{"vulnerability": "CVE-2023-2598", "sightings": [{"uuid": "56775fd6-2ae8-4b85-929e-6d8e7c774b5d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-25988", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113646282863836221", "content": "", "creation_timestamp": "2024-12-13T15:44:20.536103Z"}, {"uuid": "540368c8-5d38-4275-aa4a-077266b44937", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-2598", "type": "published-proof-of-concept", "source": "https://t.me/cKure/13159", "content": "\u25a0\u25a0\u25a0\u25a0\u25a1 Conquering the memory through io_uring - Analysis of CVE-2023-2598.\n\nhttps://anatomic.rip/cve-2023-2598/", "creation_timestamp": "2024-06-16T21:42:26.000000Z"}, {"uuid": "6c042332-868c-4a0d-b9f5-baef8c5a25e9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-2598", "type": "published-proof-of-concept", "source": "Telegram/9j-Ad_XyFvci-JFaP4-sJIShKWWalZfoinQ91Q3YdjSga9M", "content": "", "creation_timestamp": "2025-07-23T15:00:06.000000Z"}, {"uuid": "b4b7e94d-9155-4c7f-930e-5d6f86948b0b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-2598", "type": "published-proof-of-concept", "source": "Telegram/Ns295Xx0Xp8KaiaZ06G73Mj8cXFKczW4UsqP7II1El4numc", "content": "", "creation_timestamp": "2025-11-16T15:00:07.000000Z"}, {"uuid": "5ab1ec7b-0a51-4897-89ff-6c8bd1af1c4d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-2598", "type": "published-proof-of-concept", "source": "Telegram/r09UVlp9iCncG8QG_Cynf7zKLBNr7XnqQuQC0vaNWgCh8A", "content": "", "creation_timestamp": "2023-11-19T16:26:21.000000Z"}, {"uuid": "a73f0297-d22d-4012-909f-a5088fe47e70", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-2598", "type": "published-proof-of-concept", "source": "https://t.me/linkersec/235", "content": "Conquering the memory through io_uring - Analysis of CVE-2023-2598\n\nAn article by Yordan Stoychev about exploiting a logical bug in the io_uring subsystem. The bug leads to the out-of-bounds read/write access to the physical memory.\n\nIn the shared exploit, the author leaked and corrupted a sock structure to bypass KASLR and spawn a root shell via call_usermodehelper.", "creation_timestamp": "2023-11-22T14:55:29.000000Z"}, {"uuid": "15fa648e-5f05-4536-9c12-844a78078fc6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-25986", "type": "seen", "source": "https://t.me/ctinow/156962", "content": "https://ift.tt/3R1rc4b\nCVE-2023-25986", "creation_timestamp": "2023-12-20T13:48:38.000000Z"}, {"uuid": "373648d1-b4b8-44ae-a54d-120edc035c08", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-2598", "type": "published-proof-of-concept", "source": "Telegram/gYgaowjZlX52uLpvqeNT1UOLovLDMBIDP0cCqal94z9G8w", "content": "", "creation_timestamp": "2023-11-19T15:41:51.000000Z"}, {"uuid": "7e84b2e5-6456-48ac-849b-4ef0a4a9c7aa", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-2598", "type": "seen", "source": "https://t.me/arpsyndicate/666", "content": "#ExploitObserverAlert\n\nCVE-2023-2598\n\nDESCRIPTION: Exploit Observer has 3 entries related to CVE-2023-2598. A flaw was found in the fixed buffer registration code for io_uring (io_sqe_buffer_register in io_uring/rsrc.c) in the Linux kernel that allows out-of-bounds access to physical memory beyond the end of the buffer. This flaw enables full local privilege escalation.\n\nFIRST-EPSS: 0.000420000\nNVD-IS: 5.9\nNVD-ES: 1.8", "creation_timestamp": "2023-11-28T15:32:28.000000Z"}, {"uuid": "b4b2031e-f2af-40c3-ab57-9b257ee888f0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-25983", "type": "seen", "source": "Telegram/YVJAHWmnzYmho8qX-7BWrFwaJJvWKdKK3x-erjZIPZCvhoyR", "content": "", "creation_timestamp": "2025-02-14T10:01:39.000000Z"}, {"uuid": "98281b26-98a7-4100-88ae-38dc563193ab", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-2598", "type": "published-proof-of-concept", "source": "Telegram/-wrg3ROnE_pSPANwuOf1CgTv64SO12OlSCT0cKdk32jrOkw", "content": "", "creation_timestamp": "2024-08-30T22:07:59.000000Z"}, {"uuid": "464b2ce2-3a57-40d1-ae05-f02b70894f7d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-2598", "type": "published-proof-of-concept", "source": "https://t.me/CyberDilara/177", "content": "Tools - Hackers Factory\n\nDiscover creepyCrawler! This tool extracts recon info from any URL, including emails, subdomains, social media, and more. Enhance your recon process effortlessly!\n\ngithub.com/chm0dx\n\nKeyfinder\ud83d\udd11 is a tool that let you find keys while surfing the web! \n\nhttps://github.com/momenbasel/keyFinder\n\nBurp plugin able to find reflected XSS on page in real-time while browsing on site\n\nhttps://github.com/elkokc/reflector\n\nCloudflare XSS\u00a0 bypass :\n\"&gt;%20//\n\nhttps://github.com/Edr4/XSS-Bypass-Filters\n\nAndroid 14 kernel exploit for Pixel7/8 Pro\n\nhttps://github.com/0x36/Pixel_GPU_Exploit\n\nA file server that supports static serving, uploading, searching, accessing control, webdav... \n\nhttps://github.com/sigoden/dufs\n\nTIkTokDownloader \u5b8c\u5168\u514d\u8d39\u5f00\u6e90\uff0c\u57fa\u4e8e AIOHTTP \u6a21\u5757\u5b9e\u73b0\uff1aTikTok \u4e3b\u9875/\u89c6\u9891/\u56fe\u96c6/\u539f\u58f0\uff1b\u6296\u97f3\u4e3b\u9875/\u89c6\u9891/\u56fe\u96c6/\u6536\u85cf/\u76f4\u64ad/\u539f\u58f0/\u5408\u96c6/\u8bc4\u8bba/\u8d26\u53f7/\u641c\u7d22/\u70ed\u699c\u6570\u636e\u91c7\u96c6\u5de5\u5177 \n\nhttps://github.com/JoeanAmier/TikTokDownloader\n\nPermiso Security has created a tool to query snowflake environments for evidence of compromise, based on indicators from Permiso and the community. \n\nhttps://github.com/Permiso-io-tools/YetiHunter\n\nCollection of browser challenges \n\nhttps://github.com/exd0tpy/CTF-browser-challenges\n\nLPE PoC of a vulnerability in the io_uring subsystem of the Linux Kernel. \n\nExploiting a Linux kernel io_uring out-of-bounds access to physical memory (CVE-2023-2598)\n\nWrite up: anatomic.rip/cve-2023-2598/\n\nhttps://github.com/ysanatomic/io_uring_LPE-CVE-2023-2598?tab=readme-ov-file\n\nDDOS Tool\n\nhttps://github.com/YeRobinHood54/R_DDOS\n\n#HackersFactory", "creation_timestamp": "2024-06-17T14:12:26.000000Z"}, {"uuid": "a9d81c47-58ff-4eec-b48f-70c32b085756", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-2598", "type": "published-proof-of-concept", "source": "https://t.me/GrayHatsHack/7975", "content": "Tools - Hackers Factory\n\nDiscover creepyCrawler! This tool extracts recon info from any URL, including emails, subdomains, social media, and more. Enhance your recon process effortlessly!\n\ngithub.com/chm0dx\n\nKeyfinder\ud83d\udd11 is a tool that let you find keys while surfing the web! \n\nhttps://github.com/momenbasel/keyFinder\n\nBurp plugin able to find reflected XSS on page in real-time while browsing on site\n\nhttps://github.com/elkokc/reflector\n\nCloudflare XSS\u00a0 bypass :\n\"&gt;%20//\n\nhttps://github.com/Edr4/XSS-Bypass-Filters\n\nAndroid 14 kernel exploit for Pixel7/8 Pro\n\nhttps://github.com/0x36/Pixel_GPU_Exploit\n\nA file server that supports static serving, uploading, searching, accessing control, webdav... \n\nhttps://github.com/sigoden/dufs\n\nTIkTokDownloader \u5b8c\u5168\u514d\u8d39\u5f00\u6e90\uff0c\u57fa\u4e8e AIOHTTP \u6a21\u5757\u5b9e\u73b0\uff1aTikTok \u4e3b\u9875/\u89c6\u9891/\u56fe\u96c6/\u539f\u58f0\uff1b\u6296\u97f3\u4e3b\u9875/\u89c6\u9891/\u56fe\u96c6/\u6536\u85cf/\u76f4\u64ad/\u539f\u58f0/\u5408\u96c6/\u8bc4\u8bba/\u8d26\u53f7/\u641c\u7d22/\u70ed\u699c\u6570\u636e\u91c7\u96c6\u5de5\u5177 \n\nhttps://github.com/JoeanAmier/TikTokDownloader\n\nPermiso Security has created a tool to query snowflake environments for evidence of compromise, based on indicators from Permiso and the community. \n\nhttps://github.com/Permiso-io-tools/YetiHunter\n\nCollection of browser challenges \n\nhttps://github.com/exd0tpy/CTF-browser-challenges\n\nLPE PoC of a vulnerability in the io_uring subsystem of the Linux Kernel. \n\nExploiting a Linux kernel io_uring out-of-bounds access to physical memory (CVE-2023-2598)\n\nWrite up: anatomic.rip/cve-2023-2598/\n\nhttps://github.com/ysanatomic/io_uring_LPE-CVE-2023-2598?tab=readme-ov-file\n\nDDOS Tool\n\nhttps://github.com/YeRobinHood54/R_DDOS\n\n#HackersFactory", "creation_timestamp": "2024-06-16T07:42:54.000000Z"}, {"uuid": "861a0e70-afba-47f6-8884-fc2faab2797e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-2598", "type": "published-proof-of-concept", "source": "https://t.me/WARLOCK_DARK_ARMY_OFFICIALS/3574", "content": "https://github.com/ysanatomic/io_uring_LPE-CVE-2023-2598", "creation_timestamp": "2023-11-19T16:17:30.000000Z"}, {"uuid": "1ba2cf0e-e129-468c-af46-57bacdb4556c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-2598", "type": "published-proof-of-concept", "source": "https://t.me/proxy_bar/1972", "content": "CVE-2024-0582 \n*\nio_uring LPE linux\n*\n\u0415\u0441\u043b\u0438 \u043d\u0443\u0436\u043d\u043e \u043e\u043f\u0438\u0441\u0430\u043d\u0438\u0435, \u0433\u0443\u0433\u043b\u0438\u0442\u0435 \u0438\u0434\u0435\u043d\u0442\u0438\u0447\u043d\u0443\u044e \u0434\u044b\u0440\u043a\u0443 \u0437\u0430 \u043d\u043e\u043c\u0435\u0440\u043e\u043c CVE-2023-2598\n*\n\u041f\u043e\u0434\u0440\u043e\u0431\u043d\u044b\u0439 \u0440\u0430\u0437\u0431\u043e\u0440 cve-2024-0582 \u0438 \u043a\u0430\u043a \u0434\u0435\u043b\u0430\u043b\u0438 \u0441\u043f\u043b\u043e\u0438\u0442 \u0422\u0423\u0422\n\n#linux #lpe #ubuntu", "creation_timestamp": "2024-03-29T20:39:36.000000Z"}, {"uuid": "b0f557b3-3dbb-4737-97a2-91fef6e70681", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-2598", "type": "published-proof-of-concept", "source": "https://t.me/dilagrafie/3284", "content": "Tools - Hackers Factory\n\nDiscover creepyCrawler! This tool extracts recon info from any URL, including emails, subdomains, social media, and more. Enhance your recon process effortlessly!\n\ngithub.com/chm0dx\n\nKeyfinder\ud83d\udd11 is a tool that let you find keys while surfing the web! \n\nhttps://github.com/momenbasel/keyFinder\n\nBurp plugin able to find reflected XSS on page in real-time while browsing on site\n\nhttps://github.com/elkokc/reflector\n\nCloudflare XSS\u00a0 bypass :\n\"&gt;%20//\n\nhttps://github.com/Edr4/XSS-Bypass-Filters\n\nAndroid 14 kernel exploit for Pixel7/8 Pro\n\nhttps://github.com/0x36/Pixel_GPU_Exploit\n\nA file server that supports static serving, uploading, searching, accessing control, webdav... \n\nhttps://github.com/sigoden/dufs\n\nTIkTokDownloader \u5b8c\u5168\u514d\u8d39\u5f00\u6e90\uff0c\u57fa\u4e8e AIOHTTP \u6a21\u5757\u5b9e\u73b0\uff1aTikTok \u4e3b\u9875/\u89c6\u9891/\u56fe\u96c6/\u539f\u58f0\uff1b\u6296\u97f3\u4e3b\u9875/\u89c6\u9891/\u56fe\u96c6/\u6536\u85cf/\u76f4\u64ad/\u539f\u58f0/\u5408\u96c6/\u8bc4\u8bba/\u8d26\u53f7/\u641c\u7d22/\u70ed\u699c\u6570\u636e\u91c7\u96c6\u5de5\u5177 \n\nhttps://github.com/JoeanAmier/TikTokDownloader\n\nPermiso Security has created a tool to query snowflake environments for evidence of compromise, based on indicators from Permiso and the community. \n\nhttps://github.com/Permiso-io-tools/YetiHunter\n\nCollection of browser challenges \n\nhttps://github.com/exd0tpy/CTF-browser-challenges\n\nLPE PoC of a vulnerability in the io_uring subsystem of the Linux Kernel. \n\nExploiting a Linux kernel io_uring out-of-bounds access to physical memory (CVE-2023-2598)\n\nWrite up: anatomic.rip/cve-2023-2598/\n\nhttps://github.com/ysanatomic/io_uring_LPE-CVE-2023-2598?tab=readme-ov-file\n\nDDOS Tool\n\nhttps://github.com/YeRobinHood54/R_DDOS\n\n#HackersFactory", "creation_timestamp": "2024-06-16T21:43:22.000000Z"}, {"uuid": "7ef95f24-b440-4568-8272-7fe690ca9e3b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-2598", "type": "published-proof-of-concept", "source": "https://t.me/GrayHatsHack/6742", "content": "Tools - Hackers Factory\n\nDiscover creepyCrawler! This tool extracts recon info from any URL, including emails, subdomains, social media, and more. Enhance your recon process effortlessly!\n\ngithub.com/chm0dx\n\nKeyfinder\ud83d\udd11 is a tool that let you find keys while surfing the web! \n\nhttps://github.com/momenbasel/keyFinder\n\nBurp plugin able to find reflected XSS on page in real-time while browsing on site\n\nhttps://github.com/elkokc/reflector\n\nCloudflare XSS\u00a0 bypass :\n\"&gt;%20//\n\nhttps://github.com/Edr4/XSS-Bypass-Filters\n\nAndroid 14 kernel exploit for Pixel7/8 Pro\n\nhttps://github.com/0x36/Pixel_GPU_Exploit\n\nA file server that supports static serving, uploading, searching, accessing control, webdav... \n\nhttps://github.com/sigoden/dufs\n\nTIkTokDownloader \u5b8c\u5168\u514d\u8d39\u5f00\u6e90\uff0c\u57fa\u4e8e AIOHTTP \u6a21\u5757\u5b9e\u73b0\uff1aTikTok \u4e3b\u9875/\u89c6\u9891/\u56fe\u96c6/\u539f\u58f0\uff1b\u6296\u97f3\u4e3b\u9875/\u89c6\u9891/\u56fe\u96c6/\u6536\u85cf/\u76f4\u64ad/\u539f\u58f0/\u5408\u96c6/\u8bc4\u8bba/\u8d26\u53f7/\u641c\u7d22/\u70ed\u699c\u6570\u636e\u91c7\u96c6\u5de5\u5177 \n\nhttps://github.com/JoeanAmier/TikTokDownloader\n\nPermiso Security has created a tool to query snowflake environments for evidence of compromise, based on indicators from Permiso and the community. \n\nhttps://github.com/Permiso-io-tools/YetiHunter\n\nCollection of browser challenges \n\nhttps://github.com/exd0tpy/CTF-browser-challenges\n\nLPE PoC of a vulnerability in the io_uring subsystem of the Linux Kernel. \n\nExploiting a Linux kernel io_uring out-of-bounds access to physical memory (CVE-2023-2598)\n\nWrite up: anatomic.rip/cve-2023-2598/\n\nhttps://github.com/ysanatomic/io_uring_LPE-CVE-2023-2598?tab=readme-ov-file\n\nDDOS Tool\n\nhttps://github.com/YeRobinHood54/R_DDOS\n\n#HackersFactory", "creation_timestamp": "2024-06-16T07:42:54.000000Z"}, {"uuid": "f312ef86-9c56-4287-b586-24026adfe81d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-25981", "type": "seen", "source": "https://t.me/cibsecurity/69188", "content": "\u203c CVE-2023-25981 \u203c\n\nAuth. (contributor+) Stored Cross-Site Scripting (XSS) vulnerability in ThemeKraft Post Form plugin &lt;=\u00c2\u00a02.8.1 versions.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-08-25T14:14:04.000000Z"}, {"uuid": "db20608f-9c3a-46cb-9c12-8ff559bc84e9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-25980", "type": "seen", "source": "https://t.me/cibsecurity/71557", "content": "\u203c CVE-2023-25980 \u203c\n\nCross-Site Request Forgery (CSRF) vulnerability in CAGE Web Design | Rolf van Gelder Optimize Database after Deleting Revisions plugin &lt;=\u00c2\u00a05.1 versions.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-10-04T14:11:55.000000Z"}, {"uuid": "1b3bce88-4306-4559-af3d-88b7e742fe88", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-25989", "type": "seen", "source": "https://t.me/cibsecurity/71487", "content": "\u203c CVE-2023-25989 \u203c\n\nCross-Site Request Forgery (CSRF) vulnerability in Meks Video Importer, Meks Time Ago, Meks ThemeForest Smart Widget, Meks Smart Author Widget, Meks Audio Player, Meks Easy Maps, Meks Easy Photo Feed Widget, Meks Simple Flickr Widget, Meks Easy Ads Widget, Meks Smart Social Widget plugins leading to\u00c2\u00a0dismiss or the popup.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-10-03T16:41:11.000000Z"}, {"uuid": "5bc94a66-6331-4476-b721-df3bbb042a61", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-25984", "type": "seen", "source": "https://t.me/cibsecurity/67978", "content": "\u203c CVE-2023-25984 \u203c\n\nAuth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in Rigorous &amp; Factory Pattern Dovetail plugin &lt;=\u00c2\u00a01.2.13 versions.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-08-08T16:14:12.000000Z"}, {"uuid": "fd5b700b-3d1d-4fee-8d79-a22cf2fb663d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-25982", "type": "seen", "source": "https://t.me/cibsecurity/63335", "content": "\u203c CVE-2023-25982 \u203c\n\nAuth. (contributor+) Stored Cross-Site Scripting (XSS) vulnerability in Eirudo Simple YouTube Responsive plugin &lt;=\u00c2\u00a02.5 versions.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-05-05T00:37:27.000000Z"}, {"uuid": "f8c421d1-9566-4c67-9beb-66b48c9ca7d2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-2598", "type": "published-proof-of-concept", "source": "https://t.me/Rootsec_2/1720", "content": "#exploit\n1. CVE-2023-2598:\nio_uring LPE\nhttps://github.com/ysanatomic/io_uring_LPE-CVE-2023-2598\n\n2. CVE-2023-47246:\nSysAid Server &lt;23.3.36 RCE\nhttps://github.com/W01fh4cker/CVE-2023-47246-EXP", "creation_timestamp": "2024-08-16T08:45:55.000000Z"}, {"uuid": "80863544-4162-4ec8-b3e4-919f41447a47", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-2598", "type": "published-proof-of-concept", "source": "https://t.me/GhostClanInt/25067", "content": "Tools - Hackers Factory\n\nDiscover creepyCrawler! This tool extracts recon info from any URL, including emails, subdomains, social media, and more. Enhance your recon process effortlessly!\n\ngithub.com/chm0dx\n\nKeyfinder\ud83d\udd11 is a tool that let you find keys while surfing the web! \n\nhttps://github.com/momenbasel/keyFinder\n\nBurp plugin able to find reflected XSS on page in real-time while browsing on site\n\nhttps://github.com/elkokc/reflector\n\nCloudflare XSS\u00a0 bypass :\n\"&gt;%20//\n\nhttps://github.com/Edr4/XSS-Bypass-Filters\n\nAndroid 14 kernel exploit for Pixel7/8 Pro\n\nhttps://github.com/0x36/Pixel_GPU_Exploit\n\nA file server that supports static serving, uploading, searching, accessing control, webdav... \n\nhttps://github.com/sigoden/dufs\n\nTIkTokDownloader \u5b8c\u5168\u514d\u8d39\u5f00\u6e90\uff0c\u57fa\u4e8e AIOHTTP \u6a21\u5757\u5b9e\u73b0\uff1aTikTok \u4e3b\u9875/\u89c6\u9891/\u56fe\u96c6/\u539f\u58f0\uff1b\u6296\u97f3\u4e3b\u9875/\u89c6\u9891/\u56fe\u96c6/\u6536\u85cf/\u76f4\u64ad/\u539f\u58f0/\u5408\u96c6/\u8bc4\u8bba/\u8d26\u53f7/\u641c\u7d22/\u70ed\u699c\u6570\u636e\u91c7\u96c6\u5de5\u5177 \n\nhttps://github.com/JoeanAmier/TikTokDownloader\n\nPermiso Security has created a tool to query snowflake environments for evidence of compromise, based on indicators from Permiso and the community. \n\nhttps://github.com/Permiso-io-tools/YetiHunter\n\nCollection of browser challenges \n\nhttps://github.com/exd0tpy/CTF-browser-challenges\n\nLPE PoC of a vulnerability in the io_uring subsystem of the Linux Kernel. \n\nExploiting a Linux kernel io_uring out-of-bounds access to physical memory (CVE-2023-2598)\n\nWrite up: anatomic.rip/cve-2023-2598/\n\nhttps://github.com/ysanatomic/io_uring_LPE-CVE-2023-2598?tab=readme-ov-file\n\nDDOS Tool\n\nhttps://github.com/YeRobinHood54/R_DDOS\n\n#HackersFactory", "creation_timestamp": "2024-06-16T07:42:42.000000Z"}, {"uuid": "cd43e66f-6855-456e-9b90-9cf48dcc2594", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-2598", "type": "published-proof-of-concept", "source": "https://t.me/CNArsenal/1545", "content": "https://github.com/ysanatomic/io_uring_LPE-CVE-2023-2598\n\n#github #poc", "creation_timestamp": "2023-11-19T14:01:47.000000Z"}, {"uuid": "8e12d8c1-7d21-42f3-a40f-1b65ecbb1884", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-2598", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/9423", "content": "#exploit\n1. CVE-2023-2598:\nio_uring LPE\nhttps://github.com/ysanatomic/io_uring_LPE-CVE-2023-2598\n\n2. CVE-2023-47246:\nSysAid Server &lt;23.3.36 RCE\nhttps://github.com/W01fh4cker/CVE-2023-47246-EXP", "creation_timestamp": "2023-11-19T13:23:12.000000Z"}, {"uuid": "c1f18584-8270-4f65-9211-2ad312bd039f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-2598", "type": "published-proof-of-concept", "source": "https://t.me/Rootsec_2/1752", "content": "#exploit\n1. CVE-2023-2598:\nio_uring LPE\nhttps://github.com/ysanatomic/io_uring_LPE-CVE-2023-2598\n\n2. CVE-2023-47246:\nSysAid Server &lt;23.3.36 RCE\nhttps://github.com/W01fh4cker/CVE-2023-47246-EXP", "creation_timestamp": "2024-08-16T08:46:02.000000Z"}]}