By passing an overly large string when invoking nethack, it is possible to corrupt memory. jnethack and falconseye are also prone to this vulnerability.
-
Updated
Dec 16, 2022 - C
The Common Vulnerabilities and Exposures (CVE) system provides a reference-method for publicly known information-security vulnerabilities and exposures. The United States’ National Cybersecurity FFRDC, operated by The Mitre Corporation, maintains the system, with funding from the US National Cyber Security Division of the US Department of Homeland Security
By passing an overly large string when invoking nethack, it is possible to corrupt memory. jnethack and falconseye are also prone to this vulnerability.
rewrited SSH Exploit for CVE-2024-6387 (regreSSHion)
Exploit for CVE-2022-2588 by [Markakd](https://github.com/Markakd)
Track and explore function-level CVE patch changes across multiple programming languages.
This repository contains a C program to test for CVE-2024-2961, a buffer overflow vulnerability in the iconv() function of glibc.
This repository contains PoC exploits we developed for internal research or red team exercises.
Meltdown & Spectre - catastrophic vulnerabilities - exploited 🛡️
Text4Shell Vulnerability Scanner for Windows
Vulnerable samba versions and exploits, wrapped in docker containers
Exploit for CVE-2019-17662 (ThinVNC 1.0b1)
Proof of concept exploit for Bluefrag - CVE-2020-0022
Kernel exploits consisting mostly of privilege escalation attacks against core components of Linux distribtions