mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-12-26 14:15:32 +01:00
157 lines
No EOL
5.6 KiB
JSON
157 lines
No EOL
5.6 KiB
JSON
[
|
||
{
|
||
"id": 719803136,
|
||
"name": "io_uring_LPE-CVE-2023-2598",
|
||
"full_name": "ysanatomic\/io_uring_LPE-CVE-2023-2598",
|
||
"owner": {
|
||
"login": "ysanatomic",
|
||
"id": 41269324,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/41269324?v=4",
|
||
"html_url": "https:\/\/github.com\/ysanatomic",
|
||
"user_view_type": "public"
|
||
},
|
||
"html_url": "https:\/\/github.com\/ysanatomic\/io_uring_LPE-CVE-2023-2598",
|
||
"description": "LPE PoC of a vulnerability in the io_uring subsystem of the Linux Kernel.",
|
||
"fork": false,
|
||
"created_at": "2023-11-16T23:41:27Z",
|
||
"updated_at": "2025-06-20T12:52:30Z",
|
||
"pushed_at": "2023-11-23T18:37:18Z",
|
||
"stargazers_count": 92,
|
||
"watchers_count": 92,
|
||
"has_discussions": false,
|
||
"forks_count": 11,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"web_commit_signoff_required": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 11,
|
||
"watchers": 92,
|
||
"score": 0,
|
||
"subscribers_count": 7
|
||
},
|
||
{
|
||
"id": 850252202,
|
||
"name": "CVE-2023-2598",
|
||
"full_name": "cainiao159357\/CVE-2023-2598",
|
||
"owner": {
|
||
"login": "cainiao159357",
|
||
"id": 76136742,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/76136742?v=4",
|
||
"html_url": "https:\/\/github.com\/cainiao159357",
|
||
"user_view_type": "public"
|
||
},
|
||
"html_url": "https:\/\/github.com\/cainiao159357\/CVE-2023-2598",
|
||
"description": null,
|
||
"fork": false,
|
||
"created_at": "2024-08-31T09:14:53Z",
|
||
"updated_at": "2024-08-31T09:51:37Z",
|
||
"pushed_at": "2024-08-31T09:51:34Z",
|
||
"stargazers_count": 0,
|
||
"watchers_count": 0,
|
||
"has_discussions": false,
|
||
"forks_count": 0,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"web_commit_signoff_required": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 0,
|
||
"watchers": 0,
|
||
"score": 0,
|
||
"subscribers_count": 1
|
||
},
|
||
{
|
||
"id": 884497009,
|
||
"name": "CVE-2023-2598",
|
||
"full_name": "LLfam\/CVE-2023-2598",
|
||
"owner": {
|
||
"login": "LLfam",
|
||
"id": 43279891,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/43279891?v=4",
|
||
"html_url": "https:\/\/github.com\/LLfam",
|
||
"user_view_type": "public"
|
||
},
|
||
"html_url": "https:\/\/github.com\/LLfam\/CVE-2023-2598",
|
||
"description": null,
|
||
"fork": false,
|
||
"created_at": "2024-11-06T21:24:43Z",
|
||
"updated_at": "2025-11-29T17:48:57Z",
|
||
"pushed_at": "2024-11-06T21:27:21Z",
|
||
"stargazers_count": 1,
|
||
"watchers_count": 1,
|
||
"has_discussions": false,
|
||
"forks_count": 0,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"web_commit_signoff_required": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 0,
|
||
"watchers": 1,
|
||
"score": 0,
|
||
"subscribers_count": 1
|
||
},
|
||
{
|
||
"id": 1024786066,
|
||
"name": "CVE-2023-2598",
|
||
"full_name": "SpongeBob-369\/CVE-2023-2598",
|
||
"owner": {
|
||
"login": "SpongeBob-369",
|
||
"id": 176364273,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/176364273?v=4",
|
||
"html_url": "https:\/\/github.com\/SpongeBob-369",
|
||
"user_view_type": "public"
|
||
},
|
||
"html_url": "https:\/\/github.com\/SpongeBob-369\/CVE-2023-2598",
|
||
"description": "The exploitation of CVE-2023-2598 about io_uring",
|
||
"fork": false,
|
||
"created_at": "2025-07-23T08:43:41Z",
|
||
"updated_at": "2025-11-30T08:19:11Z",
|
||
"pushed_at": "2025-08-20T01:01:39Z",
|
||
"stargazers_count": 3,
|
||
"watchers_count": 3,
|
||
"has_discussions": false,
|
||
"forks_count": 0,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"web_commit_signoff_required": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 0,
|
||
"watchers": 3,
|
||
"score": 0,
|
||
"subscribers_count": 0
|
||
},
|
||
{
|
||
"id": 1097525987,
|
||
"name": "CVE-2023-2598_EXP",
|
||
"full_name": "guard-wait\/CVE-2023-2598_EXP",
|
||
"owner": {
|
||
"login": "guard-wait",
|
||
"id": 98081165,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/98081165?v=4",
|
||
"html_url": "https:\/\/github.com\/guard-wait",
|
||
"user_view_type": "public"
|
||
},
|
||
"html_url": "https:\/\/github.com\/guard-wait\/CVE-2023-2598_EXP",
|
||
"description": "复现文章网上很多师傅有写,这里就不献丑了,本exploit交互使用的代码是kernel提供的做小改动,由于漏洞提供的原语比较强大,都能直接越界任意写一张内存页以上的空间,所以利用手法比较简单实用,选用的size是4k页大小,直接堆喷filp篡改\/etc\/passwd",
|
||
"fork": false,
|
||
"created_at": "2025-11-16T10:58:10Z",
|
||
"updated_at": "2025-11-16T11:03:31Z",
|
||
"pushed_at": "2025-11-16T11:03:28Z",
|
||
"stargazers_count": 0,
|
||
"watchers_count": 0,
|
||
"has_discussions": false,
|
||
"forks_count": 0,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"web_commit_signoff_required": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 0,
|
||
"watchers": 0,
|
||
"score": 0,
|
||
"subscribers_count": 0
|
||
}
|
||
] |