This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
## | |
# This module requires Metasploit: http://metasploit.com/download | |
# Current source: https://github.com/rapid7/metasploit-framework | |
## | |
require 'msf/core' | |
class MetasploitModule < Msf::Exploit::Remote | |
Rank = ExcellentRanking |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
/* | |
* IP6_EXTHDR_CHECK Double Free (CVE-2020-9892) Exploit PoC for FreeBSD 9.0 | |
* https://github.com/google/security-research/security/advisories/GHSA-gxcr-cw4q-9q78 | |
* - | |
* Bug credit: Andy Nguyen (@theflow0) | |
* Exploit credit: @SpecterDev, @tihmstar | |
* Thanks: @sleirsgoevy, @littlelailo, flatz (@flat_z), @balika011 | |
* - | |
* Build: gcc -o expl ip6_expl_poc.c -pthread | |
* - |