mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-16 04:42:22 +01:00
482 lines
No EOL
17 KiB
JSON
482 lines
No EOL
17 KiB
JSON
[
|
||
{
|
||
"id": 199781061,
|
||
"name": "CVE-2019-13272",
|
||
"full_name": "jas502n\/CVE-2019-13272",
|
||
"owner": {
|
||
"login": "jas502n",
|
||
"id": 16593068,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/16593068?v=4",
|
||
"html_url": "https:\/\/github.com\/jas502n"
|
||
},
|
||
"html_url": "https:\/\/github.com\/jas502n\/CVE-2019-13272",
|
||
"description": "Linux 4.10 < 5.1.17 PTRACE_TRACEME local root",
|
||
"fork": false,
|
||
"created_at": "2019-07-31T04:51:43Z",
|
||
"updated_at": "2023-09-16T21:24:35Z",
|
||
"pushed_at": "2019-08-01T16:02:59Z",
|
||
"stargazers_count": 309,
|
||
"watchers_count": 309,
|
||
"has_discussions": false,
|
||
"forks_count": 117,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"web_commit_signoff_required": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 117,
|
||
"watchers": 309,
|
||
"score": 0,
|
||
"subscribers_count": 8
|
||
},
|
||
{
|
||
"id": 199794841,
|
||
"name": "CVE-2019-13272",
|
||
"full_name": "Cyc1eC\/CVE-2019-13272",
|
||
"owner": {
|
||
"login": "Cyc1eC",
|
||
"id": 26767829,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/26767829?v=4",
|
||
"html_url": "https:\/\/github.com\/Cyc1eC"
|
||
},
|
||
"html_url": "https:\/\/github.com\/Cyc1eC\/CVE-2019-13272",
|
||
"description": "The exploit for CVE-2019-13272",
|
||
"fork": false,
|
||
"created_at": "2019-07-31T06:36:21Z",
|
||
"updated_at": "2023-09-16T21:24:35Z",
|
||
"pushed_at": "2019-07-31T07:05:04Z",
|
||
"stargazers_count": 5,
|
||
"watchers_count": 5,
|
||
"has_discussions": false,
|
||
"forks_count": 6,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"web_commit_signoff_required": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 6,
|
||
"watchers": 5,
|
||
"score": 0,
|
||
"subscribers_count": 3
|
||
},
|
||
{
|
||
"id": 200459882,
|
||
"name": "cve-2019-13272",
|
||
"full_name": "bigbigliang-malwarebenchmark\/cve-2019-13272",
|
||
"owner": {
|
||
"login": "bigbigliang-malwarebenchmark",
|
||
"id": 45776349,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/45776349?v=4",
|
||
"html_url": "https:\/\/github.com\/bigbigliang-malwarebenchmark"
|
||
},
|
||
"html_url": "https:\/\/github.com\/bigbigliang-malwarebenchmark\/cve-2019-13272",
|
||
"description": "提权漏洞",
|
||
"fork": false,
|
||
"created_at": "2019-08-04T06:51:36Z",
|
||
"updated_at": "2023-09-16T21:24:43Z",
|
||
"pushed_at": "2019-08-04T07:06:47Z",
|
||
"stargazers_count": 1,
|
||
"watchers_count": 1,
|
||
"has_discussions": false,
|
||
"forks_count": 1,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"web_commit_signoff_required": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 1,
|
||
"watchers": 1,
|
||
"score": 0,
|
||
"subscribers_count": 2
|
||
},
|
||
{
|
||
"id": 200948343,
|
||
"name": "CVE-2019-13272",
|
||
"full_name": "oneoy\/CVE-2019-13272",
|
||
"owner": {
|
||
"login": "oneoy",
|
||
"id": 38435398,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/38435398?v=4",
|
||
"html_url": "https:\/\/github.com\/oneoy"
|
||
},
|
||
"html_url": "https:\/\/github.com\/oneoy\/CVE-2019-13272",
|
||
"description": "linux 提权",
|
||
"fork": false,
|
||
"created_at": "2019-08-07T01:21:26Z",
|
||
"updated_at": "2023-09-16T21:24:47Z",
|
||
"pushed_at": "2019-08-07T01:21:38Z",
|
||
"stargazers_count": 3,
|
||
"watchers_count": 3,
|
||
"has_discussions": false,
|
||
"forks_count": 9,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"web_commit_signoff_required": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 9,
|
||
"watchers": 3,
|
||
"score": 0,
|
||
"subscribers_count": 2
|
||
},
|
||
{
|
||
"id": 209440455,
|
||
"name": "CVE-2019-13272",
|
||
"full_name": "Huandtx\/CVE-2019-13272",
|
||
"owner": {
|
||
"login": "Huandtx",
|
||
"id": 44591522,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/44591522?v=4",
|
||
"html_url": "https:\/\/github.com\/Huandtx"
|
||
},
|
||
"html_url": "https:\/\/github.com\/Huandtx\/CVE-2019-13272",
|
||
"description": "5.1.17之前的Linux内核中普通用户执行文件提权为root用户",
|
||
"fork": false,
|
||
"created_at": "2019-09-19T01:58:35Z",
|
||
"updated_at": "2023-09-16T21:26:05Z",
|
||
"pushed_at": "2019-09-19T02:09:28Z",
|
||
"stargazers_count": 3,
|
||
"watchers_count": 3,
|
||
"has_discussions": false,
|
||
"forks_count": 4,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"web_commit_signoff_required": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 4,
|
||
"watchers": 3,
|
||
"score": 0,
|
||
"subscribers_count": 1
|
||
},
|
||
{
|
||
"id": 245129315,
|
||
"name": "CVE-2019-13272",
|
||
"full_name": "polosec\/CVE-2019-13272",
|
||
"owner": {
|
||
"login": "polosec",
|
||
"id": 34666152,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/34666152?v=4",
|
||
"html_url": "https:\/\/github.com\/polosec"
|
||
},
|
||
"html_url": "https:\/\/github.com\/polosec\/CVE-2019-13272",
|
||
"description": "CVE-2019-13272",
|
||
"fork": false,
|
||
"created_at": "2020-03-05T10:10:19Z",
|
||
"updated_at": "2023-09-16T21:30:55Z",
|
||
"pushed_at": "2020-03-05T10:16:17Z",
|
||
"stargazers_count": 0,
|
||
"watchers_count": 0,
|
||
"has_discussions": false,
|
||
"forks_count": 1,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"web_commit_signoff_required": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 1,
|
||
"watchers": 0,
|
||
"score": 0,
|
||
"subscribers_count": 1
|
||
},
|
||
{
|
||
"id": 260622118,
|
||
"name": "-Kernel-ptrace-c-mishandles-vulnerability-CVE-2019-13272",
|
||
"full_name": "sumedhaDharmasena\/-Kernel-ptrace-c-mishandles-vulnerability-CVE-2019-13272",
|
||
"owner": {
|
||
"login": "sumedhaDharmasena",
|
||
"id": 43642069,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/43642069?v=4",
|
||
"html_url": "https:\/\/github.com\/sumedhaDharmasena"
|
||
},
|
||
"html_url": "https:\/\/github.com\/sumedhaDharmasena\/-Kernel-ptrace-c-mishandles-vulnerability-CVE-2019-13272",
|
||
"description": null,
|
||
"fork": false,
|
||
"created_at": "2020-05-02T05:41:54Z",
|
||
"updated_at": "2023-09-16T21:33:27Z",
|
||
"pushed_at": "2020-05-02T06:05:54Z",
|
||
"stargazers_count": 0,
|
||
"watchers_count": 0,
|
||
"has_discussions": false,
|
||
"forks_count": 1,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"web_commit_signoff_required": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 1,
|
||
"watchers": 0,
|
||
"score": 0,
|
||
"subscribers_count": 1
|
||
},
|
||
{
|
||
"id": 263022112,
|
||
"name": "Exploiting-a-Linux-kernel-vulnerability",
|
||
"full_name": "Tharana\/Exploiting-a-Linux-kernel-vulnerability",
|
||
"owner": {
|
||
"login": "Tharana",
|
||
"id": 31825168,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/31825168?v=4",
|
||
"html_url": "https:\/\/github.com\/Tharana"
|
||
},
|
||
"html_url": "https:\/\/github.com\/Tharana\/Exploiting-a-Linux-kernel-vulnerability",
|
||
"description": "Local Root vulnerability- CVE-2019-13272 \/ Security Bypass Vulnerability – CVE-2019-14287",
|
||
"fork": false,
|
||
"created_at": "2020-05-11T11:24:29Z",
|
||
"updated_at": "2020-05-11T11:31:32Z",
|
||
"pushed_at": "2020-05-11T11:30:54Z",
|
||
"stargazers_count": 1,
|
||
"watchers_count": 1,
|
||
"has_discussions": false,
|
||
"forks_count": 0,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"web_commit_signoff_required": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 0,
|
||
"watchers": 1,
|
||
"score": 0,
|
||
"subscribers_count": 2
|
||
},
|
||
{
|
||
"id": 263322619,
|
||
"name": "Privilege-Escalation-CVE-2019-13272-",
|
||
"full_name": "RashmikaEkanayake\/Privilege-Escalation-CVE-2019-13272-",
|
||
"owner": {
|
||
"login": "RashmikaEkanayake",
|
||
"id": 61092678,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/61092678?v=4",
|
||
"html_url": "https:\/\/github.com\/RashmikaEkanayake"
|
||
},
|
||
"html_url": "https:\/\/github.com\/RashmikaEkanayake\/Privilege-Escalation-CVE-2019-13272-",
|
||
"description": null,
|
||
"fork": false,
|
||
"created_at": "2020-05-12T11:53:55Z",
|
||
"updated_at": "2020-05-12T11:57:58Z",
|
||
"pushed_at": "2020-05-12T11:57:56Z",
|
||
"stargazers_count": 0,
|
||
"watchers_count": 0,
|
||
"has_discussions": false,
|
||
"forks_count": 0,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"web_commit_signoff_required": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 0,
|
||
"watchers": 0,
|
||
"score": 0,
|
||
"subscribers_count": 1
|
||
},
|
||
{
|
||
"id": 263412118,
|
||
"name": "vulnerability-exploitation",
|
||
"full_name": "Tharana\/vulnerability-exploitation",
|
||
"owner": {
|
||
"login": "Tharana",
|
||
"id": 31825168,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/31825168?v=4",
|
||
"html_url": "https:\/\/github.com\/Tharana"
|
||
},
|
||
"html_url": "https:\/\/github.com\/Tharana\/vulnerability-exploitation",
|
||
"description": "Local Root vulnerability- CVE-2019-13272 \/ Security Bypass Vulnerability – CVE-2019-14287\/Google Android - 'Stagefright' Remote Code Execution - CVE-2015-1538",
|
||
"fork": false,
|
||
"created_at": "2020-05-12T17:59:48Z",
|
||
"updated_at": "2021-09-17T11:03:25Z",
|
||
"pushed_at": "2020-05-12T18:13:11Z",
|
||
"stargazers_count": 1,
|
||
"watchers_count": 1,
|
||
"has_discussions": false,
|
||
"forks_count": 2,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"web_commit_signoff_required": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 2,
|
||
"watchers": 1,
|
||
"score": 0,
|
||
"subscribers_count": 2
|
||
},
|
||
{
|
||
"id": 263515561,
|
||
"name": "CVE-2019-13272---Documentation",
|
||
"full_name": "teddy47\/CVE-2019-13272---Documentation",
|
||
"owner": {
|
||
"login": "teddy47",
|
||
"id": 48222561,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/48222561?v=4",
|
||
"html_url": "https:\/\/github.com\/teddy47"
|
||
},
|
||
"html_url": "https:\/\/github.com\/teddy47\/CVE-2019-13272---Documentation",
|
||
"description": null,
|
||
"fork": false,
|
||
"created_at": "2020-05-13T03:28:45Z",
|
||
"updated_at": "2020-05-13T03:33:11Z",
|
||
"pushed_at": "2020-05-13T03:33:09Z",
|
||
"stargazers_count": 0,
|
||
"watchers_count": 0,
|
||
"has_discussions": false,
|
||
"forks_count": 0,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"web_commit_signoff_required": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 0,
|
||
"watchers": 0,
|
||
"score": 0,
|
||
"subscribers_count": 1
|
||
},
|
||
{
|
||
"id": 305243026,
|
||
"name": "CVE-2019-13272",
|
||
"full_name": "datntsec\/CVE-2019-13272",
|
||
"owner": {
|
||
"login": "datntsec",
|
||
"id": 70559607,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/70559607?v=4",
|
||
"html_url": "https:\/\/github.com\/datntsec"
|
||
},
|
||
"html_url": "https:\/\/github.com\/datntsec\/CVE-2019-13272",
|
||
"description": null,
|
||
"fork": false,
|
||
"created_at": "2020-10-19T02:33:29Z",
|
||
"updated_at": "2023-04-17T08:54:07Z",
|
||
"pushed_at": "2020-12-25T09:10:51Z",
|
||
"stargazers_count": 0,
|
||
"watchers_count": 0,
|
||
"has_discussions": false,
|
||
"forks_count": 0,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"web_commit_signoff_required": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 0,
|
||
"watchers": 0,
|
||
"score": 0,
|
||
"subscribers_count": 1
|
||
},
|
||
{
|
||
"id": 369313411,
|
||
"name": "CVE-2019-13272-Local-Privilege-Escalation",
|
||
"full_name": "jana30116\/CVE-2019-13272-Local-Privilege-Escalation",
|
||
"owner": {
|
||
"login": "jana30116",
|
||
"id": 53650676,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/53650676?v=4",
|
||
"html_url": "https:\/\/github.com\/jana30116"
|
||
},
|
||
"html_url": "https:\/\/github.com\/jana30116\/CVE-2019-13272-Local-Privilege-Escalation",
|
||
"description": "Local Privilege Escalation is a way to take advantage of flaws in code or service administration that can manage regular or guest users for particular device activities or transfer root user privileges to master or client. User rights admin. The licenses or privileges may be violated by such undesired amendments, as the system may be disrupted by frequent users unless they have shell or root authorization. So, someone, someone, it may become dangerous and be used to obtain access to a higher level. ",
|
||
"fork": false,
|
||
"created_at": "2021-05-20T19:13:28Z",
|
||
"updated_at": "2021-05-20T19:48:25Z",
|
||
"pushed_at": "2021-05-20T19:48:22Z",
|
||
"stargazers_count": 0,
|
||
"watchers_count": 0,
|
||
"has_discussions": false,
|
||
"forks_count": 0,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"web_commit_signoff_required": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 0,
|
||
"watchers": 0,
|
||
"score": 0,
|
||
"subscribers_count": 1
|
||
},
|
||
{
|
||
"id": 468151152,
|
||
"name": "CVE-2019-13272",
|
||
"full_name": "babyshen\/CVE-2019-13272",
|
||
"owner": {
|
||
"login": "babyshen",
|
||
"id": 11402197,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/11402197?v=4",
|
||
"html_url": "https:\/\/github.com\/babyshen"
|
||
},
|
||
"html_url": "https:\/\/github.com\/babyshen\/CVE-2019-13272",
|
||
"description": null,
|
||
"fork": false,
|
||
"created_at": "2022-03-10T01:27:46Z",
|
||
"updated_at": "2022-03-10T01:29:13Z",
|
||
"pushed_at": "2022-03-10T01:29:10Z",
|
||
"stargazers_count": 0,
|
||
"watchers_count": 0,
|
||
"has_discussions": false,
|
||
"forks_count": 0,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"web_commit_signoff_required": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 0,
|
||
"watchers": 0,
|
||
"score": 0,
|
||
"subscribers_count": 1
|
||
},
|
||
{
|
||
"id": 565617725,
|
||
"name": "secureCodingDemo",
|
||
"full_name": "GgKendall\/secureCodingDemo",
|
||
"owner": {
|
||
"login": "GgKendall",
|
||
"id": 77352114,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/77352114?v=4",
|
||
"html_url": "https:\/\/github.com\/GgKendall"
|
||
},
|
||
"html_url": "https:\/\/github.com\/GgKendall\/secureCodingDemo",
|
||
"description": "fall2022 secure coding CVE-2019-13272 : Linux Kernel Improper Privilege Management Vulnerability",
|
||
"fork": false,
|
||
"created_at": "2022-11-14T00:07:04Z",
|
||
"updated_at": "2022-11-14T16:35:37Z",
|
||
"pushed_at": "2022-11-14T00:17:04Z",
|
||
"stargazers_count": 0,
|
||
"watchers_count": 0,
|
||
"has_discussions": false,
|
||
"forks_count": 0,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"web_commit_signoff_required": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 0,
|
||
"watchers": 0,
|
||
"score": 0,
|
||
"subscribers_count": 1
|
||
},
|
||
{
|
||
"id": 687084359,
|
||
"name": "CVE-2019-13272",
|
||
"full_name": "asepsaepdin\/CVE-2019-13272",
|
||
"owner": {
|
||
"login": "asepsaepdin",
|
||
"id": 122620685,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/122620685?v=4",
|
||
"html_url": "https:\/\/github.com\/asepsaepdin"
|
||
},
|
||
"html_url": "https:\/\/github.com\/asepsaepdin\/CVE-2019-13272",
|
||
"description": null,
|
||
"fork": false,
|
||
"created_at": "2023-09-04T15:16:09Z",
|
||
"updated_at": "2023-09-04T15:34:51Z",
|
||
"pushed_at": "2023-09-05T15:04:46Z",
|
||
"stargazers_count": 0,
|
||
"watchers_count": 0,
|
||
"has_discussions": false,
|
||
"forks_count": 0,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"web_commit_signoff_required": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 0,
|
||
"watchers": 0,
|
||
"score": 0,
|
||
"subscribers_count": 1
|
||
}
|
||
] |