ysanatomic / io_uring_LPE-CVE-2024-0582Links
LPE exploit for CVE-2024-0582 (io_uring)
☆101Updated last year
Alternatives and similar repositories for io_uring_LPE-CVE-2024-0582
Users that are interested in io_uring_LPE-CVE-2024-0582 are comparing it to the libraries listed below
Sorting:
- LPE PoC of a vulnerability in the io_uring subsystem of the Linux Kernel.☆92Updated last year
- Proof of concept code for CVE-2023-2008☆40Updated 2 years ago
- Exploit for CVE-2025-21756 for Linux kernel 6.6.75. My first linux kernel exploit!☆152Updated 5 months ago
- ☆64Updated 2 years ago
- POC of CVE-2023-35086 only DoS☆44Updated 2 years ago
- This repository contains PoC for CVE-2024-7965. This is the vulnerability in the V8 that occurs only within ARM64.☆49Updated last year
- ☆81Updated last year
- ☆37Updated last year
- CVE-2022-2602☆87Updated 2 years ago
- ☆70Updated 2 years ago
- Exploit app for CVE-2022-20494, a high severity permanent denial-of-service vulnerability that leverages Android's DND (Do not disturb) f…☆26Updated 2 years ago
- pocs & exploit for CVE-2023-24871 (rce + lpe)☆50Updated last year
- Tools to bypass flawed SELinux policies using the init_module system call☆59Updated last year
- ☆86Updated 2 years ago
- A in-the-wild V8 type confusion bug.☆28Updated 3 months ago
- ☆214Updated last year
- Pwn2Own Vancouver 2023 Ubuntu LPE exploit☆165Updated 2 years ago
- A Pwn2Own 2024 SpiderMonkey JIT Bug: From Integer Range Inconsistency to Bound Check Elimination then RCE☆93Updated 9 months ago
- Linux kernel LPE practice with an NPD vulnerability☆37Updated 2 years ago
- ☆73Updated last year
- ☆84Updated 2 months ago
- Exploit for stack-based buffer overflow found in the conn-indicator binary in the TP-Link Archer AX50 router☆28Updated 3 weeks ago
- Oracle VirtualBox Elevation of Privilege (Local Privilege Escalation) Vulnerability☆221Updated last year
- ☆60Updated last year
- CVE-2024-11477 7Zip Code Execution Writeup and Analysis☆65Updated 11 months ago
- Linux Bluetooth - Run arbitrary management commands as an unprivileged user☆85Updated 2 years ago
- A vulnerability within Microsoft Office's wwlib allows attackers to achieve remote code execution with the privileges of the victim that …☆59Updated 3 weeks ago
- ☆37Updated last year
- ☆36Updated 6 months ago
- ☆23Updated last year