[ { "id": 199781061, "name": "CVE-2019-13272", "full_name": "jas502n\/CVE-2019-13272", "owner": { "login": "jas502n", "id": 16593068, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/16593068?v=4", "html_url": "https:\/\/github.com\/jas502n" }, "html_url": "https:\/\/github.com\/jas502n\/CVE-2019-13272", "description": "Linux 4.10 < 5.1.17 PTRACE_TRACEME local root", "fork": false, "created_at": "2019-07-31T04:51:43Z", "updated_at": "2022-07-18T06:27:47Z", "pushed_at": "2019-08-01T16:02:59Z", "stargazers_count": 289, "watchers_count": 289, "forks_count": 110, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 110, "watchers": 289, "score": 0 }, { "id": 199794841, "name": "CVE-2019-13272", "full_name": "Cyc1eC\/CVE-2019-13272", "owner": { "login": "Cyc1eC", "id": 26767829, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/26767829?v=4", "html_url": "https:\/\/github.com\/Cyc1eC" }, "html_url": "https:\/\/github.com\/Cyc1eC\/CVE-2019-13272", "description": "The exploit for CVE-2019-13272", "fork": false, "created_at": "2019-07-31T06:36:21Z", "updated_at": "2022-01-09T21:01:11Z", "pushed_at": "2019-07-31T07:05:04Z", "stargazers_count": 7, "watchers_count": 7, "forks_count": 6, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 6, "watchers": 7, "score": 0 }, { "id": 200459882, "name": "cve-2019-13272", "full_name": "bigbigliang-malwarebenchmark\/cve-2019-13272", "owner": { "login": "bigbigliang-malwarebenchmark", "id": 45776349, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/45776349?v=4", "html_url": "https:\/\/github.com\/bigbigliang-malwarebenchmark" }, "html_url": "https:\/\/github.com\/bigbigliang-malwarebenchmark\/cve-2019-13272", "description": "提权漏洞", "fork": false, "created_at": "2019-08-04T06:51:36Z", "updated_at": "2021-12-05T22:21:13Z", "pushed_at": "2019-08-04T07:06:47Z", "stargazers_count": 2, "watchers_count": 2, "forks_count": 1, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 1, "watchers": 2, "score": 0 }, { "id": 200948343, "name": "CVE-2019-13272", "full_name": "oneoy\/CVE-2019-13272", "owner": { "login": "oneoy", "id": 38435398, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/38435398?v=4", "html_url": "https:\/\/github.com\/oneoy" }, "html_url": "https:\/\/github.com\/oneoy\/CVE-2019-13272", "description": "linux 提权", "fork": false, "created_at": "2019-08-07T01:21:26Z", "updated_at": "2021-12-11T01:01:54Z", "pushed_at": "2019-08-07T01:21:38Z", "stargazers_count": 5, "watchers_count": 5, "forks_count": 8, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 8, "watchers": 5, "score": 0 }, { "id": 209440455, "name": "CVE-2019-13272", "full_name": "Huandtx\/CVE-2019-13272", "owner": { "login": "Huandtx", "id": 44591522, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/44591522?v=4", "html_url": "https:\/\/github.com\/Huandtx" }, "html_url": "https:\/\/github.com\/Huandtx\/CVE-2019-13272", "description": "5.1.17之前的Linux内核中普通用户执行文件提权为root用户", "fork": false, "created_at": "2019-09-19T01:58:35Z", "updated_at": "2021-12-05T22:21:24Z", "pushed_at": "2019-09-19T02:09:28Z", "stargazers_count": 3, "watchers_count": 3, "forks_count": 3, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 3, "watchers": 3, "score": 0 }, { "id": 245129315, "name": "CVE-2019-13272", "full_name": "polosec\/CVE-2019-13272", "owner": { "login": "polosec", "id": 34666152, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/34666152?v=4", "html_url": "https:\/\/github.com\/polosec" }, "html_url": "https:\/\/github.com\/polosec\/CVE-2019-13272", "description": "CVE-2019-13272", "fork": false, "created_at": "2020-03-05T10:10:19Z", "updated_at": "2022-05-13T13:02:33Z", "pushed_at": "2020-03-05T10:16:17Z", "stargazers_count": 1, "watchers_count": 1, "forks_count": 1, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 1, "watchers": 1, "score": 0 }, { "id": 260622118, "name": "-Kernel-ptrace-c-mishandles-vulnerability-CVE-2019-13272", "full_name": "sumedhaDharmasena\/-Kernel-ptrace-c-mishandles-vulnerability-CVE-2019-13272", "owner": { "login": "sumedhaDharmasena", "id": 43642069, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/43642069?v=4", "html_url": "https:\/\/github.com\/sumedhaDharmasena" }, "html_url": "https:\/\/github.com\/sumedhaDharmasena\/-Kernel-ptrace-c-mishandles-vulnerability-CVE-2019-13272", "description": null, "fork": false, "created_at": "2020-05-02T05:41:54Z", "updated_at": "2021-12-05T22:21:39Z", "pushed_at": "2020-05-02T06:05:54Z", "stargazers_count": 1, "watchers_count": 1, "forks_count": 1, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 1, "watchers": 1, "score": 0 }, { "id": 263022112, "name": "Exploiting-a-Linux-kernel-vulnerability", "full_name": "Tharana\/Exploiting-a-Linux-kernel-vulnerability", "owner": { "login": "Tharana", "id": 31825168, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/31825168?v=4", "html_url": "https:\/\/github.com\/Tharana" }, "html_url": "https:\/\/github.com\/Tharana\/Exploiting-a-Linux-kernel-vulnerability", "description": "Local Root vulnerability- CVE-2019-13272 \/ Security Bypass Vulnerability – CVE-2019-14287", "fork": false, "created_at": "2020-05-11T11:24:29Z", "updated_at": "2020-05-11T11:31:32Z", "pushed_at": "2020-05-11T11:30:54Z", "stargazers_count": 1, "watchers_count": 1, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 1, "score": 0 }, { "id": 263322619, "name": "Privilege-Escalation-CVE-2019-13272-", "full_name": "RashmikaEkanayake\/Privilege-Escalation-CVE-2019-13272-", "owner": { "login": "RashmikaEkanayake", "id": 61092678, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/61092678?v=4", "html_url": "https:\/\/github.com\/RashmikaEkanayake" }, "html_url": "https:\/\/github.com\/RashmikaEkanayake\/Privilege-Escalation-CVE-2019-13272-", "description": null, "fork": false, "created_at": "2020-05-12T11:53:55Z", "updated_at": "2020-05-12T11:57:58Z", "pushed_at": "2020-05-12T11:57:56Z", "stargazers_count": 0, "watchers_count": 0, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0 }, { "id": 263412118, "name": "vulnerability-exploitation", "full_name": "Tharana\/vulnerability-exploitation", "owner": { "login": "Tharana", "id": 31825168, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/31825168?v=4", "html_url": "https:\/\/github.com\/Tharana" }, "html_url": "https:\/\/github.com\/Tharana\/vulnerability-exploitation", "description": "Local Root vulnerability- CVE-2019-13272 \/ Security Bypass Vulnerability – CVE-2019-14287\/Google Android - 'Stagefright' Remote Code Execution - CVE-2015-1538", "fork": false, "created_at": "2020-05-12T17:59:48Z", "updated_at": "2021-09-17T11:03:25Z", "pushed_at": "2020-05-12T18:13:11Z", "stargazers_count": 1, "watchers_count": 1, "forks_count": 1, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 1, "watchers": 1, "score": 0 }, { "id": 263515561, "name": "CVE-2019-13272---Documentation", "full_name": "teddy47\/CVE-2019-13272---Documentation", "owner": { "login": "teddy47", "id": 48222561, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/48222561?v=4", "html_url": "https:\/\/github.com\/teddy47" }, "html_url": "https:\/\/github.com\/teddy47\/CVE-2019-13272---Documentation", "description": null, "fork": false, "created_at": "2020-05-13T03:28:45Z", "updated_at": "2020-05-13T03:33:11Z", "pushed_at": "2020-05-13T03:33:09Z", "stargazers_count": 0, "watchers_count": 0, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0 }, { "id": 369313411, "name": "CVE-2019-13272-Local-Privilege-Escalation", "full_name": "jana30116\/CVE-2019-13272-Local-Privilege-Escalation", "owner": { "login": "jana30116", "id": 53650676, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/53650676?v=4", "html_url": "https:\/\/github.com\/jana30116" }, "html_url": "https:\/\/github.com\/jana30116\/CVE-2019-13272-Local-Privilege-Escalation", "description": "Local Privilege Escalation is a way to take advantage of flaws in code or service administration that can manage regular or guest users for particular device activities or transfer root user privileges to master or client. User rights admin. The licenses or privileges may be violated by such undesired amendments, as the system may be disrupted by frequent users unless they have shell or root authorization. So, someone, someone, it may become dangerous and be used to obtain access to a higher level. ", "fork": false, "created_at": "2021-05-20T19:13:28Z", "updated_at": "2021-05-20T19:48:25Z", "pushed_at": "2021-05-20T19:48:22Z", "stargazers_count": 0, "watchers_count": 0, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0 }, { "id": 468151152, "name": "CVE-2019-13272", "full_name": "babyshen\/CVE-2019-13272", "owner": { "login": "babyshen", "id": 11402197, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/11402197?v=4", "html_url": "https:\/\/github.com\/babyshen" }, "html_url": "https:\/\/github.com\/babyshen\/CVE-2019-13272", "description": null, "fork": false, "created_at": "2022-03-10T01:27:46Z", "updated_at": "2022-03-10T01:29:13Z", "pushed_at": "2022-03-10T01:29:10Z", "stargazers_count": 0, "watchers_count": 0, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0 } ]