mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-30 19:31:39 +01:00
191 lines
No EOL
7.2 KiB
JSON
191 lines
No EOL
7.2 KiB
JSON
[
|
||
{
|
||
"id": 245129315,
|
||
"name": "CVE-2019-13272",
|
||
"full_name": "polosec\/CVE-2019-13272",
|
||
"owner": {
|
||
"login": "polosec",
|
||
"id": 34666152,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/34666152?v=4",
|
||
"html_url": "https:\/\/github.com\/polosec"
|
||
},
|
||
"html_url": "https:\/\/github.com\/polosec\/CVE-2019-13272",
|
||
"description": "CVE-2019-13272",
|
||
"fork": false,
|
||
"created_at": "2020-03-05T10:10:19Z",
|
||
"updated_at": "2021-12-05T22:21:31Z",
|
||
"pushed_at": "2020-03-05T10:16:17Z",
|
||
"stargazers_count": 1,
|
||
"watchers_count": 1,
|
||
"forks_count": 1,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 1,
|
||
"watchers": 1,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 260622118,
|
||
"name": "-Kernel-ptrace-c-mishandles-vulnerability-CVE-2019-13272",
|
||
"full_name": "sumedhaDharmasena\/-Kernel-ptrace-c-mishandles-vulnerability-CVE-2019-13272",
|
||
"owner": {
|
||
"login": "sumedhaDharmasena",
|
||
"id": 43642069,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/43642069?v=4",
|
||
"html_url": "https:\/\/github.com\/sumedhaDharmasena"
|
||
},
|
||
"html_url": "https:\/\/github.com\/sumedhaDharmasena\/-Kernel-ptrace-c-mishandles-vulnerability-CVE-2019-13272",
|
||
"description": null,
|
||
"fork": false,
|
||
"created_at": "2020-05-02T05:41:54Z",
|
||
"updated_at": "2021-12-05T22:21:39Z",
|
||
"pushed_at": "2020-05-02T06:05:54Z",
|
||
"stargazers_count": 1,
|
||
"watchers_count": 1,
|
||
"forks_count": 1,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 1,
|
||
"watchers": 1,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 263022112,
|
||
"name": "Exploiting-a-Linux-kernel-vulnerability",
|
||
"full_name": "Tharana\/Exploiting-a-Linux-kernel-vulnerability",
|
||
"owner": {
|
||
"login": "Tharana",
|
||
"id": 31825168,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/31825168?v=4",
|
||
"html_url": "https:\/\/github.com\/Tharana"
|
||
},
|
||
"html_url": "https:\/\/github.com\/Tharana\/Exploiting-a-Linux-kernel-vulnerability",
|
||
"description": "Local Root vulnerability- CVE-2019-13272 \/ Security Bypass Vulnerability – CVE-2019-14287",
|
||
"fork": false,
|
||
"created_at": "2020-05-11T11:24:29Z",
|
||
"updated_at": "2020-05-11T11:31:32Z",
|
||
"pushed_at": "2020-05-11T11:30:54Z",
|
||
"stargazers_count": 1,
|
||
"watchers_count": 1,
|
||
"forks_count": 0,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 0,
|
||
"watchers": 1,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 263322619,
|
||
"name": "Privilege-Escalation-CVE-2019-13272-",
|
||
"full_name": "RashmikaEkanayake\/Privilege-Escalation-CVE-2019-13272-",
|
||
"owner": {
|
||
"login": "RashmikaEkanayake",
|
||
"id": 61092678,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/61092678?v=4",
|
||
"html_url": "https:\/\/github.com\/RashmikaEkanayake"
|
||
},
|
||
"html_url": "https:\/\/github.com\/RashmikaEkanayake\/Privilege-Escalation-CVE-2019-13272-",
|
||
"description": null,
|
||
"fork": false,
|
||
"created_at": "2020-05-12T11:53:55Z",
|
||
"updated_at": "2020-05-12T11:57:58Z",
|
||
"pushed_at": "2020-05-12T11:57:56Z",
|
||
"stargazers_count": 0,
|
||
"watchers_count": 0,
|
||
"forks_count": 0,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 0,
|
||
"watchers": 0,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 263412118,
|
||
"name": "vulnerability-exploitation",
|
||
"full_name": "Tharana\/vulnerability-exploitation",
|
||
"owner": {
|
||
"login": "Tharana",
|
||
"id": 31825168,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/31825168?v=4",
|
||
"html_url": "https:\/\/github.com\/Tharana"
|
||
},
|
||
"html_url": "https:\/\/github.com\/Tharana\/vulnerability-exploitation",
|
||
"description": "Local Root vulnerability- CVE-2019-13272 \/ Security Bypass Vulnerability – CVE-2019-14287\/Google Android - 'Stagefright' Remote Code Execution - CVE-2015-1538",
|
||
"fork": false,
|
||
"created_at": "2020-05-12T17:59:48Z",
|
||
"updated_at": "2021-09-17T11:03:25Z",
|
||
"pushed_at": "2020-05-12T18:13:11Z",
|
||
"stargazers_count": 1,
|
||
"watchers_count": 1,
|
||
"forks_count": 1,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 1,
|
||
"watchers": 1,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 263515561,
|
||
"name": "CVE-2019-13272---Documentation",
|
||
"full_name": "teddy47\/CVE-2019-13272---Documentation",
|
||
"owner": {
|
||
"login": "teddy47",
|
||
"id": 48222561,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/48222561?v=4",
|
||
"html_url": "https:\/\/github.com\/teddy47"
|
||
},
|
||
"html_url": "https:\/\/github.com\/teddy47\/CVE-2019-13272---Documentation",
|
||
"description": null,
|
||
"fork": false,
|
||
"created_at": "2020-05-13T03:28:45Z",
|
||
"updated_at": "2020-05-13T03:33:11Z",
|
||
"pushed_at": "2020-05-13T03:33:09Z",
|
||
"stargazers_count": 0,
|
||
"watchers_count": 0,
|
||
"forks_count": 0,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 0,
|
||
"watchers": 0,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 369313411,
|
||
"name": "CVE-2019-13272-Local-Privilege-Escalation",
|
||
"full_name": "jana30116\/CVE-2019-13272-Local-Privilege-Escalation",
|
||
"owner": {
|
||
"login": "jana30116",
|
||
"id": 53650676,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/53650676?v=4",
|
||
"html_url": "https:\/\/github.com\/jana30116"
|
||
},
|
||
"html_url": "https:\/\/github.com\/jana30116\/CVE-2019-13272-Local-Privilege-Escalation",
|
||
"description": "Local Privilege Escalation is a way to take advantage of flaws in code or service administration that can manage regular or guest users for particular device activities or transfer root user privileges to master or client. User rights admin. The licenses or privileges may be violated by such undesired amendments, as the system may be disrupted by frequent users unless they have shell or root authorization. So, someone, someone, it may become dangerous and be used to obtain access to a higher level. ",
|
||
"fork": false,
|
||
"created_at": "2021-05-20T19:13:28Z",
|
||
"updated_at": "2021-05-20T19:48:25Z",
|
||
"pushed_at": "2021-05-20T19:48:22Z",
|
||
"stargazers_count": 0,
|
||
"watchers_count": 0,
|
||
"forks_count": 0,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 0,
|
||
"watchers": 0,
|
||
"score": 0
|
||
}
|
||
] |