PoC-in-GitHub/2019/CVE-2019-13272.json
2020-08-22 12:08:51 +09:00

255 lines
No EOL
9.1 KiB
JSON
Raw Blame History

This file contains ambiguous Unicode characters

This file contains Unicode characters that might be confused with other characters. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

[
{
"id": 199781061,
"name": "CVE-2019-13272",
"full_name": "jas502n\/CVE-2019-13272",
"owner": {
"login": "jas502n",
"id": 16593068,
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/16593068?v=4",
"html_url": "https:\/\/github.com\/jas502n"
},
"html_url": "https:\/\/github.com\/jas502n\/CVE-2019-13272",
"description": "Linux 4.10 < 5.1.17 PTRACE_TRACEME local root",
"fork": false,
"created_at": "2019-07-31T04:51:43Z",
"updated_at": "2020-08-13T07:19:44Z",
"pushed_at": "2019-08-01T16:02:59Z",
"stargazers_count": 237,
"watchers_count": 237,
"forks_count": 91,
"forks": 91,
"watchers": 237,
"score": 0
},
{
"id": 199794841,
"name": "CVE-2019-13272",
"full_name": "Cyc1eC\/CVE-2019-13272",
"owner": {
"login": "Cyc1eC",
"id": 26767829,
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/26767829?v=4",
"html_url": "https:\/\/github.com\/Cyc1eC"
},
"html_url": "https:\/\/github.com\/Cyc1eC\/CVE-2019-13272",
"description": "The exploit for CVE-2019-13272",
"fork": false,
"created_at": "2019-07-31T06:36:21Z",
"updated_at": "2019-12-17T14:57:32Z",
"pushed_at": "2019-07-31T07:05:04Z",
"stargazers_count": 3,
"watchers_count": 3,
"forks_count": 7,
"forks": 7,
"watchers": 3,
"score": 0
},
{
"id": 200459882,
"name": "cve-2019-13272",
"full_name": "bigbigliang-malwarebenchmark\/cve-2019-13272",
"owner": {
"login": "bigbigliang-malwarebenchmark",
"id": 45776349,
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/45776349?v=4",
"html_url": "https:\/\/github.com\/bigbigliang-malwarebenchmark"
},
"html_url": "https:\/\/github.com\/bigbigliang-malwarebenchmark\/cve-2019-13272",
"description": "提权漏洞",
"fork": false,
"created_at": "2019-08-04T06:51:36Z",
"updated_at": "2019-09-12T15:32:19Z",
"pushed_at": "2019-08-04T07:06:47Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 0,
"forks": 0,
"watchers": 1,
"score": 0
},
{
"id": 200948343,
"name": "CVE-2019-13272",
"full_name": "oneoy\/CVE-2019-13272",
"owner": {
"login": "oneoy",
"id": 38435398,
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/38435398?v=4",
"html_url": "https:\/\/github.com\/oneoy"
},
"html_url": "https:\/\/github.com\/oneoy\/CVE-2019-13272",
"description": "linux 提权",
"fork": false,
"created_at": "2019-08-07T01:21:26Z",
"updated_at": "2020-03-25T06:34:45Z",
"pushed_at": "2019-08-07T01:21:38Z",
"stargazers_count": 3,
"watchers_count": 3,
"forks_count": 4,
"forks": 4,
"watchers": 3,
"score": 0
},
{
"id": 209440455,
"name": "CVE-2019-13272",
"full_name": "Huandtx\/CVE-2019-13272",
"owner": {
"login": "Huandtx",
"id": 44591522,
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/44591522?v=4",
"html_url": "https:\/\/github.com\/Huandtx"
},
"html_url": "https:\/\/github.com\/Huandtx\/CVE-2019-13272",
"description": "5.1.17之前的Linux内核中普通用户执行文件提权为root用户",
"fork": false,
"created_at": "2019-09-19T01:58:35Z",
"updated_at": "2019-09-26T00:58:12Z",
"pushed_at": "2019-09-19T02:09:28Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 0,
"forks": 0,
"watchers": 1,
"score": 0
},
{
"id": 245129315,
"name": "CVE-2019-13272",
"full_name": "polosec\/CVE-2019-13272",
"owner": {
"login": "polosec",
"id": 34666152,
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/34666152?v=4",
"html_url": "https:\/\/github.com\/polosec"
},
"html_url": "https:\/\/github.com\/polosec\/CVE-2019-13272",
"description": "CVE-2019-13272",
"fork": false,
"created_at": "2020-03-05T10:10:19Z",
"updated_at": "2020-03-05T10:16:19Z",
"pushed_at": "2020-03-05T10:16:17Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 260622118,
"name": "-Kernel-ptrace-c-mishandles-vulnerability-CVE-2019-13272",
"full_name": "sumedhaDharmasena\/-Kernel-ptrace-c-mishandles-vulnerability-CVE-2019-13272",
"owner": {
"login": "sumedhaDharmasena",
"id": 43642069,
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/43642069?v=4",
"html_url": "https:\/\/github.com\/sumedhaDharmasena"
},
"html_url": "https:\/\/github.com\/sumedhaDharmasena\/-Kernel-ptrace-c-mishandles-vulnerability-CVE-2019-13272",
"description": null,
"fork": false,
"created_at": "2020-05-02T05:41:54Z",
"updated_at": "2020-05-02T06:05:56Z",
"pushed_at": "2020-05-02T06:05:54Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 263022112,
"name": "Exploiting-a-Linux-kernel-vulnerability",
"full_name": "Tharana\/Exploiting-a-Linux-kernel-vulnerability",
"owner": {
"login": "Tharana",
"id": 31825168,
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/31825168?v=4",
"html_url": "https:\/\/github.com\/Tharana"
},
"html_url": "https:\/\/github.com\/Tharana\/Exploiting-a-Linux-kernel-vulnerability",
"description": "Local Root vulnerability- CVE-2019-13272 \/ Security Bypass Vulnerability CVE-2019-14287",
"fork": false,
"created_at": "2020-05-11T11:24:29Z",
"updated_at": "2020-05-11T11:31:32Z",
"pushed_at": "2020-05-11T11:30:54Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 0,
"forks": 0,
"watchers": 1,
"score": 0
},
{
"id": 263322619,
"name": "Privilege-Escalation-CVE-2019-13272-",
"full_name": "RashmikaEkanayake\/Privilege-Escalation-CVE-2019-13272-",
"owner": {
"login": "RashmikaEkanayake",
"id": 61092678,
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/61092678?v=4",
"html_url": "https:\/\/github.com\/RashmikaEkanayake"
},
"html_url": "https:\/\/github.com\/RashmikaEkanayake\/Privilege-Escalation-CVE-2019-13272-",
"description": null,
"fork": false,
"created_at": "2020-05-12T11:53:55Z",
"updated_at": "2020-05-12T11:57:58Z",
"pushed_at": "2020-05-12T11:57:56Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 263412118,
"name": "vulnerability-exploitation",
"full_name": "Tharana\/vulnerability-exploitation",
"owner": {
"login": "Tharana",
"id": 31825168,
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/31825168?v=4",
"html_url": "https:\/\/github.com\/Tharana"
},
"html_url": "https:\/\/github.com\/Tharana\/vulnerability-exploitation",
"description": "Local Root vulnerability- CVE-2019-13272 \/ Security Bypass Vulnerability CVE-2019-14287\/Google Android - 'Stagefright' Remote Code Execution - CVE-2015-1538",
"fork": false,
"created_at": "2020-05-12T17:59:48Z",
"updated_at": "2020-07-23T11:21:25Z",
"pushed_at": "2020-05-12T18:13:11Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 1,
"forks": 1,
"watchers": 1,
"score": 0
},
{
"id": 263515561,
"name": "CVE-2019-13272---Documentation",
"full_name": "teddy47\/CVE-2019-13272---Documentation",
"owner": {
"login": "teddy47",
"id": 48222561,
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/48222561?v=4",
"html_url": "https:\/\/github.com\/teddy47"
},
"html_url": "https:\/\/github.com\/teddy47\/CVE-2019-13272---Documentation",
"description": null,
"fork": false,
"created_at": "2020-05-13T03:28:45Z",
"updated_at": "2020-05-13T03:33:11Z",
"pushed_at": "2020-05-13T03:33:09Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
}
]