[ { "id": 199781061, "name": "CVE-2019-13272", "full_name": "jas502n\/CVE-2019-13272", "owner": { "login": "jas502n", "id": 16593068, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/16593068?v=4", "html_url": "https:\/\/github.com\/jas502n", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/jas502n\/CVE-2019-13272", "description": "Linux 4.10 < 5.1.17 PTRACE_TRACEME local root", "fork": false, "created_at": "2019-07-31T04:51:43Z", "updated_at": "2024-11-19T07:16:36Z", "pushed_at": "2019-08-01T16:02:59Z", "stargazers_count": 327, "watchers_count": 327, "has_discussions": false, "forks_count": 108, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 108, "watchers": 327, "score": 0, "subscribers_count": 8 }, { "id": 199794841, "name": "CVE-2019-13272", "full_name": "Cyc1eC\/CVE-2019-13272", "owner": { "login": "Cyc1eC", "id": 26767829, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/26767829?v=4", "html_url": "https:\/\/github.com\/Cyc1eC", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/Cyc1eC\/CVE-2019-13272", "description": "The exploit for CVE-2019-13272", "fork": false, "created_at": "2019-07-31T06:36:21Z", "updated_at": "2024-08-12T19:51:33Z", "pushed_at": "2019-07-31T07:05:04Z", "stargazers_count": 5, "watchers_count": 5, "has_discussions": false, "forks_count": 6, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 6, "watchers": 5, "score": 0, "subscribers_count": 3 }, { "id": 200459882, "name": "cve-2019-13272", "full_name": "bigbigliang-malwarebenchmark\/cve-2019-13272", "owner": { "login": "bigbigliang-malwarebenchmark", "id": 45776349, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/45776349?v=4", "html_url": "https:\/\/github.com\/bigbigliang-malwarebenchmark", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/bigbigliang-malwarebenchmark\/cve-2019-13272", "description": "提权漏洞", "fork": false, "created_at": "2019-08-04T06:51:36Z", "updated_at": "2024-08-12T19:51:41Z", "pushed_at": "2019-08-04T07:06:47Z", "stargazers_count": 1, "watchers_count": 1, "has_discussions": false, "forks_count": 1, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 1, "watchers": 1, "score": 0, "subscribers_count": 2 }, { "id": 200948343, "name": "CVE-2019-13272", "full_name": "oneoy\/CVE-2019-13272", "owner": { "login": "oneoy", "id": 38435398, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/38435398?v=4", "html_url": "https:\/\/github.com\/oneoy", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/oneoy\/CVE-2019-13272", "description": "linux 提权", "fork": false, "created_at": "2019-08-07T01:21:26Z", "updated_at": "2024-08-12T19:51:44Z", "pushed_at": "2019-08-07T01:21:38Z", "stargazers_count": 3, "watchers_count": 3, "has_discussions": false, "forks_count": 8, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 8, "watchers": 3, "score": 0, "subscribers_count": 2 }, { "id": 245129315, "name": "CVE-2019-13272", "full_name": "polosec\/CVE-2019-13272", "owner": { "login": "polosec", "id": 34666152, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/34666152?v=4", "html_url": "https:\/\/github.com\/polosec", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/polosec\/CVE-2019-13272", "description": "CVE-2019-13272", "fork": false, "created_at": "2020-03-05T10:10:19Z", "updated_at": "2024-08-12T19:58:23Z", "pushed_at": "2020-03-05T10:16:17Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 1, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 1, "watchers": 0, "score": 0, "subscribers_count": 1 }, { "id": 260622118, "name": "-Kernel-ptrace-c-mishandles-vulnerability-CVE-2019-13272", "full_name": "sumedhaDharmasena\/-Kernel-ptrace-c-mishandles-vulnerability-CVE-2019-13272", "owner": { "login": "sumedhaDharmasena", "id": 43642069, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/43642069?v=4", "html_url": "https:\/\/github.com\/sumedhaDharmasena", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/sumedhaDharmasena\/-Kernel-ptrace-c-mishandles-vulnerability-CVE-2019-13272", "description": null, "fork": false, "created_at": "2020-05-02T05:41:54Z", "updated_at": "2024-08-12T20:01:00Z", "pushed_at": "2020-05-02T06:05:54Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 1, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 1, "watchers": 0, "score": 0, "subscribers_count": 1 }, { "id": 263022112, "name": "Exploiting-a-Linux-kernel-vulnerability", "full_name": "Tharana\/Exploiting-a-Linux-kernel-vulnerability", "owner": { "login": "Tharana", "id": 31825168, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/31825168?v=4", "html_url": "https:\/\/github.com\/Tharana", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/Tharana\/Exploiting-a-Linux-kernel-vulnerability", "description": "Local Root vulnerability- CVE-2019-13272 \/ Security Bypass Vulnerability – CVE-2019-14287", "fork": false, "created_at": "2020-05-11T11:24:29Z", "updated_at": "2020-05-11T11:31:32Z", "pushed_at": "2020-05-11T11:30:54Z", "stargazers_count": 1, "watchers_count": 1, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 1, "score": 0, "subscribers_count": 2 }, { "id": 263322619, "name": "Privilege-Escalation-CVE-2019-13272-", "full_name": "RashmikaEkanayake\/Privilege-Escalation-CVE-2019-13272-", "owner": { "login": "RashmikaEkanayake", "id": 61092678, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/61092678?v=4", "html_url": "https:\/\/github.com\/RashmikaEkanayake", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/RashmikaEkanayake\/Privilege-Escalation-CVE-2019-13272-", "description": null, "fork": false, "created_at": "2020-05-12T11:53:55Z", "updated_at": "2020-05-12T11:57:58Z", "pushed_at": "2020-05-12T11:57:56Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0, "subscribers_count": 1 }, { "id": 263412118, "name": "vulnerability-exploitation", "full_name": "Tharana\/vulnerability-exploitation", "owner": { "login": "Tharana", "id": 31825168, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/31825168?v=4", "html_url": "https:\/\/github.com\/Tharana", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/Tharana\/vulnerability-exploitation", "description": "Local Root vulnerability- CVE-2019-13272 \/ Security Bypass Vulnerability – CVE-2019-14287\/Google Android - 'Stagefright' Remote Code Execution - CVE-2015-1538", "fork": false, "created_at": "2020-05-12T17:59:48Z", "updated_at": "2024-11-30T08:29:13Z", "pushed_at": "2020-05-12T18:13:11Z", "stargazers_count": 2, "watchers_count": 2, "has_discussions": false, "forks_count": 1, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 1, "watchers": 2, "score": 0, "subscribers_count": 2 }, { "id": 263515561, "name": "CVE-2019-13272---Documentation", "full_name": "teddy47\/CVE-2019-13272---Documentation", "owner": { "login": "teddy47", "id": 48222561, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/48222561?v=4", "html_url": "https:\/\/github.com\/teddy47", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/teddy47\/CVE-2019-13272---Documentation", "description": null, "fork": false, "created_at": "2020-05-13T03:28:45Z", "updated_at": "2020-05-13T03:33:11Z", "pushed_at": "2020-05-13T03:33:09Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0, "subscribers_count": 1 }, { "id": 305243026, "name": "CVE-2019-13272", "full_name": "datntsec\/CVE-2019-13272", "owner": { "login": "datntsec", "id": 70559607, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/70559607?v=4", "html_url": "https:\/\/github.com\/datntsec", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/datntsec\/CVE-2019-13272", "description": null, "fork": false, "created_at": "2020-10-19T02:33:29Z", "updated_at": "2023-04-17T08:54:07Z", "pushed_at": "2020-12-25T09:10:51Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0, "subscribers_count": 1 }, { "id": 369313411, "name": "CVE-2019-13272-Local-Privilege-Escalation", "full_name": "jana30116\/CVE-2019-13272-Local-Privilege-Escalation", "owner": { "login": "jana30116", "id": 53650676, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/53650676?v=4", "html_url": "https:\/\/github.com\/jana30116", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/jana30116\/CVE-2019-13272-Local-Privilege-Escalation", "description": "Local Privilege Escalation is a way to take advantage of flaws in code or service administration that can manage regular or guest users for particular device activities or transfer root user privileges to master or client. User rights admin. The licenses or privileges may be violated by such undesired amendments, as the system may be disrupted by frequent users unless they have shell or root authorization. So, someone, someone, it may become dangerous and be used to obtain access to a higher level. ", "fork": false, "created_at": "2021-05-20T19:13:28Z", "updated_at": "2021-05-20T19:48:25Z", "pushed_at": "2021-05-20T19:48:22Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0, "subscribers_count": 1 }, { "id": 468151152, "name": "CVE-2019-13272", "full_name": "babyshen\/CVE-2019-13272", "owner": { "login": "babyshen", "id": 11402197, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/11402197?v=4", "html_url": "https:\/\/github.com\/babyshen", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/babyshen\/CVE-2019-13272", "description": null, "fork": false, "created_at": "2022-03-10T01:27:46Z", "updated_at": "2022-03-10T01:29:13Z", "pushed_at": "2022-03-10T01:29:10Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0, "subscribers_count": 1 }, { "id": 565617725, "name": "secureCodingDemo", "full_name": "GgKendall\/secureCodingDemo", "owner": { "login": "GgKendall", "id": 77352114, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/77352114?v=4", "html_url": "https:\/\/github.com\/GgKendall", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/GgKendall\/secureCodingDemo", "description": "fall2022 secure coding CVE-2019-13272 : Linux Kernel Improper Privilege Management Vulnerability", "fork": false, "created_at": "2022-11-14T00:07:04Z", "updated_at": "2022-11-14T16:35:37Z", "pushed_at": "2022-11-14T00:17:04Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0, "subscribers_count": 1 }, { "id": 687084359, "name": "CVE-2019-13272", "full_name": "asepsaepdin\/CVE-2019-13272", "owner": { "login": "asepsaepdin", "id": 122620685, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/122620685?v=4", "html_url": "https:\/\/github.com\/asepsaepdin", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/asepsaepdin\/CVE-2019-13272", "description": null, "fork": false, "created_at": "2023-09-04T15:16:09Z", "updated_at": "2023-09-04T15:34:51Z", "pushed_at": "2023-09-05T15:04:46Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0, "subscribers_count": 1 }, { "id": 751072561, "name": "ptrace_scope-CVE-2019-13272-privilege-escalation", "full_name": "MDS1GNAL\/ptrace_scope-CVE-2019-13272-privilege-escalation", "owner": { "login": "MDS1GNAL", "id": 149971135, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/149971135?v=4", "html_url": "https:\/\/github.com\/MDS1GNAL", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/MDS1GNAL\/ptrace_scope-CVE-2019-13272-privilege-escalation", "description": "Es una vulnerabilidad para escalar privilegios en linux.", "fork": false, "created_at": "2024-01-31T21:50:04Z", "updated_at": "2024-02-15T17:19:53Z", "pushed_at": "2024-03-27T16:37:10Z", "stargazers_count": 2, "watchers_count": 2, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 2, "score": 0, "subscribers_count": 1 }, { "id": 817724893, "name": "CVE-2019-13272", "full_name": "josemlwdf\/CVE-2019-13272", "owner": { "login": "josemlwdf", "id": 60181010, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/60181010?v=4", "html_url": "https:\/\/github.com\/josemlwdf", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/josemlwdf\/CVE-2019-13272", "description": "This is a Python 3 version of this exploit. Hope it works!!!", "fork": false, "created_at": "2024-06-20T10:04:13Z", "updated_at": "2024-12-04T16:46:23Z", "pushed_at": "2024-07-25T13:41:33Z", "stargazers_count": 2, "watchers_count": 2, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 2, "score": 0, "subscribers_count": 1 } ]