The Stack Clash - CVE-2017-1000364
Details: https://www.qualys.com/2017/06/19/stack-clash/stack-clash.txt
Exploits:
- solaris: https://www.qualys.com/2017/06/19/stack-clash/solaris_rsh.c
- obenbsd: https://www.qualys.com/2017/06/19/stack-clash/openbsd_at.c
- netbsd: https://www.qualys.com/2017/06/19/stack-clash/netbsd_cve-2017-1000375.c
- freebsd: https://www.qualys.com/2017/06/19/stack-clash/freebsd_cve-2017-fgpu.c
- freebsd: https://www.qualys.com/2017/06/19/stack-clash/freebsd_cve-2017-fgpe.c
- https://www.qualys.com/2017/06/19/stack-clash/freebsd_cve-2017-1085.c
Sudo's get_process_ttyname() CVE-2017-1000367
Details: https://www.qualys.com/2017/05/30/cve-2017-1000367/cve-2017-1000367.txt
Exploit: https://www.qualys.com/2017/05/30/cve-2017-1000367/linux_sudo_cve-2017-1000367.c
Linux Kernel 4.8.0-41-generic (Ubuntu) - Packet Socket Local Privilege Escalation
Details: https://googleprojectzero.blogspot.com/2017/05/exploiting-linux-kernel-via-packet.html
Exploit: https://www.exploit-db.com/exploits/41994/
Linux Kernel 4.8.0 udev 232 - Privilege Escalation CVE-2017-7874
Details: https://www.exploit-db.com/exploits/41886/
Exploit: https://www.exploit-db.com/exploits/41886/
Linux Kernel 3.11 < 4.8 0 - 'SO_SNDBUFFORCE' & 'SO_RCVBUFFORCE'
Details: https://github.com/xairy/kernel-exploits/tree/master/CVE-2016-9793
Exploit: https://www.exploit-db.com/exploits/41995/
Dirty C0W CVE-2016-5195
Details: http://securityaffairs.co/wordpress/52521/hacking/dirty-cow-exploit.html
Exploit: https://github.com/dirtycow/dirtycow.github.io/raw/master/dirtyc0w.c