PoC-in-GitHub/2019/CVE-2019-13272.json
2019-12-18 12:30:02 +09:00

94 lines
No EOL
3.1 KiB
JSON

[
{
"id": 199781061,
"name": "CVE-2019-13272",
"full_name": "jas502n\/CVE-2019-13272",
"owner": {
"login": "jas502n",
"id": 16593068,
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/16593068?v=4",
"html_url": "https:\/\/github.com\/jas502n"
},
"html_url": "https:\/\/github.com\/jas502n\/CVE-2019-13272",
"description": "Linux 4.10 < 5.1.17 PTRACE_TRACEME local root",
"fork": false,
"created_at": "2019-07-31T04:51:43Z",
"updated_at": "2019-12-14T15:48:00Z",
"pushed_at": "2019-08-01T16:02:59Z",
"stargazers_count": 201,
"watchers_count": 201,
"forks_count": 69,
"forks": 69,
"watchers": 201,
"score": 0
},
{
"id": 199794841,
"name": "CVE-2019-13272",
"full_name": "Cyc1eC\/CVE-2019-13272",
"owner": {
"login": "Cyc1eC",
"id": 26767829,
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/26767829?v=4",
"html_url": "https:\/\/github.com\/Cyc1eC"
},
"html_url": "https:\/\/github.com\/Cyc1eC\/CVE-2019-13272",
"description": "The exploit for CVE-2019-13272",
"fork": false,
"created_at": "2019-07-31T06:36:21Z",
"updated_at": "2019-12-17T14:57:32Z",
"pushed_at": "2019-07-31T07:05:04Z",
"stargazers_count": 3,
"watchers_count": 3,
"forks_count": 4,
"forks": 4,
"watchers": 3,
"score": 0
},
{
"id": 200948343,
"name": "CVE-2019-13272",
"full_name": "oneoy\/CVE-2019-13272",
"owner": {
"login": "oneoy",
"id": 38435398,
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/38435398?v=4",
"html_url": "https:\/\/github.com\/oneoy"
},
"html_url": "https:\/\/github.com\/oneoy\/CVE-2019-13272",
"description": "linux 提权",
"fork": false,
"created_at": "2019-08-07T01:21:26Z",
"updated_at": "2019-12-02T02:28:08Z",
"pushed_at": "2019-08-07T01:21:38Z",
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 2,
"forks": 2,
"watchers": 2,
"score": 0
},
{
"id": 209440455,
"name": "CVE-2019-13272",
"full_name": "Huandtx\/CVE-2019-13272",
"owner": {
"login": "Huandtx",
"id": 44591522,
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/44591522?v=4",
"html_url": "https:\/\/github.com\/Huandtx"
},
"html_url": "https:\/\/github.com\/Huandtx\/CVE-2019-13272",
"description": "5.1.17之前的Linux内核中普通用户执行文件提权为root用户",
"fork": false,
"created_at": "2019-09-19T01:58:35Z",
"updated_at": "2019-09-26T00:58:12Z",
"pushed_at": "2019-09-19T02:09:28Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 0,
"forks": 0,
"watchers": 1,
"score": 0
}
]