Auto Update 2025/03/09 12:31:48

This commit is contained in:
motikan2010-bot 2025-03-09 21:31:48 +09:00
parent 4c61bb8cdb
commit 61578e787d
27 changed files with 184 additions and 112 deletions

View file

@ -45,10 +45,10 @@
"description": "PHP-CGI-REMOTE_CVE-2012-1823, UnrealIRCd, MySQL, PostgreSQL and SSH bruteforce, VSFTPD2.3.4, samba CVE-2007-2447, JAVA RMI Server, distcc daemon, misconfigured NFS files, etc.",
"fork": false,
"created_at": "2019-07-05T11:55:41Z",
"updated_at": "2021-08-02T19:04:31Z",
"updated_at": "2025-03-09T08:17:53Z",
"pushed_at": "2018-07-11T18:22:51Z",
"stargazers_count": 3,
"watchers_count": 3,
"stargazers_count": 4,
"watchers_count": 4,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
@ -57,7 +57,7 @@
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 3,
"watchers": 4,
"score": 0,
"subscribers_count": 0
},
@ -882,8 +882,8 @@
"description": null,
"fork": false,
"created_at": "2025-03-08T13:22:26Z",
"updated_at": "2025-03-08T14:27:18Z",
"pushed_at": "2025-03-08T14:27:14Z",
"updated_at": "2025-03-09T06:15:07Z",
"pushed_at": "2025-03-09T06:15:04Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,

View file

@ -76,10 +76,10 @@
"description": "PHP-CGI-REMOTE_CVE-2012-1823, UnrealIRCd, MySQL, PostgreSQL and SSH bruteforce, VSFTPD2.3.4, samba CVE-2007-2447, JAVA RMI Server, distcc daemon, misconfigured NFS files, etc.",
"fork": false,
"created_at": "2019-07-05T11:55:41Z",
"updated_at": "2021-08-02T19:04:31Z",
"updated_at": "2025-03-09T08:17:53Z",
"pushed_at": "2018-07-11T18:22:51Z",
"stargazers_count": 3,
"watchers_count": 3,
"stargazers_count": 4,
"watchers_count": 4,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
@ -88,7 +88,7 @@
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 3,
"watchers": 4,
"score": 0,
"subscribers_count": 0
},

View file

@ -88,10 +88,10 @@
"description": "针对JWT渗透开发的漏洞验证\/密钥爆破工具针对CVE-2015-9235\/空白密钥\/未验证签名攻击\/CVE-2016-10555\/CVE-2018-0114\/CVE-2020-28042的结果生成用于FUZZ也可使用字典\/字符枚举(包括JJWT)的方式进行爆破(JWT Crack)",
"fork": false,
"created_at": "2025-01-27T14:23:31Z",
"updated_at": "2025-03-08T05:31:53Z",
"updated_at": "2025-03-09T09:30:37Z",
"pushed_at": "2025-03-01T15:46:45Z",
"stargazers_count": 165,
"watchers_count": 165,
"stargazers_count": 166,
"watchers_count": 166,
"has_discussions": false,
"forks_count": 6,
"allow_forking": true,
@ -100,7 +100,7 @@
"topics": [],
"visibility": "public",
"forks": 6,
"watchers": 165,
"watchers": 166,
"score": 0,
"subscribers_count": 4
}

View file

@ -76,10 +76,10 @@
"description": "针对JWT渗透开发的漏洞验证\/密钥爆破工具针对CVE-2015-9235\/空白密钥\/未验证签名攻击\/CVE-2016-10555\/CVE-2018-0114\/CVE-2020-28042的结果生成用于FUZZ也可使用字典\/字符枚举(包括JJWT)的方式进行爆破(JWT Crack)",
"fork": false,
"created_at": "2025-01-27T14:23:31Z",
"updated_at": "2025-03-08T05:31:53Z",
"updated_at": "2025-03-09T09:30:37Z",
"pushed_at": "2025-03-01T15:46:45Z",
"stargazers_count": 165,
"watchers_count": 165,
"stargazers_count": 166,
"watchers_count": 166,
"has_discussions": false,
"forks_count": 6,
"allow_forking": true,
@ -88,7 +88,7 @@
"topics": [],
"visibility": "public",
"forks": 6,
"watchers": 165,
"watchers": 166,
"score": 0,
"subscribers_count": 4
}

View file

@ -324,10 +324,10 @@
"description": "针对JWT渗透开发的漏洞验证\/密钥爆破工具针对CVE-2015-9235\/空白密钥\/未验证签名攻击\/CVE-2016-10555\/CVE-2018-0114\/CVE-2020-28042的结果生成用于FUZZ也可使用字典\/字符枚举(包括JJWT)的方式进行爆破(JWT Crack)",
"fork": false,
"created_at": "2025-01-27T14:23:31Z",
"updated_at": "2025-03-08T05:31:53Z",
"updated_at": "2025-03-09T09:30:37Z",
"pushed_at": "2025-03-01T15:46:45Z",
"stargazers_count": 165,
"watchers_count": 165,
"stargazers_count": 166,
"watchers_count": 166,
"has_discussions": false,
"forks_count": 6,
"allow_forking": true,
@ -336,7 +336,7 @@
"topics": [],
"visibility": "public",
"forks": 6,
"watchers": 165,
"watchers": 166,
"score": 0,
"subscribers_count": 4
}

View file

@ -76,7 +76,7 @@
"description": "Unsigned driver loader using CVE-2018-19320",
"fork": false,
"created_at": "2022-11-12T05:48:13Z",
"updated_at": "2025-03-06T15:21:03Z",
"updated_at": "2025-03-09T07:38:59Z",
"pushed_at": "2023-04-09T13:50:29Z",
"stargazers_count": 237,
"watchers_count": 237,

View file

@ -14,10 +14,10 @@
"description": "Exploit for CVE-2019-11043",
"fork": false,
"created_at": "2019-09-23T21:37:27Z",
"updated_at": "2025-02-28T09:31:16Z",
"updated_at": "2025-03-09T09:22:24Z",
"pushed_at": "2019-11-12T18:53:14Z",
"stargazers_count": 1805,
"watchers_count": 1805,
"stargazers_count": 1806,
"watchers_count": 1806,
"has_discussions": false,
"forks_count": 248,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 248,
"watchers": 1805,
"watchers": 1806,
"score": 0,
"subscribers_count": 37
},

View file

@ -45,10 +45,10 @@
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
"fork": false,
"created_at": "2020-04-01T09:33:35Z",
"updated_at": "2025-03-07T22:12:11Z",
"updated_at": "2025-03-09T12:03:17Z",
"pushed_at": "2021-04-04T09:13:57Z",
"stargazers_count": 4174,
"watchers_count": 4174,
"stargazers_count": 4175,
"watchers_count": 4175,
"has_discussions": false,
"forks_count": 1102,
"allow_forking": true,
@ -77,7 +77,7 @@
],
"visibility": "public",
"forks": 1102,
"watchers": 4174,
"watchers": 4175,
"score": 0,
"subscribers_count": 148
},

View file

@ -14,10 +14,10 @@
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
"fork": false,
"created_at": "2020-04-01T09:33:35Z",
"updated_at": "2025-03-07T22:12:11Z",
"updated_at": "2025-03-09T12:03:17Z",
"pushed_at": "2021-04-04T09:13:57Z",
"stargazers_count": 4174,
"watchers_count": 4174,
"stargazers_count": 4175,
"watchers_count": 4175,
"has_discussions": false,
"forks_count": 1102,
"allow_forking": true,
@ -46,7 +46,7 @@
],
"visibility": "public",
"forks": 1102,
"watchers": 4174,
"watchers": 4175,
"score": 0,
"subscribers_count": 148
},

View file

@ -386,10 +386,10 @@
"description": "Ghostcat read file\/code execute,CNVD-2020-10487(CVE-2020-1938) ",
"fork": false,
"created_at": "2020-02-22T16:16:20Z",
"updated_at": "2025-03-07T12:21:37Z",
"updated_at": "2025-03-09T11:16:43Z",
"pushed_at": "2020-03-09T14:51:43Z",
"stargazers_count": 382,
"watchers_count": 382,
"stargazers_count": 383,
"watchers_count": 383,
"has_discussions": false,
"forks_count": 113,
"allow_forking": true,
@ -404,7 +404,7 @@
],
"visibility": "public",
"forks": 113,
"watchers": 382,
"watchers": 383,
"score": 0,
"subscribers_count": 4
},

View file

@ -14,10 +14,10 @@
"description": "针对JWT渗透开发的漏洞验证\/密钥爆破工具针对CVE-2015-9235\/空白密钥\/未验证签名攻击\/CVE-2016-10555\/CVE-2018-0114\/CVE-2020-28042的结果生成用于FUZZ也可使用字典\/字符枚举(包括JJWT)的方式进行爆破(JWT Crack)",
"fork": false,
"created_at": "2025-01-27T14:23:31Z",
"updated_at": "2025-03-08T05:31:53Z",
"updated_at": "2025-03-09T09:30:37Z",
"pushed_at": "2025-03-01T15:46:45Z",
"stargazers_count": 165,
"watchers_count": 165,
"stargazers_count": 166,
"watchers_count": 166,
"has_discussions": false,
"forks_count": 6,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 6,
"watchers": 165,
"watchers": 166,
"score": 0,
"subscribers_count": 4
}

View file

@ -972,7 +972,7 @@
"stargazers_count": 1124,
"watchers_count": 1124,
"has_discussions": false,
"forks_count": 194,
"forks_count": 195,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -980,7 +980,7 @@
"cve-2021-4034"
],
"visibility": "public",
"forks": 194,
"forks": 195,
"watchers": 1124,
"score": 0,
"subscribers_count": 14

View file

@ -1307,10 +1307,10 @@
"description": "CVE-2021-44228 Log4j2 BurpSuite Scanner,Customize ceye.io api or other apis,including internal networks",
"fork": false,
"created_at": "2021-12-11T07:19:11Z",
"updated_at": "2025-03-07T10:14:21Z",
"updated_at": "2025-03-09T11:13:01Z",
"pushed_at": "2023-06-13T09:17:54Z",
"stargazers_count": 819,
"watchers_count": 819,
"stargazers_count": 820,
"watchers_count": 820,
"has_discussions": false,
"forks_count": 112,
"allow_forking": true,
@ -1324,7 +1324,7 @@
],
"visibility": "public",
"forks": 112,
"watchers": 819,
"watchers": 820,
"score": 0,
"subscribers_count": 11
},

View file

@ -2805,6 +2805,37 @@
"score": 0,
"subscribers_count": 1
},
{
"id": 789035235,
"name": "DirtyPipe-Exploit",
"full_name": "karanlvm\/DirtyPipe-Exploit",
"owner": {
"login": "karanlvm",
"id": 69917470,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/69917470?v=4",
"html_url": "https:\/\/github.com\/karanlvm",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/karanlvm\/DirtyPipe-Exploit",
"description": "Proof of concept for CVE-2022-0847",
"fork": false,
"created_at": "2024-04-19T15:21:57Z",
"updated_at": "2025-03-09T09:44:29Z",
"pushed_at": "2024-06-06T16:21:26Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
},
{
"id": 794413658,
"name": "CVE-2022-0847",

View file

@ -14,10 +14,10 @@
"description": "Documentation and proof of concept code for CVE-2022-24125 and CVE-2022-24126.",
"fork": false,
"created_at": "2022-01-28T20:37:14Z",
"updated_at": "2025-03-05T17:55:04Z",
"updated_at": "2025-03-09T10:42:25Z",
"pushed_at": "2022-08-30T02:11:05Z",
"stargazers_count": 152,
"watchers_count": 152,
"stargazers_count": 153,
"watchers_count": 153,
"has_discussions": false,
"forks_count": 7,
"allow_forking": true,
@ -32,7 +32,7 @@
],
"visibility": "public",
"forks": 7,
"watchers": 152,
"watchers": 153,
"score": 0,
"subscribers_count": 3
}

View file

@ -107,10 +107,10 @@
"description": "检测域内常见一把梭漏洞包括NoPac、ZeroLogon、CVE-2022-26923、PrintNightMare",
"fork": false,
"created_at": "2023-10-17T06:29:44Z",
"updated_at": "2025-02-11T02:32:09Z",
"updated_at": "2025-03-09T10:19:24Z",
"pushed_at": "2023-10-23T04:47:11Z",
"stargazers_count": 44,
"watchers_count": 44,
"stargazers_count": 45,
"watchers_count": 45,
"has_discussions": false,
"forks_count": 12,
"allow_forking": true,
@ -119,7 +119,7 @@
"topics": [],
"visibility": "public",
"forks": 12,
"watchers": 44,
"watchers": 45,
"score": 0,
"subscribers_count": 2
},

View file

@ -45,10 +45,10 @@
"description": "harbor unauthorized detection",
"fork": false,
"created_at": "2023-03-21T10:40:19Z",
"updated_at": "2025-02-13T02:08:50Z",
"updated_at": "2025-03-09T09:36:01Z",
"pushed_at": "2024-12-12T07:37:01Z",
"stargazers_count": 30,
"watchers_count": 30,
"stargazers_count": 32,
"watchers_count": 32,
"has_discussions": false,
"forks_count": 7,
"allow_forking": true,
@ -57,7 +57,7 @@
"topics": [],
"visibility": "public",
"forks": 7,
"watchers": 30,
"watchers": 32,
"score": 0,
"subscribers_count": 2
},

View file

@ -19,13 +19,13 @@
"stargazers_count": 6,
"watchers_count": 6,
"has_discussions": false,
"forks_count": 0,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"forks": 1,
"watchers": 6,
"score": 0,
"subscribers_count": 1

View file

@ -14,10 +14,10 @@
"description": "🚨 CVE-2023-45866 - BlueDucky Implementation (Using DuckyScript) 🔓 Unauthenticated Peering Leading to Code Execution (Using HID Keyboard)",
"fork": false,
"created_at": "2024-01-16T06:52:02Z",
"updated_at": "2025-03-08T16:54:28Z",
"updated_at": "2025-03-09T11:18:01Z",
"pushed_at": "2024-08-18T08:26:46Z",
"stargazers_count": 1470,
"watchers_count": 1470,
"stargazers_count": 1471,
"watchers_count": 1471,
"has_discussions": false,
"forks_count": 250,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 250,
"watchers": 1470,
"watchers": 1471,
"score": 0,
"subscribers_count": 23
},

View file

@ -485,10 +485,10 @@
"description": "Proof of Concept for Path Traversal in Apache Struts (\"CVE-2023-50164\")",
"fork": false,
"created_at": "2025-03-05T12:55:58Z",
"updated_at": "2025-03-09T01:28:13Z",
"updated_at": "2025-03-09T07:57:48Z",
"pushed_at": "2025-03-05T12:56:18Z",
"stargazers_count": 127,
"watchers_count": 127,
"stargazers_count": 134,
"watchers_count": 134,
"has_discussions": false,
"forks_count": 15,
"allow_forking": true,
@ -497,7 +497,7 @@
"topics": [],
"visibility": "public",
"forks": 15,
"watchers": 127,
"watchers": 134,
"score": 0,
"subscribers_count": 1
}

View file

@ -14,10 +14,10 @@
"description": "exploits for CVE-2024-20017",
"fork": false,
"created_at": "2024-08-30T05:54:36Z",
"updated_at": "2025-01-29T11:27:30Z",
"updated_at": "2025-03-09T09:51:43Z",
"pushed_at": "2024-09-07T10:11:22Z",
"stargazers_count": 137,
"watchers_count": 137,
"stargazers_count": 136,
"watchers_count": 136,
"has_discussions": false,
"forks_count": 32,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 32,
"watchers": 137,
"watchers": 136,
"score": 0,
"subscribers_count": 3
}

View file

@ -14,10 +14,10 @@
"description": "PoC for CVE-2024-27130",
"fork": false,
"created_at": "2024-05-17T07:58:01Z",
"updated_at": "2025-02-14T17:11:59Z",
"updated_at": "2025-03-09T07:38:50Z",
"pushed_at": "2024-05-17T10:27:07Z",
"stargazers_count": 32,
"watchers_count": 32,
"stargazers_count": 33,
"watchers_count": 33,
"has_discussions": false,
"forks_count": 15,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 15,
"watchers": 32,
"watchers": 33,
"score": 0,
"subscribers_count": 0
},

View file

@ -60,5 +60,36 @@
"watchers": 1,
"score": 0,
"subscribers_count": 1
},
{
"id": 875929293,
"name": "CVE-2024-37032_CVE-2024-45436",
"full_name": "pankass\/CVE-2024-37032_CVE-2024-45436",
"owner": {
"login": "pankass",
"id": 87853664,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/87853664?v=4",
"html_url": "https:\/\/github.com\/pankass",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/pankass\/CVE-2024-37032_CVE-2024-45436",
"description": "CVE-2024-45436",
"fork": false,
"created_at": "2024-10-21T05:44:49Z",
"updated_at": "2025-03-09T11:38:45Z",
"pushed_at": "2025-03-09T11:38:42Z",
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 2,
"score": 0,
"subscribers_count": 1
}
]

View file

@ -1,35 +1,4 @@
[
{
"id": 875929293,
"name": "CVE-2024-45436",
"full_name": "pankass\/CVE-2024-45436",
"owner": {
"login": "pankass",
"id": 87853664,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/87853664?v=4",
"html_url": "https:\/\/github.com\/pankass",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/pankass\/CVE-2024-45436",
"description": "CVE-2024-45436",
"fork": false,
"created_at": "2024-10-21T05:44:49Z",
"updated_at": "2025-02-11T07:26:20Z",
"pushed_at": "2024-10-21T05:47:54Z",
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 2,
"score": 0,
"subscribers_count": 1
},
{
"id": 891956571,
"name": "cve-2024-45436-exp",

View file

@ -14,7 +14,7 @@
"description": "CVE-2025-0087 EoP full PoC",
"fork": false,
"created_at": "2025-03-05T13:31:02Z",
"updated_at": "2025-03-08T17:16:33Z",
"updated_at": "2025-03-09T09:41:55Z",
"pushed_at": "2025-03-05T16:51:45Z",
"stargazers_count": 5,
"watchers_count": 5,

33
2025/CVE-2025-1316.json Normal file
View file

@ -0,0 +1,33 @@
[
{
"id": 945407904,
"name": "CVE-2025-1316",
"full_name": "Rimasue\/CVE-2025-1316",
"owner": {
"login": "Rimasue",
"id": 195575875,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/195575875?v=4",
"html_url": "https:\/\/github.com\/Rimasue",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/Rimasue\/CVE-2025-1316",
"description": "Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') (CWE-78)",
"fork": false,
"created_at": "2025-03-09T10:57:29Z",
"updated_at": "2025-03-09T11:07:06Z",
"pushed_at": "2025-03-09T11:06:41Z",
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 2,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -109,6 +109,13 @@
- [McTavishSue/CVE-2025-1307](https://github.com/McTavishSue/CVE-2025-1307)
- [Nxploited/CVE-2025-1307](https://github.com/Nxploited/CVE-2025-1307)
### CVE-2025-1316 (2025-03-04)
<code>Edimax IC-7100 does not properly neutralize requests. An attacker can create specially crafted requests to achieve remote code execution on the device
</code>
- [Rimasue/CVE-2025-1316](https://github.com/Rimasue/CVE-2025-1316)
### CVE-2025-1716 (2025-02-26)
<code>picklescan before 0.0.21 does not treat 'pip' as an unsafe global. An attacker could craft a malicious model that uses Pickle to pull in a malicious PyPI package (hosted, for example, on pypi.org or GitHub) via `pip.main()`. Because pip is not a restricted global, the model, when scanned with picklescan, would pass security checks and appear to be safe, when it could instead prove to be problematic.
@ -6518,6 +6525,7 @@
- [Bi0x/CVE-2024-37032](https://github.com/Bi0x/CVE-2024-37032)
- [ahboon/CVE-2024-37032-scanner](https://github.com/ahboon/CVE-2024-37032-scanner)
- [pankass/CVE-2024-37032_CVE-2024-45436](https://github.com/pankass/CVE-2024-37032_CVE-2024-45436)
### CVE-2024-37051 (2024-06-10)
@ -7902,7 +7910,6 @@
<code>extractFromZipFile in model.go in Ollama before 0.1.47 can extract members of a ZIP archive outside of the parent directory.
</code>
- [pankass/CVE-2024-45436](https://github.com/pankass/CVE-2024-45436)
- [XiaomingX/cve-2024-45436-exp](https://github.com/XiaomingX/cve-2024-45436-exp)
### CVE-2024-45440 (2024-08-29)
@ -18673,6 +18680,7 @@
- [ayushx007/CVE-2022-0847-DirtyPipe-Exploits](https://github.com/ayushx007/CVE-2022-0847-DirtyPipe-Exploits)
- [solomon12354/LockingGirl-----CVE-2022-0847-Dirty_Pipe_virus](https://github.com/solomon12354/LockingGirl-----CVE-2022-0847-Dirty_Pipe_virus)
- [letsr00t/CVE-2022-0847](https://github.com/letsr00t/CVE-2022-0847)
- [karanlvm/DirtyPipe-Exploit](https://github.com/karanlvm/DirtyPipe-Exploit)
- [xsxtw/CVE-2022-0847](https://github.com/xsxtw/CVE-2022-0847)
- [muhammad1596/CVE-2022-0847-dirty-pipe-checker](https://github.com/muhammad1596/CVE-2022-0847-dirty-pipe-checker)
- [muhammad1596/CVE-2022-0847-DirtyPipe-Exploits](https://github.com/muhammad1596/CVE-2022-0847-DirtyPipe-Exploits)