2019-12-08 14:19:20 +01:00
[
2022-08-05 02:16:53 +02:00
{
"id" : 209440455 ,
"name" : "CVE-2019-13272" ,
"full_name" : "Huandtx\/CVE-2019-13272" ,
"owner" : {
"login" : "Huandtx" ,
"id" : 44591522 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/44591522?v=4" ,
"html_url" : "https:\/\/github.com\/Huandtx"
} ,
"html_url" : "https:\/\/github.com\/Huandtx\/CVE-2019-13272" ,
"description" : "5.1.17之前的Linux内核中普通用户执行文件提权为root用户" ,
"fork" : false ,
"created_at" : "2019-09-19T01:58:35Z" ,
"updated_at" : "2021-12-05T22:21:24Z" ,
"pushed_at" : "2019-09-19T02:09:28Z" ,
"stargazers_count" : 3 ,
"watchers_count" : 3 ,
"forks_count" : 3 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 3 ,
"watchers" : 3 ,
"score" : 0
} ,
2020-08-06 05:08:30 +02:00
{
"id" : 245129315 ,
"name" : "CVE-2019-13272" ,
"full_name" : "polosec\/CVE-2019-13272" ,
"owner" : {
"login" : "polosec" ,
"id" : 34666152 ,
2021-01-21 16:10:20 +01:00
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/34666152?v=4" ,
2020-08-06 05:08:30 +02:00
"html_url" : "https:\/\/github.com\/polosec"
} ,
"html_url" : "https:\/\/github.com\/polosec\/CVE-2019-13272" ,
"description" : "CVE-2019-13272" ,
"fork" : false ,
"created_at" : "2020-03-05T10:10:19Z" ,
2022-05-13 20:15:27 +02:00
"updated_at" : "2022-05-13T13:02:33Z" ,
2020-08-06 05:08:30 +02:00
"pushed_at" : "2020-03-05T10:16:17Z" ,
2021-12-06 01:13:08 +01:00
"stargazers_count" : 1 ,
"watchers_count" : 1 ,
"forks_count" : 1 ,
2021-09-13 23:12:57 +02:00
"allow_forking" : true ,
2021-10-06 23:13:51 +02:00
"is_template" : false ,
2022-06-28 20:20:29 +02:00
"web_commit_signoff_required" : false ,
2021-10-06 23:13:51 +02:00
"topics" : [ ] ,
2021-10-01 23:13:10 +02:00
"visibility" : "public" ,
2021-12-06 01:13:08 +01:00
"forks" : 1 ,
"watchers" : 1 ,
2020-08-06 05:08:30 +02:00
"score" : 0
} ,
2020-06-21 05:07:51 +02:00
{
"id" : 260622118 ,
"name" : "-Kernel-ptrace-c-mishandles-vulnerability-CVE-2019-13272" ,
"full_name" : "sumedhaDharmasena\/-Kernel-ptrace-c-mishandles-vulnerability-CVE-2019-13272" ,
"owner" : {
"login" : "sumedhaDharmasena" ,
"id" : 43642069 ,
2021-01-21 16:10:20 +01:00
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/43642069?v=4" ,
2020-06-21 05:07:51 +02:00
"html_url" : "https:\/\/github.com\/sumedhaDharmasena"
} ,
"html_url" : "https:\/\/github.com\/sumedhaDharmasena\/-Kernel-ptrace-c-mishandles-vulnerability-CVE-2019-13272" ,
"description" : null ,
"fork" : false ,
"created_at" : "2020-05-02T05:41:54Z" ,
2021-12-06 01:13:08 +01:00
"updated_at" : "2021-12-05T22:21:39Z" ,
2020-06-21 05:07:51 +02:00
"pushed_at" : "2020-05-02T06:05:54Z" ,
2021-12-06 01:13:08 +01:00
"stargazers_count" : 1 ,
"watchers_count" : 1 ,
"forks_count" : 1 ,
2021-09-13 23:12:57 +02:00
"allow_forking" : true ,
2021-10-06 23:13:51 +02:00
"is_template" : false ,
2022-06-28 20:20:29 +02:00
"web_commit_signoff_required" : false ,
2021-10-06 23:13:51 +02:00
"topics" : [ ] ,
2021-10-01 23:13:10 +02:00
"visibility" : "public" ,
2021-12-06 01:13:08 +01:00
"forks" : 1 ,
"watchers" : 1 ,
2020-06-21 05:07:51 +02:00
"score" : 0
} ,
{
"id" : 263022112 ,
"name" : "Exploiting-a-Linux-kernel-vulnerability" ,
"full_name" : "Tharana\/Exploiting-a-Linux-kernel-vulnerability" ,
"owner" : {
"login" : "Tharana" ,
"id" : 31825168 ,
2021-01-21 16:10:20 +01:00
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/31825168?v=4" ,
2020-06-21 05:07:51 +02:00
"html_url" : "https:\/\/github.com\/Tharana"
} ,
"html_url" : "https:\/\/github.com\/Tharana\/Exploiting-a-Linux-kernel-vulnerability" ,
"description" : "Local Root vulnerability- CVE-2019-13272 \/ Security Bypass Vulnerability – CVE-2019-14287" ,
"fork" : false ,
"created_at" : "2020-05-11T11:24:29Z" ,
"updated_at" : "2020-05-11T11:31:32Z" ,
"pushed_at" : "2020-05-11T11:30:54Z" ,
"stargazers_count" : 1 ,
"watchers_count" : 1 ,
"forks_count" : 0 ,
2021-09-13 23:12:57 +02:00
"allow_forking" : true ,
2021-10-06 23:13:51 +02:00
"is_template" : false ,
2022-06-28 20:20:29 +02:00
"web_commit_signoff_required" : false ,
2021-10-06 23:13:51 +02:00
"topics" : [ ] ,
2021-10-01 23:13:10 +02:00
"visibility" : "public" ,
2020-06-21 05:07:51 +02:00
"forks" : 0 ,
"watchers" : 1 ,
"score" : 0
} ,
{
"id" : 263322619 ,
"name" : "Privilege-Escalation-CVE-2019-13272-" ,
"full_name" : "RashmikaEkanayake\/Privilege-Escalation-CVE-2019-13272-" ,
"owner" : {
"login" : "RashmikaEkanayake" ,
"id" : 61092678 ,
2021-01-21 16:10:20 +01:00
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/61092678?v=4" ,
2020-06-21 05:07:51 +02:00
"html_url" : "https:\/\/github.com\/RashmikaEkanayake"
} ,
"html_url" : "https:\/\/github.com\/RashmikaEkanayake\/Privilege-Escalation-CVE-2019-13272-" ,
"description" : null ,
"fork" : false ,
"created_at" : "2020-05-12T11:53:55Z" ,
"updated_at" : "2020-05-12T11:57:58Z" ,
"pushed_at" : "2020-05-12T11:57:56Z" ,
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"forks_count" : 0 ,
2021-09-13 23:12:57 +02:00
"allow_forking" : true ,
2021-10-06 23:13:51 +02:00
"is_template" : false ,
2022-06-28 20:20:29 +02:00
"web_commit_signoff_required" : false ,
2021-10-06 23:13:51 +02:00
"topics" : [ ] ,
2021-10-01 23:13:10 +02:00
"visibility" : "public" ,
2020-06-21 05:07:51 +02:00
"forks" : 0 ,
"watchers" : 0 ,
"score" : 0
} ,
2020-05-12 23:07:33 +02:00
{
"id" : 263412118 ,
"name" : "vulnerability-exploitation" ,
"full_name" : "Tharana\/vulnerability-exploitation" ,
"owner" : {
"login" : "Tharana" ,
"id" : 31825168 ,
2021-01-21 16:10:20 +01:00
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/31825168?v=4" ,
2020-05-12 23:07:33 +02:00
"html_url" : "https:\/\/github.com\/Tharana"
} ,
"html_url" : "https:\/\/github.com\/Tharana\/vulnerability-exploitation" ,
"description" : "Local Root vulnerability- CVE-2019-13272 \/ Security Bypass Vulnerability – CVE-2019-14287\/Google Android - 'Stagefright' Remote Code Execution - CVE-2015-1538" ,
"fork" : false ,
"created_at" : "2020-05-12T17:59:48Z" ,
2021-09-17 17:13:37 +02:00
"updated_at" : "2021-09-17T11:03:25Z" ,
2020-05-12 23:07:33 +02:00
"pushed_at" : "2020-05-12T18:13:11Z" ,
2021-09-17 17:13:37 +02:00
"stargazers_count" : 1 ,
"watchers_count" : 1 ,
2020-07-23 17:13:08 +02:00
"forks_count" : 1 ,
2021-09-13 23:12:57 +02:00
"allow_forking" : true ,
2021-10-06 23:13:51 +02:00
"is_template" : false ,
2022-06-28 20:20:29 +02:00
"web_commit_signoff_required" : false ,
2021-10-06 23:13:51 +02:00
"topics" : [ ] ,
2021-10-01 23:13:10 +02:00
"visibility" : "public" ,
2020-07-23 17:13:08 +02:00
"forks" : 1 ,
2021-09-17 17:13:37 +02:00
"watchers" : 1 ,
2020-05-12 23:07:33 +02:00
"score" : 0
2020-05-13 11:09:18 +02:00
} ,
{
"id" : 263515561 ,
"name" : "CVE-2019-13272---Documentation" ,
"full_name" : "teddy47\/CVE-2019-13272---Documentation" ,
"owner" : {
"login" : "teddy47" ,
"id" : 48222561 ,
2021-01-21 16:10:20 +01:00
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/48222561?v=4" ,
2020-05-13 11:09:18 +02:00
"html_url" : "https:\/\/github.com\/teddy47"
} ,
"html_url" : "https:\/\/github.com\/teddy47\/CVE-2019-13272---Documentation" ,
"description" : null ,
"fork" : false ,
"created_at" : "2020-05-13T03:28:45Z" ,
"updated_at" : "2020-05-13T03:33:11Z" ,
"pushed_at" : "2020-05-13T03:33:09Z" ,
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"forks_count" : 0 ,
2021-09-13 23:12:57 +02:00
"allow_forking" : true ,
2021-10-06 23:13:51 +02:00
"is_template" : false ,
2022-06-28 20:20:29 +02:00
"web_commit_signoff_required" : false ,
2021-10-06 23:13:51 +02:00
"topics" : [ ] ,
2021-10-01 23:13:10 +02:00
"visibility" : "public" ,
2020-05-13 11:09:18 +02:00
"forks" : 0 ,
"watchers" : 0 ,
"score" : 0
2021-05-20 23:11:37 +02:00
} ,
{
"id" : 369313411 ,
"name" : "CVE-2019-13272-Local-Privilege-Escalation" ,
"full_name" : "jana30116\/CVE-2019-13272-Local-Privilege-Escalation" ,
"owner" : {
"login" : "jana30116" ,
"id" : 53650676 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/53650676?v=4" ,
"html_url" : "https:\/\/github.com\/jana30116"
} ,
"html_url" : "https:\/\/github.com\/jana30116\/CVE-2019-13272-Local-Privilege-Escalation" ,
"description" : "Local Privilege Escalation is a way to take advantage of flaws in code or service administration that can manage regular or guest users for particular device activities or transfer root user privileges to master or client. User rights admin. The licenses or privileges may be violated by such undesired amendments, as the system may be disrupted by frequent users unless they have shell or root authorization. So, someone, someone, it may become dangerous and be used to obtain access to a higher level. " ,
"fork" : false ,
"created_at" : "2021-05-20T19:13:28Z" ,
"updated_at" : "2021-05-20T19:48:25Z" ,
"pushed_at" : "2021-05-20T19:48:22Z" ,
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"forks_count" : 0 ,
2021-09-13 23:12:57 +02:00
"allow_forking" : true ,
2021-10-06 23:13:51 +02:00
"is_template" : false ,
2022-06-28 20:20:29 +02:00
"web_commit_signoff_required" : false ,
2021-10-06 23:13:51 +02:00
"topics" : [ ] ,
2021-10-01 23:13:10 +02:00
"visibility" : "public" ,
2021-05-20 23:11:37 +02:00
"forks" : 0 ,
"watchers" : 0 ,
"score" : 0
2022-03-10 07:14:25 +01:00
} ,
{
"id" : 468151152 ,
"name" : "CVE-2019-13272" ,
"full_name" : "babyshen\/CVE-2019-13272" ,
"owner" : {
"login" : "babyshen" ,
"id" : 11402197 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/11402197?v=4" ,
"html_url" : "https:\/\/github.com\/babyshen"
} ,
"html_url" : "https:\/\/github.com\/babyshen\/CVE-2019-13272" ,
"description" : null ,
"fork" : false ,
"created_at" : "2022-03-10T01:27:46Z" ,
"updated_at" : "2022-03-10T01:29:13Z" ,
"pushed_at" : "2022-03-10T01:29:10Z" ,
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
2022-06-28 20:20:29 +02:00
"web_commit_signoff_required" : false ,
2022-03-10 07:14:25 +01:00
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 0 ,
"score" : 0
2019-12-08 14:19:20 +01:00
}
]