Skip to content

Commit eb7aa19

Browse files
committed
Initial commit
0 parents  commit eb7aa19

31 files changed

+3906
-0
lines changed

.github/workflows/build.yml

Lines changed: 60 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,60 @@
1+
name: build
2+
3+
on:
4+
push:
5+
branches: main
6+
7+
workflow_dispatch:
8+
9+
jobs:
10+
build:
11+
name: Build
12+
runs-on: ubuntu-latest
13+
14+
steps:
15+
- name: Checkout
16+
uses: actions/checkout@v3
17+
18+
- name: Setup Ruby
19+
uses: ruby/setup-ruby@v1
20+
21+
- name: Setup Pages
22+
uses: actions/configure-pages@v1
23+
24+
- name: Build
25+
run: |
26+
touch -a README.md
27+
rm README.md
28+
bundle install
29+
bundle exec jekyll build
30+
cp _site/README.md README.md
31+
32+
- name: Upload artifact
33+
uses: actions/upload-pages-artifact@v1
34+
35+
- name: Commit
36+
run: |
37+
git config --global user.email "[email protected]"
38+
git config --global user.name "Ramon de C Valle"
39+
git add -A
40+
git commit -m "Auto commit changes" || true
41+
git push origin main
42+
43+
deploy:
44+
environment:
45+
name: github-pages
46+
url: ${{ steps.deployment.outputs.page_url }}
47+
48+
name: Deploy
49+
needs: build
50+
51+
permissions:
52+
id-token: write
53+
pages: write
54+
55+
runs-on: ubuntu-latest
56+
57+
steps:
58+
- name: Deploy to GitHub Pages
59+
id: deployment
60+
uses: actions/deploy-pages@v1

.gitignore

Lines changed: 6 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,6 @@
1+
.bundle
2+
.jekyll-cache
3+
.sass-cache
4+
Gemfile.lock
5+
_site
6+
vendor

.ruby-version

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1 @@
1+
3.3

Gemfile

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,2 @@
1+
source 'https://rubygems.org'
2+
gem 'jekyll'

_data/exploits.yml

Lines changed: 243 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,243 @@
1+
---
2+
- description: The Linux kernel 2.6.0 through 2.6.30.4, and 2.4.4 through 2.4.37.4,
3+
does not initialize all function pointers for socket operations in proto_ops structures,
4+
which allows local users to trigger a NULL pointer dereference and gain privileges
5+
by using mmap to map page zero, placing arbitrary code on this page, and then
6+
invoking an unavailable operation, as demonstrated by the sendpage operation (sock_sendpage
7+
function) on a PF_PPPOX socket.
8+
filename: linux-sendpage3.tar.gz
9+
name: Linux sock_sendpage() NULL Pointer Dereference Exploit for Linux POWER/PowerPC
10+
x86 (3)
11+
published: 2009-09-10 00:00:00.000000000 Z
12+
resources:
13+
- name: View on LWN.net
14+
url: https://lwn.net/Articles/349999/
15+
updated:
16+
url: https://github.com/risesecurity/exploits/raw/HEAD/linux-sendpage3.tar.gz
17+
vulnerabilities:
18+
- CVE-2009-2692
19+
- description: The Linux kernel 2.6.0 through 2.6.30.4, and 2.4.4 through 2.4.37.4,
20+
does not initialize all function pointers for socket operations in proto_ops structures,
21+
which allows local users to trigger a NULL pointer dereference and gain privileges
22+
by using mmap to map page zero, placing arbitrary code on this page, and then
23+
invoking an unavailable operation, as demonstrated by the sendpage operation (sock_sendpage
24+
function) on a PF_PPPOX socket.
25+
filename: linux-sendpage2.tar.gz
26+
name: Linux sock_sendpage() NULL Pointer Dereference Exploit for Linux POWER/PowerPC
27+
x86 (2)
28+
published: 2009-09-07 00:00:00.000000000 Z
29+
resources:
30+
- name: View on LWN.net
31+
url: https://lwn.net/Articles/349999/
32+
updated:
33+
url: https://github.com/risesecurity/exploits/raw/HEAD/linux-sendpage2.tar.gz
34+
vulnerabilities:
35+
- CVE-2009-2692
36+
- description: The Linux kernel 2.6.0 through 2.6.30.4, and 2.4.4 through 2.4.37.4,
37+
does not initialize all function pointers for socket operations in proto_ops structures,
38+
which allows local users to trigger a NULL pointer dereference and gain privileges
39+
by using mmap to map page zero, placing arbitrary code on this page, and then
40+
invoking an unavailable operation, as demonstrated by the sendpage operation (sock_sendpage
41+
function) on a PF_PPPOX socket.
42+
filename: linux-sendpage.c
43+
name: Linux sock_sendpage() NULL Pointer Dereference Exploit for Linux POWER/PowerPC
44+
x86
45+
published: 2009-08-31 00:00:00.000000000 Z
46+
resources:
47+
- name: View on LWN.net
48+
url: https://lwn.net/Articles/349999/
49+
updated:
50+
url: https://github.com/risesecurity/exploits/raw/HEAD/linux-sendpage.c
51+
vulnerabilities:
52+
- CVE-2009-2692
53+
- description: Stack-based buffer overflow in the _tt_internal_realpath function in
54+
the ToolTalk library (libtt.a) in IBM AIX 5.2.0, 5.3.0, 5.3.7 through 5.3.10,
55+
and 6.1.0 through 6.1.3, when the rpc.ttdbserver daemon is enabled in /etc/inetd.conf,
56+
allows remote attackers to execute arbitrary code via a long XDR-encoded ASCII
57+
string to remote procedure 15.
58+
filename: rpc_ttdbserverd_realpath.rb
59+
name: ToolTalk rpc.ttdbserverd _tt_internal_realpath Buffer Overflow (AIX)
60+
published: 2009-06-23 03:49:25.000000000 Z
61+
updated: 2020-10-02 16:38:06.000000000 Z
62+
url: https://github.com/risesecurity/exploits/raw/HEAD/rpc_ttdbserverd_realpath.rb
63+
vulnerabilities:
64+
- CVE-2009-2727
65+
- description: Multiple heap-based buffer overflows in the NDR parsing in smbd in
66+
Samba 3.0.0 through 3.0.25rc3 allow remote attackers to execute arbitrary code
67+
via crafted MS-RPC requests involving (1) DFSEnum (netdfs_io_dfs_EnumInfo_d),
68+
(2) RFNPCNEX (smb_io_notify_option_type_data), (3) LsarAddPrivilegesToAccount
69+
(lsa_io_privilege_set), (4) NetSetFileSecurity (sec_io_acl), or (5) LsarLookupSids/LsarLookupSids2
70+
(lsa_io_trans_names).
71+
filename: lsa_transnames_heap_linux.rb
72+
name: Samba lsa_io_trans_names Heap Overflow (Linux)
73+
published: 2008-10-19 21:03:39.000000000 Z
74+
updated: 2020-10-02 16:38:06.000000000 Z
75+
url: https://github.com/risesecurity/exploits/raw/HEAD/lsa_transnames_heap_linux.rb
76+
vulnerabilities:
77+
- CVE-2007-2446
78+
- description: Stack-based buffer overflow in the adm_build_path function in sadmind
79+
in Sun Solstice AdminSuite on Solaris 8 and 9 allows remote attackers to execute
80+
arbitrary code via a crafted request.
81+
filename: sadmind_adm_build_path.rb
82+
name: Sun Solaris sadmind adm_build_path() Buffer Overflow
83+
published: 2008-10-14 14:22:34.000000000 Z
84+
updated: 2020-10-02 16:38:06.000000000 Z
85+
url: https://github.com/risesecurity/exploits/raw/HEAD/sadmind_adm_build_path.rb
86+
vulnerabilities:
87+
- CVE-2008-4556
88+
- description: Multiple stack-based buffer overflows in Borland InterBase LI 8.0.0.53
89+
through 8.1.0.253, and WI 5.1.1.680 through 8.1.0.257, allow remote attackers
90+
to execute arbitrary code via (1) a long service attach request on TCP port 3050
91+
to the (a) SVC_attach or (b) INET_connect function, (2) a long create request
92+
on TCP port 3050 to the (c) isc_create_database or (d) jrd8_create_database function,
93+
(3) a long attach request on TCP port 3050 to the (e) isc_attach_database or (f)
94+
PWD_db_aliased function, or unspecified vectors involving the (4) jrd8_attach_database
95+
or (5) expand_filename2 function.
96+
filename: ib_inet_connect.rb
97+
name: Borland InterBase INET_connect() Buffer Overflow
98+
published: 2007-10-04 03:03:13.000000000 Z
99+
updated: 2020-10-02 16:38:06.000000000 Z
100+
url: https://github.com/risesecurity/exploits/raw/HEAD/ib_inet_connect.rb
101+
vulnerabilities:
102+
- CVE-2007-5243
103+
- description: This module exploits a stack buffer overflow in Borland InterBase by
104+
sending a specially crafted create request.
105+
filename: ib_jrd8_create_database.rb
106+
name: Borland InterBase jrd8_create_database() Buffer Overflow
107+
published: 2007-10-04 03:03:13.000000000 Z
108+
updated: 2020-10-02 16:38:06.000000000 Z
109+
url: https://github.com/risesecurity/exploits/raw/HEAD/ib_jrd8_create_database.rb
110+
vulnerabilities:
111+
- CVE-2007-5243
112+
- description: Stack-based buffer overflow in Borland InterBase LI 8.0.0.53 through
113+
8.1.0.253 on Linux, and possibly unspecified versions on Solaris, allows remote
114+
attackers to execute arbitrary code via a long attach request on TCP port 3050
115+
to the open_marker_file function.
116+
filename: ib_open_marker_file.rb
117+
name: Borland InterBase open_marker_file() Buffer Overflow
118+
published: 2007-10-04 03:03:13.000000000 Z
119+
updated: 2020-10-02 16:38:06.000000000 Z
120+
url: https://github.com/risesecurity/exploits/raw/HEAD/ib_open_marker_file.rb
121+
vulnerabilities:
122+
- CVE-2007-5244
123+
- description: This module exploits a stack buffer overflow in Borland InterBase by
124+
sending a specially crafted attach request.
125+
filename: ib_pwd_db_aliased.rb
126+
name: Borland InterBase PWD_db_aliased() Buffer Overflow
127+
published: 2007-10-04 03:03:13.000000000 Z
128+
updated: 2020-10-02 16:38:06.000000000 Z
129+
url: https://github.com/risesecurity/exploits/raw/HEAD/ib_pwd_db_aliased.rb
130+
vulnerabilities:
131+
- CVE-2007-5243
132+
- description: This module exploits a stack buffer overflow in Borland InterBase by
133+
sending a specially crafted create request.
134+
filename: fb_isc_attach_database.rb
135+
name: Firebird Relational Database isc_attach_database() Buffer Overflow
136+
published: 2007-10-04 03:03:13.000000000 Z
137+
updated: 2020-10-02 16:38:06.000000000 Z
138+
url: https://github.com/risesecurity/exploits/raw/HEAD/fb_isc_attach_database.rb
139+
vulnerabilities:
140+
- CVE-2007-5243
141+
- description: This module exploits a stack buffer overflow in Borland InterBase by
142+
sending a specially crafted create request.
143+
filename: fb_isc_create_database.rb
144+
name: Firebird Relational Database isc_create_database() Buffer Overflow
145+
published: 2007-10-04 03:03:13.000000000 Z
146+
updated: 2020-10-02 16:38:06.000000000 Z
147+
url: https://github.com/risesecurity/exploits/raw/HEAD/fb_isc_create_database.rb
148+
vulnerabilities:
149+
- CVE-2007-5243
150+
- description: This module exploits a stack buffer overflow in Borland InterBase by
151+
sending a specially crafted service attach request.
152+
filename: fb_svc_attach.rb
153+
name: Firebird Relational Database SVC_attach() Buffer Overflow
154+
published: 2007-10-04 03:03:13.000000000 Z
155+
updated: 2020-10-02 16:38:06.000000000 Z
156+
url: https://github.com/risesecurity/exploits/raw/HEAD/fb_svc_attach.rb
157+
vulnerabilities:
158+
- CVE-2007-5243
159+
- description: This module exploits a stack buffer overflow in Borland InterBase by
160+
sending a specially crafted attach request.
161+
filename: ib_isc_attach_database.rb
162+
name: Borland InterBase isc_attach_database() Buffer Overflow
163+
published: 2007-10-04 03:03:13.000000000 Z
164+
updated: 2020-10-02 16:38:06.000000000 Z
165+
url: https://github.com/risesecurity/exploits/raw/HEAD/ib_isc_attach_database.rb
166+
vulnerabilities:
167+
- CVE-2007-5243
168+
- description: This module exploits a stack buffer overflow in Borland InterBase by
169+
sending a specially crafted create request.
170+
filename: ib_isc_create_database.rb
171+
name: Borland InterBase isc_create_database() Buffer Overflow
172+
published: 2007-10-04 03:03:13.000000000 Z
173+
updated: 2020-10-02 16:38:06.000000000 Z
174+
url: https://github.com/risesecurity/exploits/raw/HEAD/ib_isc_create_database.rb
175+
vulnerabilities:
176+
- CVE-2007-5243
177+
- description: This module exploits a stack buffer overflow in Borland InterBase by
178+
sending a specially crafted service attach request.
179+
filename: ib_svc_attach.rb
180+
name: Borland InterBase SVC_attach() Buffer Overflow
181+
published: 2007-10-04 03:03:13.000000000 Z
182+
updated: 2020-10-02 16:38:06.000000000 Z
183+
url: https://github.com/risesecurity/exploits/raw/HEAD/ib_svc_attach.rb
184+
vulnerabilities:
185+
- CVE-2007-5243
186+
- description: This module triggers a heap overflow in the LSA RPC service of the
187+
Samba daemon. This module uses the TALLOC chunk overwrite method (credit Ramon
188+
and Adriano), which only works with Samba versions 3.0.21-3.0.24. Additionally,
189+
this module will not work when the Samba "log level" parameter is higher than
190+
"2".
191+
filename: lsa_transnames_heap_solaris.rb
192+
name: Samba lsa_io_trans_names Heap Overflow (Solaris)
193+
published: 2007-07-08 04:11:53.000000000 Z
194+
updated: 2020-10-02 16:38:06.000000000 Z
195+
url: https://github.com/risesecurity/exploits/raw/HEAD/lsa_transnames_heap_solaris.rb
196+
vulnerabilities:
197+
- CVE-2007-2446
198+
- description: This module triggers a heap overflow in the LSA RPC service of the
199+
Samba daemon. This module uses the szone_free() to overwrite the size() or free()
200+
pointer in initial_malloc_zones structure.
201+
filename: lsa_transnames_heap_osx.rb
202+
name: Samba lsa_io_trans_names Heap Overflow (OSX)
203+
published: 2007-07-05 01:41:39.000000000 Z
204+
updated: 2020-10-02 16:38:06.000000000 Z
205+
url: https://github.com/risesecurity/exploits/raw/HEAD/lsa_transnames_heap_osx.rb
206+
vulnerabilities:
207+
- CVE-2007-2446
208+
- description: Buffer overflow in the Strcmp function in the XKEYBOARD extension in
209+
X Window System X11R6.4 and earlier, as used in SCO UnixWare 7.1.3 and Sun Solaris
210+
8 through 10, allows local users to gain privileges via a long _XKB_CHARSET environment
211+
variable value.
212+
filename: sco-x86-xkb.c
213+
name: X11R6 XKEYBOARD Extension Strcmp() Stack-based Buffer Overflow Exploit for
214+
SCO UnixWare 7.1.3 x86
215+
published: 2006-09-07 00:00:00.000000000 Z
216+
updated:
217+
url: https://github.com/risesecurity/exploits/raw/HEAD/sco-x86-xkb.c
218+
vulnerabilities:
219+
- CVE-2006-4655
220+
- description: Buffer overflow in the Strcmp function in the XKEYBOARD extension in
221+
X Window System X11R6.4 and earlier, as used in SCO UnixWare 7.1.3 and Sun Solaris
222+
8 through 10, allows local users to gain privileges via a long _XKB_CHARSET environment
223+
variable value.
224+
filename: sol-sparc-xkb.c
225+
name: X11R6 XKEYBOARD Extension Strcmp() Stack-based Buffer Overflow Exploit for
226+
Solaris 8 9 10 SPARC
227+
published: 2006-09-07 00:00:00.000000000 Z
228+
updated:
229+
url: https://github.com/risesecurity/exploits/raw/HEAD/sol-sparc-xkb.c
230+
vulnerabilities:
231+
- CVE-2006-4655
232+
- description: Buffer overflow in the Strcmp function in the XKEYBOARD extension in
233+
X Window System X11R6.4 and earlier, as used in SCO UnixWare 7.1.3 and Sun Solaris
234+
8 through 10, allows local users to gain privileges via a long _XKB_CHARSET environment
235+
variable value.
236+
filename: sol-x86-xkb.c
237+
name: X11R6 XKEYBOARD Extension Strcmp() Stack-based Buffer Overflow Exploit for
238+
Solaris 8 9 10 x86
239+
published: 2006-09-07 00:00:00.000000000 Z
240+
updated:
241+
url: https://github.com/risesecurity/exploits/raw/HEAD/sol-x86-xkb.c
242+
vulnerabilities:
243+
- CVE-2006-4655

0 commit comments

Comments
 (0)