https://github.com/secwiki/macos-kernel-exploits
macos-kernel-exploits MacOS平台提权漏洞集合 https://www.sec-wiki.com
https://github.com/secwiki/macos-kernel-exploits
Last synced: about 1 month ago
JSON representation
macos-kernel-exploits MacOS平台提权漏洞集合 https://www.sec-wiki.com
- Host: GitHub
- URL: https://github.com/secwiki/macos-kernel-exploits
- Owner: SecWiki
- Created: 2017-12-02T03:25:03.000Z (about 8 years ago)
- Default Branch: master
- Last Pushed: 2018-01-07T14:09:18.000Z (about 8 years ago)
- Last Synced: 2025-01-13T15:17:19.653Z (12 months ago)
- Size: 3.91 KB
- Stars: 117
- Watchers: 15
- Forks: 52
- Open Issues: 0
-
Metadata Files:
- Readme: readme.md
Awesome Lists containing this project
README
# macos-kernel-exploits
本仓库维护目前已公开的 macos 提权漏洞,欢迎大家一起来维护这个仓库
## 已验证漏洞列表
* [CVE-2015-3760 - DYLD\_PRINT\_TO\_FILE 特性本地提权](CVE-2015-3760/readme.md)
* [CVE-2017-13872 - root 账号空口令提权漏洞](CVE-2017-13872/readme.md)
## 其他漏洞
以下漏洞还未测试验证
* [IOHIDeous - a macOS-only vulnerability in IOHIDFamily](https://github.com/Siguza/IOHIDeous/)
* [iOS/MacOS kernel double free due to IOSurfaceRootUserClient not respecting MIG ownership rules](https://bugs.chromium.org/p/project-zero/issues/detail?id=1417#c3)
* [Apple macOS/IOS 10.12.2(16C67) mach_msg Heap Overflow](https://cxsecurity.com/issue/WLB-2017030254)
* [System Integrity Protection (SIP) bypass for OSX 10.11.1 - 10.11.2 - 10.11.3](https://github.com/jndok/stfusip)
* [Exploit code for CVE-2016-1757](https://github.com/gdbinit/mach_race)
* [Exploiting rootpipe again](https://truesecdev.wordpress.com/2015/07/01/exploiting-rootpipe-again/)