PoC-in-GitHub/2019/CVE-2019-13272.json
2021-12-16 03:14:01 +09:00

326 lines
No EOL
12 KiB
JSON
Raw Blame History

This file contains ambiguous Unicode characters

This file contains Unicode characters that might be confused with other characters. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

[
{
"id": 199781061,
"name": "CVE-2019-13272",
"full_name": "jas502n\/CVE-2019-13272",
"owner": {
"login": "jas502n",
"id": 16593068,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/16593068?v=4",
"html_url": "https:\/\/github.com\/jas502n"
},
"html_url": "https:\/\/github.com\/jas502n\/CVE-2019-13272",
"description": "Linux 4.10 < 5.1.17 PTRACE_TRACEME local root",
"fork": false,
"created_at": "2019-07-31T04:51:43Z",
"updated_at": "2021-12-15T14:36:53Z",
"pushed_at": "2019-08-01T16:02:59Z",
"stargazers_count": 266,
"watchers_count": 266,
"forks_count": 101,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 101,
"watchers": 266,
"score": 0
},
{
"id": 199794841,
"name": "CVE-2019-13272",
"full_name": "Cyc1eC\/CVE-2019-13272",
"owner": {
"login": "Cyc1eC",
"id": 26767829,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/26767829?v=4",
"html_url": "https:\/\/github.com\/Cyc1eC"
},
"html_url": "https:\/\/github.com\/Cyc1eC\/CVE-2019-13272",
"description": "The exploit for CVE-2019-13272",
"fork": false,
"created_at": "2019-07-31T06:36:21Z",
"updated_at": "2021-12-05T22:21:06Z",
"pushed_at": "2019-07-31T07:05:04Z",
"stargazers_count": 6,
"watchers_count": 6,
"forks_count": 6,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 6,
"watchers": 6,
"score": 0
},
{
"id": 200459882,
"name": "cve-2019-13272",
"full_name": "bigbigliang-malwarebenchmark\/cve-2019-13272",
"owner": {
"login": "bigbigliang-malwarebenchmark",
"id": 45776349,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/45776349?v=4",
"html_url": "https:\/\/github.com\/bigbigliang-malwarebenchmark"
},
"html_url": "https:\/\/github.com\/bigbigliang-malwarebenchmark\/cve-2019-13272",
"description": "提权漏洞",
"fork": false,
"created_at": "2019-08-04T06:51:36Z",
"updated_at": "2021-12-05T22:21:13Z",
"pushed_at": "2019-08-04T07:06:47Z",
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 2,
"score": 0
},
{
"id": 200948343,
"name": "CVE-2019-13272",
"full_name": "oneoy\/CVE-2019-13272",
"owner": {
"login": "oneoy",
"id": 38435398,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/38435398?v=4",
"html_url": "https:\/\/github.com\/oneoy"
},
"html_url": "https:\/\/github.com\/oneoy\/CVE-2019-13272",
"description": "linux 提权",
"fork": false,
"created_at": "2019-08-07T01:21:26Z",
"updated_at": "2021-12-11T01:01:54Z",
"pushed_at": "2019-08-07T01:21:38Z",
"stargazers_count": 5,
"watchers_count": 5,
"forks_count": 7,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 7,
"watchers": 5,
"score": 0
},
{
"id": 209440455,
"name": "CVE-2019-13272",
"full_name": "Huandtx\/CVE-2019-13272",
"owner": {
"login": "Huandtx",
"id": 44591522,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/44591522?v=4",
"html_url": "https:\/\/github.com\/Huandtx"
},
"html_url": "https:\/\/github.com\/Huandtx\/CVE-2019-13272",
"description": "5.1.17之前的Linux内核中普通用户执行文件提权为root用户",
"fork": false,
"created_at": "2019-09-19T01:58:35Z",
"updated_at": "2021-12-05T22:21:24Z",
"pushed_at": "2019-09-19T02:09:28Z",
"stargazers_count": 3,
"watchers_count": 3,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 3,
"score": 0
},
{
"id": 245129315,
"name": "CVE-2019-13272",
"full_name": "polosec\/CVE-2019-13272",
"owner": {
"login": "polosec",
"id": 34666152,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/34666152?v=4",
"html_url": "https:\/\/github.com\/polosec"
},
"html_url": "https:\/\/github.com\/polosec\/CVE-2019-13272",
"description": "CVE-2019-13272",
"fork": false,
"created_at": "2020-03-05T10:10:19Z",
"updated_at": "2021-12-05T22:21:31Z",
"pushed_at": "2020-03-05T10:16:17Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 1,
"score": 0
},
{
"id": 260622118,
"name": "-Kernel-ptrace-c-mishandles-vulnerability-CVE-2019-13272",
"full_name": "sumedhaDharmasena\/-Kernel-ptrace-c-mishandles-vulnerability-CVE-2019-13272",
"owner": {
"login": "sumedhaDharmasena",
"id": 43642069,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/43642069?v=4",
"html_url": "https:\/\/github.com\/sumedhaDharmasena"
},
"html_url": "https:\/\/github.com\/sumedhaDharmasena\/-Kernel-ptrace-c-mishandles-vulnerability-CVE-2019-13272",
"description": null,
"fork": false,
"created_at": "2020-05-02T05:41:54Z",
"updated_at": "2021-12-05T22:21:39Z",
"pushed_at": "2020-05-02T06:05:54Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 1,
"score": 0
},
{
"id": 263022112,
"name": "Exploiting-a-Linux-kernel-vulnerability",
"full_name": "Tharana\/Exploiting-a-Linux-kernel-vulnerability",
"owner": {
"login": "Tharana",
"id": 31825168,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/31825168?v=4",
"html_url": "https:\/\/github.com\/Tharana"
},
"html_url": "https:\/\/github.com\/Tharana\/Exploiting-a-Linux-kernel-vulnerability",
"description": "Local Root vulnerability- CVE-2019-13272 \/ Security Bypass Vulnerability CVE-2019-14287",
"fork": false,
"created_at": "2020-05-11T11:24:29Z",
"updated_at": "2020-05-11T11:31:32Z",
"pushed_at": "2020-05-11T11:30:54Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"score": 0
},
{
"id": 263322619,
"name": "Privilege-Escalation-CVE-2019-13272-",
"full_name": "RashmikaEkanayake\/Privilege-Escalation-CVE-2019-13272-",
"owner": {
"login": "RashmikaEkanayake",
"id": 61092678,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/61092678?v=4",
"html_url": "https:\/\/github.com\/RashmikaEkanayake"
},
"html_url": "https:\/\/github.com\/RashmikaEkanayake\/Privilege-Escalation-CVE-2019-13272-",
"description": null,
"fork": false,
"created_at": "2020-05-12T11:53:55Z",
"updated_at": "2020-05-12T11:57:58Z",
"pushed_at": "2020-05-12T11:57:56Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 263412118,
"name": "vulnerability-exploitation",
"full_name": "Tharana\/vulnerability-exploitation",
"owner": {
"login": "Tharana",
"id": 31825168,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/31825168?v=4",
"html_url": "https:\/\/github.com\/Tharana"
},
"html_url": "https:\/\/github.com\/Tharana\/vulnerability-exploitation",
"description": "Local Root vulnerability- CVE-2019-13272 \/ Security Bypass Vulnerability CVE-2019-14287\/Google Android - 'Stagefright' Remote Code Execution - CVE-2015-1538",
"fork": false,
"created_at": "2020-05-12T17:59:48Z",
"updated_at": "2021-09-17T11:03:25Z",
"pushed_at": "2020-05-12T18:13:11Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 1,
"score": 0
},
{
"id": 263515561,
"name": "CVE-2019-13272---Documentation",
"full_name": "teddy47\/CVE-2019-13272---Documentation",
"owner": {
"login": "teddy47",
"id": 48222561,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/48222561?v=4",
"html_url": "https:\/\/github.com\/teddy47"
},
"html_url": "https:\/\/github.com\/teddy47\/CVE-2019-13272---Documentation",
"description": null,
"fork": false,
"created_at": "2020-05-13T03:28:45Z",
"updated_at": "2020-05-13T03:33:11Z",
"pushed_at": "2020-05-13T03:33:09Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 369313411,
"name": "CVE-2019-13272-Local-Privilege-Escalation",
"full_name": "jana30116\/CVE-2019-13272-Local-Privilege-Escalation",
"owner": {
"login": "jana30116",
"id": 53650676,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/53650676?v=4",
"html_url": "https:\/\/github.com\/jana30116"
},
"html_url": "https:\/\/github.com\/jana30116\/CVE-2019-13272-Local-Privilege-Escalation",
"description": "Local Privilege Escalation is a way to take advantage of flaws in code or service administration that can manage regular or guest users for particular device activities or transfer root user privileges to master or client. User rights admin. The licenses or privileges may be violated by such undesired amendments, as the system may be disrupted by frequent users unless they have shell or root authorization. So, someone, someone, it may become dangerous and be used to obtain access to a higher level. ",
"fork": false,
"created_at": "2021-05-20T19:13:28Z",
"updated_at": "2021-05-20T19:48:25Z",
"pushed_at": "2021-05-20T19:48:22Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
}
]