PoC-in-GitHub/2025/CVE-2025-27591.json
2025-11-28 21:43:45 +09:00

519 lines
No EOL
18 KiB
JSON
Raw Permalink Blame History

This file contains ambiguous Unicode characters

This file contains Unicode characters that might be confused with other characters. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

[
{
"id": 1018706662,
"name": "CVE-2025-27591",
"full_name": "obamalaolu\/CVE-2025-27591",
"owner": {
"login": "obamalaolu",
"id": 51482886,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/51482886?v=4",
"html_url": "https:\/\/github.com\/obamalaolu",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/obamalaolu\/CVE-2025-27591",
"description": "CVE-2025-27591",
"fork": false,
"created_at": "2025-07-12T21:17:40Z",
"updated_at": "2025-10-07T02:18:41Z",
"pushed_at": "2025-07-12T21:22:15Z",
"stargazers_count": 13,
"watchers_count": 13,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 13,
"score": 0,
"subscribers_count": 0
},
{
"id": 1018728419,
"name": "CVE-2025-27591",
"full_name": "rvizx\/CVE-2025-27591",
"owner": {
"login": "rvizx",
"id": 84989569,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/84989569?v=4",
"html_url": "https:\/\/github.com\/rvizx",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/rvizx\/CVE-2025-27591",
"description": "Below v0.8.1 - Local Privilege Escalation (CVE-2025-27591) - PoC Exploit",
"fork": false,
"created_at": "2025-07-12T22:50:59Z",
"updated_at": "2025-11-22T13:39:44Z",
"pushed_at": "2025-11-16T07:13:42Z",
"stargazers_count": 3,
"watchers_count": 3,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"below",
"poc",
"poc-exploit",
"privilege-escalation"
],
"visibility": "public",
"forks": 0,
"watchers": 3,
"score": 0,
"subscribers_count": 0
},
{
"id": 1018876559,
"name": "CVE-2025-27591-PoC",
"full_name": "BridgerAlderson\/CVE-2025-27591-PoC",
"owner": {
"login": "BridgerAlderson",
"id": 139403792,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/139403792?v=4",
"html_url": "https:\/\/github.com\/BridgerAlderson",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/BridgerAlderson\/CVE-2025-27591-PoC",
"description": "CVE-2025-27591 is a privilege escalation vulnerability that affected the Below service before version 0.9.0",
"fork": false,
"created_at": "2025-07-13T08:41:06Z",
"updated_at": "2025-11-12T13:20:23Z",
"pushed_at": "2025-07-16T09:01:14Z",
"stargazers_count": 30,
"watchers_count": 30,
"has_discussions": false,
"forks_count": 3,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 3,
"watchers": 30,
"score": 0,
"subscribers_count": 0
},
{
"id": 1019931195,
"name": "CVE-2025-27591",
"full_name": "DarksBlackSk\/CVE-2025-27591",
"owner": {
"login": "DarksBlackSk",
"id": 175671296,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/175671296?v=4",
"html_url": "https:\/\/github.com\/DarksBlackSk",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/DarksBlackSk\/CVE-2025-27591",
"description": "CVE-2025-27591",
"fork": false,
"created_at": "2025-07-15T05:14:41Z",
"updated_at": "2025-07-15T13:44:30Z",
"pushed_at": "2025-07-15T13:44:27Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
},
{
"id": 1019945722,
"name": "Linux-Privilege-Escalation-CVE-2025-27591",
"full_name": "dollarboysushil\/Linux-Privilege-Escalation-CVE-2025-27591",
"owner": {
"login": "dollarboysushil",
"id": 48991715,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/48991715?v=4",
"html_url": "https:\/\/github.com\/dollarboysushil",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/dollarboysushil\/Linux-Privilege-Escalation-CVE-2025-27591",
"description": "CVE-2025-27591 is a known privilege escalation vulnerability in the Below service (version < v0.9.0)",
"fork": false,
"created_at": "2025-07-15T05:48:00Z",
"updated_at": "2025-09-25T09:46:37Z",
"pushed_at": "2025-07-15T11:42:42Z",
"stargazers_count": 7,
"watchers_count": 7,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 7,
"score": 0,
"subscribers_count": 0
},
{
"id": 1021106124,
"name": "CVE-2025-27591_PoC",
"full_name": "alialucas7\/CVE-2025-27591_PoC",
"owner": {
"login": "alialucas7",
"id": 41133287,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/41133287?v=4",
"html_url": "https:\/\/github.com\/alialucas7",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/alialucas7\/CVE-2025-27591_PoC",
"description": null,
"fork": false,
"created_at": "2025-07-16T22:31:16Z",
"updated_at": "2025-07-17T13:11:48Z",
"pushed_at": "2025-07-17T12:54:46Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
},
{
"id": 1021842682,
"name": "CVE-2025-27591-PoC",
"full_name": "incommatose\/CVE-2025-27591-PoC",
"owner": {
"login": "incommatose",
"id": 182379761,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/182379761?v=4",
"html_url": "https:\/\/github.com\/incommatose",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/incommatose\/CVE-2025-27591-PoC",
"description": "A Proof of Concept for CVE-2025-27591, a local privilege escalation in Below < v0.9.0",
"fork": false,
"created_at": "2025-07-18T03:26:31Z",
"updated_at": "2025-11-11T23:28:32Z",
"pushed_at": "2025-07-19T00:12:34Z",
"stargazers_count": 3,
"watchers_count": 3,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"bash",
"cve-2025-27591",
"exploit",
"linux",
"privilege-escalation"
],
"visibility": "public",
"forks": 1,
"watchers": 3,
"score": 0,
"subscribers_count": 0
},
{
"id": 1022813825,
"name": "CVE-2025-27591",
"full_name": "00xCanelo\/CVE-2025-27591",
"owner": {
"login": "00xCanelo",
"id": 164969443,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/164969443?v=4",
"html_url": "https:\/\/github.com\/00xCanelo",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/00xCanelo\/CVE-2025-27591",
"description": "🔥 Local Privilege Escalation Exploit for CVE-2025-27591 | Abuses world-writable log dir in Below to gain root via \/etc\/passwd injection",
"fork": false,
"created_at": "2025-07-19T22:17:47Z",
"updated_at": "2025-11-19T06:09:07Z",
"pushed_at": "2025-07-23T12:18:44Z",
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 2,
"score": 0,
"subscribers_count": 0
},
{
"id": 1022893911,
"name": "CVE-2025-27591-Below",
"full_name": "Thekin-ctrl\/CVE-2025-27591-Below",
"owner": {
"login": "Thekin-ctrl",
"id": 190963299,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/190963299?v=4",
"html_url": "https:\/\/github.com\/Thekin-ctrl",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/Thekin-ctrl\/CVE-2025-27591-Below",
"description": null,
"fork": false,
"created_at": "2025-07-20T04:33:59Z",
"updated_at": "2025-07-20T04:53:38Z",
"pushed_at": "2025-07-20T04:53:35Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
},
{
"id": 1029688414,
"name": "CVE-2025-27591",
"full_name": "Cythonic1\/CVE-2025-27591",
"owner": {
"login": "Cythonic1",
"id": 163199970,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/163199970?v=4",
"html_url": "https:\/\/github.com\/Cythonic1",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/Cythonic1\/CVE-2025-27591",
"description": "a C exploit for CVE-2025-27591, which allow an attacker to escalate privilege to root.",
"fork": false,
"created_at": "2025-07-31T12:22:20Z",
"updated_at": "2025-11-19T06:09:01Z",
"pushed_at": "2025-07-31T12:42:40Z",
"stargazers_count": 3,
"watchers_count": 3,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 3,
"score": 0,
"subscribers_count": 0
},
{
"id": 1039061610,
"name": "CVE-2025-27591",
"full_name": "umutcamliyurt\/CVE-2025-27591",
"owner": {
"login": "umutcamliyurt",
"id": 83503290,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/83503290?v=4",
"html_url": "https:\/\/github.com\/umutcamliyurt",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/umutcamliyurt\/CVE-2025-27591",
"description": "Below <v0.9.0 PoC Privilege Escalation Exploit",
"fork": false,
"created_at": "2025-08-16T11:54:59Z",
"updated_at": "2025-09-30T11:07:52Z",
"pushed_at": "2025-08-16T11:55:25Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"below",
"exploit",
"privilege-escalation"
],
"visibility": "public",
"forks": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 0
},
{
"id": 1048423509,
"name": "below-log-race-poc",
"full_name": "danil-koltsov\/below-log-race-poc",
"owner": {
"login": "danil-koltsov",
"id": 62597478,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/62597478?v=4",
"html_url": "https:\/\/github.com\/danil-koltsov",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/danil-koltsov\/below-log-race-poc",
"description": "PoC for CVE-2025-27591 Local privilege escalation in the below monitoring tool. By symlinking its log file to \/etc\/passwd, an attacker can inject a root account and gain full system compromise.",
"fork": false,
"created_at": "2025-09-01T12:24:15Z",
"updated_at": "2025-09-01T12:38:15Z",
"pushed_at": "2025-09-01T12:32:08Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 0
},
{
"id": 1049825603,
"name": "CVE-2025-27591-below-",
"full_name": "HOEUN-Visai\/CVE-2025-27591-below-",
"owner": {
"login": "HOEUN-Visai",
"id": 137814531,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/137814531?v=4",
"html_url": "https:\/\/github.com\/HOEUN-Visai",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/HOEUN-Visai\/CVE-2025-27591-below-",
"description": "Local Privilege Escalation vai `below` (CVE-2025-27591) - PoC Exploit",
"fork": false,
"created_at": "2025-09-03T14:49:49Z",
"updated_at": "2025-09-04T09:44:55Z",
"pushed_at": "2025-09-03T16:11:53Z",
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"below",
"cve-2025-27591",
"linux",
"poc",
"privilege-escalation"
],
"visibility": "public",
"forks": 0,
"watchers": 2,
"score": 0,
"subscribers_count": 0
},
{
"id": 1078993452,
"name": "CVE-2025-27591",
"full_name": "krn966\/CVE-2025-27591",
"owner": {
"login": "krn966",
"id": 124454175,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/124454175?v=4",
"html_url": "https:\/\/github.com\/krn966",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/krn966\/CVE-2025-27591",
"description": "CVE-2025-27591",
"fork": false,
"created_at": "2025-10-18T21:22:16Z",
"updated_at": "2025-10-18T21:29:22Z",
"pushed_at": "2025-10-18T21:29:18Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
},
{
"id": 1095926058,
"name": "Below-Logger-Symlink-Attack_CVE-2025-27591",
"full_name": "0xDTC\/Below-Logger-Symlink-Attack_CVE-2025-27591",
"owner": {
"login": "0xDTC",
"id": 95960398,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/95960398?v=4",
"html_url": "https:\/\/github.com\/0xDTC",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/0xDTC\/Below-Logger-Symlink-Attack_CVE-2025-27591",
"description": "A Bash-based privilege escalation exploit targeting the `below` system performance monitoring tool. This refurbished exploit leverages a symlink vulnerability in the logging mechanism to inject a root user into `\/etc\/passwd`, achieving full root access.",
"fork": false,
"created_at": "2025-11-13T17:44:57Z",
"updated_at": "2025-11-19T06:09:05Z",
"pushed_at": "2025-11-13T18:04:32Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 1,
"score": 0,
"subscribers_count": 0
},
{
"id": 1100070375,
"name": "CVE-2025-27591",
"full_name": "0x00Jeff\/CVE-2025-27591",
"owner": {
"login": "0x00Jeff",
"id": 71389295,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/71389295?v=4",
"html_url": "https:\/\/github.com\/0x00Jeff",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/0x00Jeff\/CVE-2025-27591",
"description": "self cleaning CVE-2025-27591 Poc that grants a root reverse shell instead of modifying passwd files",
"fork": false,
"created_at": "2025-11-19T19:56:14Z",
"updated_at": "2025-11-28T07:24:23Z",
"pushed_at": "2025-11-22T13:01:44Z",
"stargazers_count": 14,
"watchers_count": 14,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 14,
"score": 0,
"subscribers_count": 0
}
]