SSL-Scanner (G) fireorb_sslscanner (G) geon071_netolofy_12 (G) hahwul_a2sv (G) halencarjunior_HTTPSScan-PYTHON (G) ilya-starchikov_devops-netology (G) javirodriguezzz_Shodan-Browser (G) neominds_JPN_RIC13351-2 (G) CVE-2014-0291_CVE-2015-0204" title="niccoX_patch-openssl-CVE-2014-0291_CVE-2015-0204" target="_blank" >niccoX_patch-openssl-CVE-2014-0291_CVE-2015-0204 (G) nikolay480_devops-netology (G) pashicop_3.9_1 (G) scottjpack_Freak-Scanner (G) thekondrashov_stuff (G) vitaliivakhr_NETOLOGY (G) yellownine_netology-DevOps (G))
openssl : 1.0.0 : CVE-2014-3511 : 4.3 (v2) : STAT : Exploit (Github: Ypnose_ahrf (G))
openssl : 1.0.0 : CVE-2014-3510 : 4.3 (v2) : STAT : Exploit (Github: Ypnose_ahrf (G))
openssl : 1.0.0 : CVE-2014-3508 : 4.3 (v2) : STAT : Exploit (Github: buptsseGJ_BinSeeker (G) buptsseGJ_VulSeeker (G))
openssl : 1.0.0 : CVE-2010-2939 : 4.3 (v2) : STAT : Exploit (EDB ID: 34427)
libcurl : 7.36.0 : CVE-2014-3707 : 4.3 (v2) : STAT : Exploit (Github: Hwangtaewon_radamsa (G) StephenHaruna_RADAMSA (G) nqwang_radamsa (G) sambacha_mirror-radamsa (G) sunzu94_radamsa-Fuzzer (G))
kernel : 3.10.14 : CVE-2013-4579 : 4.3 (v2) : STAT : Exploit (EDB ID: 38826)
kernel : 3.10.14 : CVE-2020-26558 : 4.2 : STAT : Exploit (Github: JeffroMF_awesome-bluetooth-security321 (G) engn33r_awesome-bluetooth-security (G))
openssl : 1.0.2f : CVE-2020-1968 : 3.7 : STAT : Exploit (Github: 404notf0und_CVE-Flow (G) fdl66_openssl-1.0.2u-fix-cve (G))
openssl : 1.0.2f : CVE-2019-1563 : 3.7 : STAT : Exploit (Github: Mohzeela_external-secret (G) arindam0310018_04-Apr-2022-DevOps__Scan-Images-In-ACR-Using-Trivy (G) djschleen_ash (G) fredrkl_trivy-demo (G) jntass_TASSL-1.1.1k (G) mrodden_vyger (G) siddharthraopotukuchi_trivy (G) simiyo_trivy (G) t31m0_Vulnerability-Scanner-for-Containers (G) thecyberbaby_Trivy-by-AquaSecurity (G) thecyberbaby_Trivy-by-aquaSecurity (G) umahari_security (G) vinamra28_tekton-image-scan-trivy (G))
openssl : 1.0.0 : CVE-2015-4000 : 3.7 : STAT : Exploit (MSF: ssl_version / Github: 84KaliPleXon3_a2sv (G) Artem-Salnikov_devops-netology (G) Artem-Tvr_sysadmin-09-security (G) DButter_whitehat_public (G) F4RM0X_script_a2sv (G) H4CK3RT3CH_a2sv (G) Justic-D_Dev_net_home_1 (G) Kapotov_3.9.1 (G) Mre11i0t_a2sv (G) TheRipperJhon_a2sv (G) Vainoord_devops-netology (G) Valdem88_dev-17_ib-yakovlev_vs (G) Vladislav-Pugachev_netology-DevOps-dz_-14 (G) WiktorMysz_devops-netology (G) alexandrburyakov_Rep2 (G) alexgro1982_devops-netology (G) alexoslabs_HTTPSScan (G) bysart_devops-netology (G) clic-kbait_A2SV--SSL-VUL-Scan (G) dmitrii1312_03-sysadmin-09 (G) eSentire_nmap-esentire (G) fatlan_HAProxy-Keepalived-Sec-HighLoads (G) fireorb_SSL-Scanner (G) fireorb_sslscanner (G) geon071_netolofy_12 (G) giusepperuggiero96_Network-Security-2021 (G) hahwul_a2sv (G) ilya-starchikov_devops-netology (G) javirodriguezzz_Shodan-Browser (G) nikolay480_devops-netology (G) pashicop_3.9_1 (G) thekondrashov_stuff (G) vitaliivakhr_NETOLOGY (G) yellownine_netology-DevOps (G) yurkao_python-ssl-deprecated (G))
libcurl : 7.36.0 : CVE-2021-22924 : 3.7 : STAT : Exploit (Github: Trinadh465_external_curl_AOSP10_r33_CVE-2021-22924 (G) kenlavbah_log4jnotes (G) nomi-sec_PoC-in-GitHub (G))
openssl : 1.0.0 : CVE-2014-3566 : 3.4 : STAT : Exploit (MSF: ssl_version / Snyk: SNYK-COCOAPODS-OPENSSL-471269 (S) SNYK-UNMANAGED-OPENSSL-2318690 (S) / Github: 1N3_MassBleed (G) 4psa_dnsmanagerpatches (G) 4psa_voipnowpatches (G) 84KaliPleXon3_a2sv (G) Artem-Salnikov_devops-netology (G) Artem-Tvr_sysadmin-09-security (G) CVEDB_awesome-cve-repo (G) CVEDB_top (G) CertifiedCEH_DB (G) DButter_whitehat_public (G) F4RM0X_script_a2sv (G) FroggDev_BASH_froggPoodler (G) H4CK3RT3CH_a2sv (G) JERRY123S_all-poc (G) Justic-D_Dev_net_home_1 (G) Kapotov_3.9.1 (G) Mre11i0t_a2sv (G) SECURED-FP7_secured-psa-reencrypt (G) TechPorter20_bouncer (G) TheRipperJhon_a2sv (G) Vainoord_devops-netology (G) Valdem88_dev-17_ib-yakovlev_vs (G) Vladislav-Pugachev_netology-DevOps-dz_-14 (G) WiktorMysz_devops-netology (G) alexandrburyakov_Rep2 (G) alexgro1982_devops-netology (G) alexoslabs_HTTPSScan (G) automatecloud_lacework-kaholo-autoremediation (G) bjayesh_ric13351 (G) bysart_devops-netology (G) camel-clarkson_non-controlflow-hijacking-datasets (G) clic-kbait_A2SV--SSL-VUL-Scan (G) cloudpassage_mangy-beast (G) cryptflow_checks (G) cyberanand1337x_bug-bounty-2022 (G) dmitrii1312_03-sysadmin-09 (G) fireorb_SSL-Scanner (G) fireorb_sslscanner (G) geon071_netolofy_12 (G) ggrandes_bouncer (G) giusepperuggiero96_Network-Security-2021 (G) hahwul_a2sv (G) halencarjunior_HTTPSScan-PYTHON (G) hktalent_TOP (G) huggablehacker_poodle-test (G) ilya-starchikov_devops-netology (G) jiphex_debsec (G) mahendra1904_lacework-kaholo-autoremediation (G) marcocastro100_Intrusion_Detection_System-Python (G) matjohns_squeeze-lighttpd-poodle (G) mikemackintosh_ruby-qualys (G) mikesplain_CVE-2014-3566-poodle-cookbook (G) mpgn_poodle-PoC (G) neominds_ric13351 (G) nikolay480_devops-netology (G) odolezal_D-Link-DIR-655 (G) pashicop_3.9_1 (G) puppetlabs_puppetlabs-compliance_profile (G) r3p3r_1N3-MassBleed (G) rameezts_poodle_check (G) rvaralda_aws_poodle_fix (G) shanekeels_harden-ssl-tls-windows (G) stdevel_poodle_protector (G) toysweet_opensslbug (G) tzaffi_testssl-report (G) vitaliivakhr_NETOLOGY (G) vshaliii_Hacklab-Vulnix (G) weeka10_-hktalent-TOP (G) yellownine_netology-DevOps (G))
openssl : 1.0.2f : CVE-2019-1552 : 3.3 : STAT : Exploit (Github: imhunterand_hackerone-publicy-disclosed (G) javirodriguezzz_Shodan-Browser (G) jntass_TASSL-1.1.1k (G))
kernel : 3.10.14 : CVE-2022-32296 : 3.3 : STAT : Exploit (Github: 0xkol_rfc6056-device-tracker (G))
kernel : 3.10.14 : CVE-2016-4486 : 3.3 : STAT : Exploit (EDB ID: 46006 / PSS: 150840/Linux-Kernel-4.4-rtnetlink-Stack-Memory-Disclosure.html (P) / Github: bcoles_kasld (G))
openssl : 1.0.0 : CVE-2013-0169 : 2.6 (v2) : STAT : Exploit (Github: Artem-Salnikov_devops-netology (G) Artem-Tvr_sysadmin-09-security (G) Justic-D_Dev_net_home_1 (G) Kapotov_3.9.1 (G) PeterMosmans_security-scripts (G) Vainoord_devops-netology (G) Valdem88_dev-17_ib-yakovlev_vs (G) Vladislav-Pugachev_netology-DevOps-dz_-14 (G) WiktorMysz_devops-netology (G) alexandrburyakov_Rep2 (G) alexgro1982_devops-netology (G) bysart_devops-netology (G) dmitrii1312_03-sysadmin-09 (G) eldron_metls (G) geon071_netolofy_12 (G) ilya-starchikov_devops-netology (G) jquepi_tlslite-ng (G) lnick2023_nicenice (G) nikolay480_devops-netology (G) odolezal_D-Link-DIR-655 (G) pashicop_3.9_1 (G) qazbnm456_awesome-cve-poc (G) sailfishos-mirror_tlslite-ng (G) tlsfuzzer_tlslite-ng (G) xbl3_awesome-cve-poc_qazbnm456 (G) yellownine_netology-DevOps (G))
kernel : 3.10.14 : CVE-2015-8569 : 2.3 : STAT : Exploit (Github: bcoles_kasld (G))
kernel : 3.10.14 : CVE-2015-5697 : 2.1 (v2) : STAT : Exploit (Github: torvalds_linux_commit_b6878d9e03043695dbf3fa1caa6dfc09db225b16 (G))
kernel : 3.10.14 : CVE-2014-3645 : 2.1 (v2) : STAT : Exploit (Github: abazhaniuk_Publications (G))
kernel : 3.10.14 : CVE-2014-1739 : 2.1 (v2) : STAT : Exploit (EDB ID: 39214)
kernel : 3.10.14 : CVE-2014-0181 : 2.1 (v2) : STAT : Exploit (Github: CVE-2023-2002" title="lrh2000_CVE-2023-2002" target="_blank" >lrh2000_CVE-2023-2002 (G))
openssl : 1.0.0 : CVE-2014-0076 : 1.9 (v2) : STAT : Exploit (Github: uvhw_uvhw.bitcoin.js (G))