Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
awesome-bugs
A collection of software bug types and articles showcasing the hunt for and exploitation of them.
https://github.com/HackOvert/awesome-bugs
Last synced: 4 days ago
JSON representation
-
Type Confusion
- Exploiting CVE-2019-17026 - A Firefox JIT Bug
- CWE-843
- Ghostscript type confusion: Using variant analysis to find vulnerabilities
- Exploiting a Webroot Type Confusion Bug
- One Perfect Bug: Exploiting Type Confusion in Flash
- CVE-2018-12794: Using Type Confusion to Get Code Execution in Adobe Reader
- Understanding type confusion vulnerabilities: CVE-2015-0336
- Attacking Interoperability
- Java Buffer Overflow with ByteBuffer (CVE-2020-2803) and Mutable MethodType (CVE-2020-2805) Sandbox Escapes
- When GC Triggers Callback
-
Command Injection
- CWE-78
- CVE-2018-8460: Exposing a double free in Internet Explorer for code execution - ([YouTube version](https://www.youtube.com/watch?v=zjafMP7EgEA)) |
- Analysis & Exploitation of a Recent TP-Link Archer A7 Vulnerability
- Exploiting CVE-2018-1335: Command Injection in Apache Tika
- Show Mi The Vulns: Exploiting Command Injection in Mi Router 3
- Show Mi The Vulns: Exploiting Command Injection in Mi Router 3
- Show Mi The Vulns: Exploiting Command Injection in Mi Router 3
- Show Mi The Vulns: Exploiting Command Injection in Mi Router 3
- Show Mi The Vulns: Exploiting Command Injection in Mi Router 3
- Show Mi The Vulns: Exploiting Command Injection in Mi Router 3
- Show Mi The Vulns: Exploiting Command Injection in Mi Router 3
- Show Mi The Vulns: Exploiting Command Injection in Mi Router 3
- Show Mi The Vulns: Exploiting Command Injection in Mi Router 3
- Show Mi The Vulns: Exploiting Command Injection in Mi Router 3
- Show Mi The Vulns: Exploiting Command Injection in Mi Router 3
- Show Mi The Vulns: Exploiting Command Injection in Mi Router 3
- Show Mi The Vulns: Exploiting Command Injection in Mi Router 3
- Show Mi The Vulns: Exploiting Command Injection in Mi Router 3
- Show Mi The Vulns: Exploiting Command Injection in Mi Router 3
- Show Mi The Vulns: Exploiting Command Injection in Mi Router 3
- Show Mi The Vulns: Exploiting Command Injection in Mi Router 3
- Show Mi The Vulns: Exploiting Command Injection in Mi Router 3
- Show Mi The Vulns: Exploiting Command Injection in Mi Router 3
- Show Mi The Vulns: Exploiting Command Injection in Mi Router 3
- Show Mi The Vulns: Exploiting Command Injection in Mi Router 3
- Show Mi The Vulns: Exploiting Command Injection in Mi Router 3
- Show Mi The Vulns: Exploiting Command Injection in Mi Router 3
- Show Mi The Vulns: Exploiting Command Injection in Mi Router 3
- Show Mi The Vulns: Exploiting Command Injection in Mi Router 3
- Show Mi The Vulns: Exploiting Command Injection in Mi Router 3
- Show Mi The Vulns: Exploiting Command Injection in Mi Router 3
- Show Mi The Vulns: Exploiting Command Injection in Mi Router 3
- Show Mi The Vulns: Exploiting Command Injection in Mi Router 3
- Show Mi The Vulns: Exploiting Command Injection in Mi Router 3
- Show Mi The Vulns: Exploiting Command Injection in Mi Router 3
- Show Mi The Vulns: Exploiting Command Injection in Mi Router 3
- Show Mi The Vulns: Exploiting Command Injection in Mi Router 3
- Show Mi The Vulns: Exploiting Command Injection in Mi Router 3
- Show Mi The Vulns: Exploiting Command Injection in Mi Router 3
- Show Mi The Vulns: Exploiting Command Injection in Mi Router 3
- Show Mi The Vulns: Exploiting Command Injection in Mi Router 3
- Show Mi The Vulns: Exploiting Command Injection in Mi Router 3
- Show Mi The Vulns: Exploiting Command Injection in Mi Router 3
- Show Mi The Vulns: Exploiting Command Injection in Mi Router 3
- Show Mi The Vulns: Exploiting Command Injection in Mi Router 3
- Show Mi The Vulns: Exploiting Command Injection in Mi Router 3
-
Double Free
-
NULL Pointer Dereference
-
Unexpected Sign Extension
-
Use After Free
-
Use of Externally-Controlled Format String
- CWE-134 - Controlled Format String
- Exploit in Skyrim
-
Write-What-Where
- CWE-123 - what-where Condition
- RCE Without Native Code: Exploitation of a Write-What-Where in Internet Explorer
- Internet Explorer CVE-2019–1367 Exploitation — part 2
- Internet Explorer CVE-2019–1367 Exploitation — part 2
- Internet Explorer CVE-2019–1367 Exploitation — part 2
- Internet Explorer CVE-2019–1367 Exploitation — part 2
- Internet Explorer CVE-2019–1367 Exploitation — part 2
- Internet Explorer CVE-2019–1367 Exploitation — part 2
- Internet Explorer CVE-2019–1367 Exploitation — part 2
- Internet Explorer CVE-2019–1367 Exploitation — part 2
- Internet Explorer CVE-2019–1367 Exploitation — part 2
- Internet Explorer CVE-2019–1367 Exploitation — part 2
- Internet Explorer CVE-2019–1367 Exploitation — part 2
- Internet Explorer CVE-2019–1367 Exploitation — part 2
- Internet Explorer CVE-2019–1367 Exploitation — part 2
- Internet Explorer CVE-2019–1367 Exploitation — part 2
- Internet Explorer CVE-2019–1367 Exploitation — part 2
- Internet Explorer CVE-2019–1367 Exploitation — part 2
- Internet Explorer CVE-2019–1367 Exploitation — part 2
- Internet Explorer CVE-2019–1367 Exploitation — part 2
- Internet Explorer CVE-2019–1367 Exploitation — part 2
- Internet Explorer CVE-2019–1367 Exploitation — part 2
- Internet Explorer CVE-2019–1367 Exploitation — part 2
- Internet Explorer CVE-2019–1367 Exploitation — part 2
- Internet Explorer CVE-2019–1367 Exploitation — part 2
- Internet Explorer CVE-2019–1367 Exploitation — part 2
- Internet Explorer CVE-2019–1367 Exploitation — part 2
- Internet Explorer CVE-2019–1367 Exploitation — part 2
- Internet Explorer CVE-2019–1367 Exploitation — part 2
- Internet Explorer CVE-2019–1367 Exploitation — part 2
- Internet Explorer CVE-2019–1367 Exploitation — part 2
- Internet Explorer CVE-2019–1367 Exploitation — part 2
- Internet Explorer CVE-2019–1367 Exploitation — part 2
- Internet Explorer CVE-2019–1367 Exploitation — part 2
- Internet Explorer CVE-2019–1367 Exploitation — part 2
- Internet Explorer CVE-2019–1367 Exploitation — part 2
- Internet Explorer CVE-2019–1367 Exploitation — part 2
- Internet Explorer CVE-2019–1367 Exploitation — part 2
- Internet Explorer CVE-2019–1367 Exploitation — part 2
- Internet Explorer CVE-2019–1367 Exploitation — part 2
- Internet Explorer CVE-2019–1367 Exploitation — part 2
- Internet Explorer CVE-2019–1367 Exploitation — part 2
- Internet Explorer CVE-2019–1367 Exploitation — part 2
- Internet Explorer CVE-2019–1367 Exploitation — part 2
- Internet Explorer CVE-2019–1367 Exploitation — part 2
- Internet Explorer CVE-2019–1367 Exploitation — part 2
- Internet Explorer CVE-2019–1367 Exploitation — part 2
- Internet Explorer CVE-2019–1367 Exploitation — part 2
- Exploiting SMBGhost (CVE-2020-0796) for a Local Privilege Escalation: Writeup + POC
- Internet Explorer CVE-2019–1367 Exploitation — part 2
- Internet Explorer CVE-2019–1367 Exploitation — part 2
- Internet Explorer CVE-2019–1367 Exploitation — part 2
- Internet Explorer CVE-2019–1367 Exploitation — part 2
- Internet Explorer CVE-2019–1367 Exploitation — part 2
- Internet Explorer CVE-2019–1367 Exploitation — part 2
- Internet Explorer CVE-2019–1367 Exploitation — part 2
- Internet Explorer CVE-2019–1367 Exploitation — part 2