PoC-in-GitHub/2023/CVE-2023-2598.json
2025-12-09 03:45:29 +09:00

157 lines
No EOL
5.6 KiB
JSON
Raw Permalink Blame History

This file contains ambiguous Unicode characters

This file contains Unicode characters that might be confused with other characters. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

[
{
"id": 719803136,
"name": "io_uring_LPE-CVE-2023-2598",
"full_name": "ysanatomic\/io_uring_LPE-CVE-2023-2598",
"owner": {
"login": "ysanatomic",
"id": 41269324,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/41269324?v=4",
"html_url": "https:\/\/github.com\/ysanatomic",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/ysanatomic\/io_uring_LPE-CVE-2023-2598",
"description": "LPE PoC of a vulnerability in the io_uring subsystem of the Linux Kernel.",
"fork": false,
"created_at": "2023-11-16T23:41:27Z",
"updated_at": "2025-06-20T12:52:30Z",
"pushed_at": "2023-11-23T18:37:18Z",
"stargazers_count": 92,
"watchers_count": 92,
"has_discussions": false,
"forks_count": 11,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 11,
"watchers": 92,
"score": 0,
"subscribers_count": 7
},
{
"id": 850252202,
"name": "CVE-2023-2598",
"full_name": "cainiao159357\/CVE-2023-2598",
"owner": {
"login": "cainiao159357",
"id": 76136742,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/76136742?v=4",
"html_url": "https:\/\/github.com\/cainiao159357",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/cainiao159357\/CVE-2023-2598",
"description": null,
"fork": false,
"created_at": "2024-08-31T09:14:53Z",
"updated_at": "2024-08-31T09:51:37Z",
"pushed_at": "2024-08-31T09:51:34Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 884497009,
"name": "CVE-2023-2598",
"full_name": "LLfam\/CVE-2023-2598",
"owner": {
"login": "LLfam",
"id": 43279891,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/43279891?v=4",
"html_url": "https:\/\/github.com\/LLfam",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/LLfam\/CVE-2023-2598",
"description": null,
"fork": false,
"created_at": "2024-11-06T21:24:43Z",
"updated_at": "2025-11-29T17:48:57Z",
"pushed_at": "2024-11-06T21:27:21Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 1
},
{
"id": 1024786066,
"name": "CVE-2023-2598",
"full_name": "SpongeBob-369\/CVE-2023-2598",
"owner": {
"login": "SpongeBob-369",
"id": 176364273,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/176364273?v=4",
"html_url": "https:\/\/github.com\/SpongeBob-369",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/SpongeBob-369\/CVE-2023-2598",
"description": "The exploitation of CVE-2023-2598 about io_uring",
"fork": false,
"created_at": "2025-07-23T08:43:41Z",
"updated_at": "2025-11-30T08:19:11Z",
"pushed_at": "2025-08-20T01:01:39Z",
"stargazers_count": 3,
"watchers_count": 3,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 3,
"score": 0,
"subscribers_count": 0
},
{
"id": 1097525987,
"name": "CVE-2023-2598_EXP",
"full_name": "guard-wait\/CVE-2023-2598_EXP",
"owner": {
"login": "guard-wait",
"id": 98081165,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/98081165?v=4",
"html_url": "https:\/\/github.com\/guard-wait",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/guard-wait\/CVE-2023-2598_EXP",
"description": "复现文章网上很多师傅有写这里就不献丑了本exploit交互使用的代码是kernel提供的做小改动由于漏洞提供的原语比较强大都能直接越界任意写一张内存页以上的空间所以利用手法比较简单实用选用的size是4k页大小直接堆喷filp篡改\/etc\/passwd",
"fork": false,
"created_at": "2025-11-16T10:58:10Z",
"updated_at": "2025-11-16T11:03:31Z",
"pushed_at": "2025-11-16T11:03:28Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]