PoC-in-GitHub/2016/CVE-2016-5195.json
2025-03-12 03:34:26 +09:00

826 lines
No EOL
28 KiB
JSON
Raw Permalink Blame History

This file contains ambiguous Unicode characters

This file contains Unicode characters that might be confused with other characters. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

[
{
"id": 71532888,
"name": "CVE-2016-5195",
"full_name": "KosukeShimofuji\/CVE-2016-5195",
"owner": {
"login": "KosukeShimofuji",
"id": 19923520,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/19923520?v=4",
"html_url": "https:\/\/github.com\/KosukeShimofuji",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/KosukeShimofuji\/CVE-2016-5195",
"description": "Dirty Cow",
"fork": false,
"created_at": "2016-10-21T05:30:17Z",
"updated_at": "2018-05-18T06:55:48Z",
"pushed_at": "2016-10-21T05:30:17Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 71534940,
"name": "CVE-2016-5195",
"full_name": "ASRTeam\/CVE-2016-5195",
"owner": {
"login": "ASRTeam",
"id": 22948915,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/22948915?v=4",
"html_url": "https:\/\/github.com\/ASRTeam",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/ASRTeam\/CVE-2016-5195",
"description": null,
"fork": false,
"created_at": "2016-10-21T06:06:05Z",
"updated_at": "2018-02-24T11:08:42Z",
"pushed_at": "2016-10-21T06:06:58Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 2
},
{
"id": 71558821,
"name": "CVE-2016-5195",
"full_name": "timwr\/CVE-2016-5195",
"owner": {
"login": "timwr",
"id": 684924,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/684924?v=4",
"html_url": "https:\/\/github.com\/timwr",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/timwr\/CVE-2016-5195",
"description": "CVE-2016-5195 (dirtycow\/dirtyc0w) proof of concept for Android",
"fork": false,
"created_at": "2016-10-21T11:19:21Z",
"updated_at": "2025-03-10T09:29:04Z",
"pushed_at": "2021-02-03T16:03:40Z",
"stargazers_count": 970,
"watchers_count": 970,
"has_discussions": false,
"forks_count": 394,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 394,
"watchers": 970,
"score": 0,
"subscribers_count": 64
},
{
"id": 71579896,
"name": "dirtycow.cr",
"full_name": "xlucas\/dirtycow.cr",
"owner": {
"login": "xlucas",
"id": 2470398,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/2470398?v=4",
"html_url": "https:\/\/github.com\/xlucas",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/xlucas\/dirtycow.cr",
"description": "CVE-2016-5195 exploit written in Crystal",
"fork": false,
"created_at": "2016-10-21T15:54:10Z",
"updated_at": "2025-01-27T07:02:01Z",
"pushed_at": "2016-10-25T18:44:59Z",
"stargazers_count": 12,
"watchers_count": 12,
"has_discussions": false,
"forks_count": 4,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 4,
"watchers": 12,
"score": 0,
"subscribers_count": 3
},
{
"id": 71594464,
"name": "centos-dirty-cow-ansible",
"full_name": "istenrot\/centos-dirty-cow-ansible",
"owner": {
"login": "istenrot",
"id": 632701,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/632701?v=4",
"html_url": "https:\/\/github.com\/istenrot",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/istenrot\/centos-dirty-cow-ansible",
"description": "Ansible playbook to mitigate CVE-2016-5195 on CentOS",
"fork": false,
"created_at": "2016-10-21T20:32:05Z",
"updated_at": "2016-10-21T20:32:05Z",
"pushed_at": "2016-10-22T11:29:22Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 71605648,
"name": "ansible-role-cve",
"full_name": "pgporada\/ansible-role-cve",
"owner": {
"login": "pgporada",
"id": 2382565,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/2382565?v=4",
"html_url": "https:\/\/github.com\/pgporada",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/pgporada\/ansible-role-cve",
"description": "Mitigates CVE-2016-5195 aka DirtyCOW",
"fork": false,
"created_at": "2016-10-22T00:00:01Z",
"updated_at": "2023-07-05T16:18:34Z",
"pushed_at": "2016-10-23T06:33:57Z",
"stargazers_count": 10,
"watchers_count": 10,
"has_discussions": false,
"forks_count": 3,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"ansible",
"ansible-role",
"bats",
"cve",
"kitchen",
"mitigation",
"test-driven-development",
"test-driven-infrastructure",
"testing"
],
"visibility": "public",
"forks": 3,
"watchers": 10,
"score": 0,
"subscribers_count": 5
},
{
"id": 71624956,
"name": "DirtyCOWTester",
"full_name": "sideeffect42\/DirtyCOWTester",
"owner": {
"login": "sideeffect42",
"id": 940027,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/940027?v=4",
"html_url": "https:\/\/github.com\/sideeffect42",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/sideeffect42\/DirtyCOWTester",
"description": "Dirty COW (CVE-2016-5195) vulnerability testing utility for Linux-based systems.",
"fork": false,
"created_at": "2016-10-22T07:51:18Z",
"updated_at": "2021-02-16T17:06:37Z",
"pushed_at": "2016-12-18T19:07:13Z",
"stargazers_count": 7,
"watchers_count": 7,
"has_discussions": false,
"forks_count": 3,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 3,
"watchers": 7,
"score": 0,
"subscribers_count": 3
},
{
"id": 71647732,
"name": "dirtycow-vdso",
"full_name": "scumjr\/dirtycow-vdso",
"owner": {
"login": "scumjr",
"id": 12125965,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/12125965?v=4",
"html_url": "https:\/\/github.com\/scumjr",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/scumjr\/dirtycow-vdso",
"description": "PoC for Dirty COW (CVE-2016-5195)",
"fork": false,
"created_at": "2016-10-22T15:25:34Z",
"updated_at": "2025-02-22T20:46:03Z",
"pushed_at": "2022-03-16T12:08:54Z",
"stargazers_count": 494,
"watchers_count": 494,
"has_discussions": false,
"forks_count": 146,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 146,
"watchers": 494,
"score": 0,
"subscribers_count": 20
},
{
"id": 71672868,
"name": "CVE-2016-5195",
"full_name": "gbonacini\/CVE-2016-5195",
"owner": {
"login": "gbonacini",
"id": 5440458,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/5440458?v=4",
"html_url": "https:\/\/github.com\/gbonacini",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/gbonacini\/CVE-2016-5195",
"description": "A CVE-2016-5195 exploit example.",
"fork": false,
"created_at": "2016-10-23T00:16:33Z",
"updated_at": "2025-03-11T08:57:01Z",
"pushed_at": "2017-03-21T16:46:38Z",
"stargazers_count": 324,
"watchers_count": 324,
"has_discussions": false,
"forks_count": 121,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"cgo",
"cpp11",
"dirtycow"
],
"visibility": "public",
"forks": 121,
"watchers": 324,
"score": 0,
"subscribers_count": 15
},
{
"id": 71787126,
"name": "cowroot",
"full_name": "DavidBuchanan314\/cowroot",
"owner": {
"login": "DavidBuchanan314",
"id": 13520633,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/13520633?v=4",
"html_url": "https:\/\/github.com\/DavidBuchanan314",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/DavidBuchanan314\/cowroot",
"description": "Universal Android root tool based on CVE-2016-5195. Watch this space.",
"fork": false,
"created_at": "2016-10-24T12:35:55Z",
"updated_at": "2024-11-20T06:13:33Z",
"pushed_at": "2016-10-29T13:42:39Z",
"stargazers_count": 29,
"watchers_count": 29,
"has_discussions": false,
"forks_count": 17,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 17,
"watchers": 29,
"score": 0,
"subscribers_count": 12
},
{
"id": 72274348,
"name": "scan-dirtycow",
"full_name": "aishee\/scan-dirtycow",
"owner": {
"login": "aishee",
"id": 8377283,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/8377283?v=4",
"html_url": "https:\/\/github.com\/aishee",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/aishee\/scan-dirtycow",
"description": "Scan vuls kernel CVE-2016-5195 - DirtyCow",
"fork": false,
"created_at": "2016-10-29T08:45:45Z",
"updated_at": "2024-08-12T19:25:46Z",
"pushed_at": "2016-10-29T08:50:34Z",
"stargazers_count": 16,
"watchers_count": 16,
"has_discussions": false,
"forks_count": 17,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 17,
"watchers": 16,
"score": 0,
"subscribers_count": 1
},
{
"id": 72304503,
"name": "ansible_CVE-2016-5195_check",
"full_name": "oleg-fiksel\/ansible_CVE-2016-5195_check",
"owner": {
"login": "oleg-fiksel",
"id": 21074930,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/21074930?v=4",
"html_url": "https:\/\/github.com\/oleg-fiksel",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/oleg-fiksel\/ansible_CVE-2016-5195_check",
"description": null,
"fork": false,
"created_at": "2016-10-29T19:15:20Z",
"updated_at": "2023-07-13T13:01:06Z",
"pushed_at": "2016-11-26T14:55:12Z",
"stargazers_count": 6,
"watchers_count": 6,
"has_discussions": false,
"forks_count": 5,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 5,
"watchers": 6,
"score": 0,
"subscribers_count": 0
},
{
"id": 72996573,
"name": "CVE-2016-5195",
"full_name": "ldenevi\/CVE-2016-5195",
"owner": {
"login": "ldenevi",
"id": 1868312,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1868312?v=4",
"html_url": "https:\/\/github.com\/ldenevi",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/ldenevi\/CVE-2016-5195",
"description": "Recent Linux privilege escalation exploit",
"fork": false,
"created_at": "2016-11-06T14:38:04Z",
"updated_at": "2016-11-06T14:45:08Z",
"pushed_at": "2016-11-06T14:45:07Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 73981418,
"name": "CVE-2016-5195",
"full_name": "whu-enjoy\/CVE-2016-5195",
"owner": {
"login": "whu-enjoy",
"id": 17870213,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/17870213?v=4",
"html_url": "https:\/\/github.com\/whu-enjoy",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/whu-enjoy\/CVE-2016-5195",
"description": "这里保留着部分脏牛漏洞的利用代码",
"fork": false,
"created_at": "2016-11-17T02:20:09Z",
"updated_at": "2020-01-16T14:04:30Z",
"pushed_at": "2016-11-17T05:29:34Z",
"stargazers_count": 9,
"watchers_count": 9,
"has_discussions": false,
"forks_count": 9,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 9,
"watchers": 9,
"score": 0,
"subscribers_count": 1
},
{
"id": 74788180,
"name": "dirtycow",
"full_name": "firefart\/dirtycow",
"owner": {
"login": "firefart",
"id": 105281,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/105281?v=4",
"html_url": "https:\/\/github.com\/firefart",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/firefart\/dirtycow",
"description": "Dirty Cow exploit - CVE-2016-5195",
"fork": false,
"created_at": "2016-11-25T21:08:01Z",
"updated_at": "2025-03-10T09:28:46Z",
"pushed_at": "2021-04-08T11:35:12Z",
"stargazers_count": 877,
"watchers_count": 877,
"has_discussions": false,
"forks_count": 427,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"cve-2016-5195",
"dirtycow",
"exploit"
],
"visibility": "public",
"forks": 427,
"watchers": 877,
"score": 0,
"subscribers_count": 9
},
{
"id": 75981268,
"name": "inspec_CVE-2016-5195",
"full_name": "ndobson\/inspec_CVE-2016-5195",
"owner": {
"login": "ndobson",
"id": 870783,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/870783?v=4",
"html_url": "https:\/\/github.com\/ndobson",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/ndobson\/inspec_CVE-2016-5195",
"description": "Inspec profile for detecting CVE-2016-5195 aka Dirty COW",
"fork": false,
"created_at": "2016-12-08T22:41:51Z",
"updated_at": "2016-12-08T22:42:51Z",
"pushed_at": "2016-12-09T20:02:20Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 358491993,
"name": "CVE-2016-5195",
"full_name": "arttnba3\/CVE-2016-5195",
"owner": {
"login": "arttnba3",
"id": 28689148,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/28689148?v=4",
"html_url": "https:\/\/github.com\/arttnba3",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/arttnba3\/CVE-2016-5195",
"description": "my personal POC of CVE-2016-5195(dirtyCOW)",
"fork": false,
"created_at": "2021-04-16T05:59:04Z",
"updated_at": "2024-06-17T00:25:30Z",
"pushed_at": "2024-06-17T00:25:26Z",
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 2,
"score": 0,
"subscribers_count": 1
},
{
"id": 414308706,
"name": "root-dirtyc0w",
"full_name": "talsim\/root-dirtyc0w",
"owner": {
"login": "talsim",
"id": 39855459,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/39855459?v=4",
"html_url": "https:\/\/github.com\/talsim",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/talsim\/root-dirtyc0w",
"description": "DirtyCow root privilege escalation (CVE-2016-5195)",
"fork": false,
"created_at": "2021-10-06T17:29:32Z",
"updated_at": "2024-11-27T09:25:30Z",
"pushed_at": "2024-10-11T16:32:12Z",
"stargazers_count": 4,
"watchers_count": 4,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 4,
"score": 0,
"subscribers_count": 1
},
{
"id": 467215742,
"name": "CVE-2022-0847",
"full_name": "r1is\/CVE-2022-0847",
"owner": {
"login": "r1is",
"id": 21257485,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/21257485?v=4",
"html_url": "https:\/\/github.com\/r1is",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/r1is\/CVE-2022-0847",
"description": "CVE-2022-0847-DirtyPipe-Exploit CVE-2022-0847 是存在于 Linux内核 5.8 及之后版本中的本地提权漏洞。攻击者通过利用此漏洞,可覆盖重写任意可读文件中的数据,从而可将普通权限的用户提升到特权 root。 CVE-2022-0847 的漏洞原理类似于 CVE-2016-5195 脏牛漏洞Dirty Cow但它更容易被利用。漏洞作者将此漏洞命名为“Dirty Pipe”",
"fork": false,
"created_at": "2022-03-07T18:36:50Z",
"updated_at": "2025-02-12T15:44:25Z",
"pushed_at": "2023-02-02T02:17:30Z",
"stargazers_count": 277,
"watchers_count": 277,
"has_discussions": false,
"forks_count": 77,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 77,
"watchers": 277,
"score": 0,
"subscribers_count": 4
},
{
"id": 571980114,
"name": "CVE-2016-5195",
"full_name": "fei9747\/CVE-2016-5195",
"owner": {
"login": "fei9747",
"id": 37730810,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/37730810?v=4",
"html_url": "https:\/\/github.com\/fei9747",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/fei9747\/CVE-2016-5195",
"description": null,
"fork": false,
"created_at": "2022-11-29T09:56:20Z",
"updated_at": "2022-11-29T09:56:35Z",
"pushed_at": "2022-11-29T09:56:31Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 599098460,
"name": "DirtyCow",
"full_name": "LinuxKernelContent\/DirtyCow",
"owner": {
"login": "LinuxKernelContent",
"id": 134012117,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/134012117?v=4",
"html_url": "https:\/\/github.com\/LinuxKernelContent",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/LinuxKernelContent\/DirtyCow",
"description": "Below code takes advantage of a known vulnerability [Dirty COW (CVE-2016-5195)] 🔥",
"fork": false,
"created_at": "2023-02-08T13:00:27Z",
"updated_at": "2023-05-18T20:59:41Z",
"pushed_at": "2023-07-10T06:46:33Z",
"stargazers_count": 3,
"watchers_count": 3,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 3,
"score": 0,
"subscribers_count": 1
},
{
"id": 710086972,
"name": "Research-CVE-2016-5195",
"full_name": "h1n4mx0\/Research-CVE-2016-5195",
"owner": {
"login": "h1n4mx0",
"id": 116544941,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/116544941?v=4",
"html_url": "https:\/\/github.com\/h1n4mx0",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/h1n4mx0\/Research-CVE-2016-5195",
"description": null,
"fork": false,
"created_at": "2023-10-26T01:54:49Z",
"updated_at": "2023-10-26T01:54:49Z",
"pushed_at": "2023-10-26T05:23:41Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 724914783,
"name": "CVE-2016-5195-master",
"full_name": "EDLLT\/CVE-2016-5195-master",
"owner": {
"login": "EDLLT",
"id": 47005435,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/47005435?v=4",
"html_url": "https:\/\/github.com\/EDLLT",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/EDLLT\/CVE-2016-5195-master",
"description": null,
"fork": false,
"created_at": "2023-11-29T03:34:10Z",
"updated_at": "2023-11-29T03:34:16Z",
"pushed_at": "2023-11-29T03:34:12Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 731922496,
"name": "DirtyCOW_CVE-2016-5195",
"full_name": "ZhiQiAnSecFork\/DirtyCOW_CVE-2016-5195",
"owner": {
"login": "ZhiQiAnSecFork",
"id": 100925999,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/100925999?v=4",
"html_url": "https:\/\/github.com\/ZhiQiAnSecFork",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/ZhiQiAnSecFork\/DirtyCOW_CVE-2016-5195",
"description": null,
"fork": false,
"created_at": "2023-12-15T07:47:39Z",
"updated_at": "2023-12-15T07:48:07Z",
"pushed_at": "2023-12-15T07:48:03Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
},
{
"id": 779667190,
"name": "Linux-Kernel-Exploit-LAB",
"full_name": "sakilahamed\/Linux-Kernel-Exploit-LAB",
"owner": {
"login": "sakilahamed",
"id": 71716936,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/71716936?v=4",
"html_url": "https:\/\/github.com\/sakilahamed",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/sakilahamed\/Linux-Kernel-Exploit-LAB",
"description": "More specific : Dirty COW (CVE-2016-5195)",
"fork": false,
"created_at": "2024-03-30T13:15:08Z",
"updated_at": "2024-03-30T13:18:43Z",
"pushed_at": "2024-03-30T15:16:44Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 782375427,
"name": "CVE-2016-5195",
"full_name": "ASUKA39\/CVE-2016-5195",
"owner": {
"login": "ASUKA39",
"id": 93875503,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/93875503?v=4",
"html_url": "https:\/\/github.com\/ASUKA39",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/ASUKA39\/CVE-2016-5195",
"description": "DirtyCOW 笔记",
"fork": false,
"created_at": "2024-04-05T07:14:07Z",
"updated_at": "2024-04-05T07:14:08Z",
"pushed_at": "2024-04-05T07:14:48Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
}
]