[*] Exploit summary:
	zlib                :   1.2.12      :   CVE-2022-37434    :   9.8       :   STAT           :   Exploit (Github: WhooAmii_POC_to_review (G) isgo-golgo13_gokit-gorillakit-enginesvc (G) manas3c_CVE-POC (G) maxim12z_ECommerce (G) nidhi7598_external_zlib-1.2.11_AOSP_10_r33_CVE-2022-37434 (G) nidhi7598_external_zlib-1.2.7_CVE-2022-37434 (G) nomi-sec_PoC-in-GitHub (G) xen0bit_CVE-2022-37434_poc (G))
	openssl             :   1.1.1       :   CVE-2022-2068     :   9.8       :   STAT/UEMU      :   Exploit (Github: backloop-biz_CVE_checks (G) jntass_TASSL-1.1.1 (G) mawinkler_c1-cs-scan-result (G) tianocore-docs_ThirdPartySecurityAdvisories (G))
	openssl             :   1.1.1       :   CVE-2022-1292     :   9.8       :   STAT/UEMU      :   Exploit (Snyk: SNYK-UNMANAGED-OPENSSL-2807816 (S) / Github: WhooAmii_POC_to_review (G) alcaparra_CVE-2022-1292 (G) backloop-biz_CVE_checks (G) fdl66_openssl-1.0.2u-fix-cve (G) greek0x0_CVE-2022-1292 (G) jntass_TASSL-1.1.1 (G) li8u99_CVE-2022-1292 (G) manas3c_CVE-POC (G) mawinkler_c1-cs-scan-result (G) nidhi7598_openssl-OpenSSL_1_1_1g_AOSP_10_r33_CVE-2022-1292 (G) nomi-sec_PoC-in-GitHub (G) rama291041610_CVE-2022-1292 (G) tianocore-docs_ThirdPartySecurityAdvisories (G) trhacknon_CVE-2022-1292 (G) und3sc0n0c1d0_CVE-2022-1292 (G))
	openssl             :   1.1.1       :   CVE-2021-3711     :   9.8       :   STAT/UEMU      :   Exploit (Github: Frannc0_test2 (G) NeXTLinux_griffon (G) anchore_grype (G) aymankhder_scanner-for-container (G) isgo-golgo13_gokit-gorillakit-enginesvc (G) jntass_TASSL-1.1.1 (G) jntass_TASSL-1.1.1k (G) leonov-av_scanvus (G) metapull_attackfinder (G) mmartins000_sinker (G) tianocore-docs_ThirdPartySecurityAdvisories (G))
	libarchive          :   3.5.3       :   CVE-2022-36227    :   9.8       :   STAT/UEMU      :   Exploit (Github: libarchive_libarchive_issues_1754 (G))
	kernel              :   5.10.52     :   CVE-2021-43267    :   9.8       :   STAT           :   Exploit (Github: 0x0021h_expbox (G) Al1ex_LinuxEelvation (G) DarkSprings_CVE-2021-43267-POC (G) JlSakuya_Linux-Privilege-Escalation-Exploits (G) bcoles_kasld (G) bsauce_kernel-exploit-factory (G) bsauce_kernel-security-learning (G) hardenedvault_ved (G) kdn111_linux-kernel-exploitation (G) khanhdn111_linux-kernel-exploitation (G) khanhdz-06_linux-kernel-exploitation (G) khanhdz191_linux-kernel-exploitation (G) khanhhdz_linux-kernel-exploitation (G) khanhhdz06_linux-kernel-exploitation (G) khanhnd123_linux-kernel-exploitation (G) milot_dissecting-pkexec-cve-2021-4034 (G) nomi-sec_PoC-in-GitHub (G) ohnonoyesyes_CVE-2021-43267 (G) soosmile_POC (G) xairy_linux-kernel-exploitation (G) zzhacked_CVE-2021-43267 (G))
	kernel              :   5.10.52     :   CVE-2022-42896    :   8.8       :   STAT           :   Exploit (Github: Satheesh575555_linux-4.19.72_CVE-2022-42896 (G) Trinadh465_linux-4.19.72_CVE-2022-42896 (G) hshivhare67_kernel_v4.19.72_CVE-2022-42896_new (G) hshivhare67_kernel_v4.19.72_CVE-2022-42896_old (G) kdn111_linux-kernel-exploitation (G) khanhdn111_linux-kernel-exploitation (G) khanhdz-06_linux-kernel-exploitation (G) khanhdz191_linux-kernel-exploitation (G) khanhhdz_linux-kernel-exploitation (G) khanhhdz06_linux-kernel-exploitation (G) khanhnd123_linux-kernel-exploitation (G) nidhi7598_linux-4.1.15_CVE-2022-42896 (G) nomi-sec_PoC-in-GitHub (G) xairy_linux-kernel-exploitation (G))
	kernel              :   5.10.52     :   CVE-2022-42719    :   8.8       :   STAT           :   Exploit (Github: 0xArchy_CR005_AntiFirewalls (G))
	kernel              :   5.10.52     :   CVE-2022-1043     :   8.8       :   STAT           :   Exploit (MSF: cve_2022_1043_io_uring_priv_esc (L) / Snyk: SNYK-UNMANAGED-TORVALDSLINUX-3152138 (S))
	kernel              :   5.10.52     :   CVE-2022-0435     :   8.8       :   STAT           :   Exploit (Github: kdn111_linux-kernel-exploitation (G) khanhdn111_linux-kernel-exploitation (G) khanhdz-06_linux-kernel-exploitation (G) khanhdz191_linux-kernel-exploitation (G) khanhhdz_linux-kernel-exploitation (G) khanhhdz06_linux-kernel-exploitation (G) khanhnd123_linux-kernel-exploitation (G) manas3c_CVE-POC (G) nomi-sec_PoC-in-GitHub (G) wlswotmd_CVE-2022-0435 (G) xairy_linux-kernel-exploitation (G))
	kernel              :   5.10.52     :   CVE-2021-3656     :   8.8       :   STAT           :   Exploit (Github: nomi-sec_PoC-in-GitHub (G) rami08448_CVE-2021-3656-Demo (G))
	kernel              :   5.10.52     :   CVE-2021-3653     :   8.8       :   STAT           :   Exploit (Github: CVE-2021-3656-Demo" title="rami08448_CVE-2021-3656-Demo" target="_blank" >rami08448_CVE-2021-3656-Demo (G))
	busybox             :   1.34.1      :   CVE-2022-28391    :   8.8       :   STAT/UEMU      :   Exploit (Github: KazKobara_dockerfile_fswiki_local (G) grggls_crypto-devops-test (G) isgo-golgo13_gokit-gorillakit-enginesvc (G))
	kernel              :   5.10.52     :   CVE-2022-0185" title="CVE-2022-0185" target="_blank" >CVE-2022-0185     :   8.4       :   STAT           :   Exploit (Snyk: SNYK-UNMANAGED-TORVALDSLINUX-2932989 (S) / PSS: 165730/Linux-Kernel-Slab-Out-Of-Bounds-Write.html (L) 165731/Linux-Kernel-Slab-Out-Of-Bounds-Write.html (P) / Github: 0xTen_pwn-gym (G) CVEDB_awesome-cve-repo (G) CVEDB_top (G) Ch4nc3n_PublicExploitation (G) Crusaders-of-Rust_CVE-2022-0185 (G) JERRY123S_all-poc (G) JlSakuya_Linux-Privilege-Escalation-Exploits (G) Metarget_metarget (G) Mr-xn_Penetration_Testing_POC (G) WhooAmii_POC_to_review (G) adavarski_HomeLab-Proxmox-k8s-DevSecOps-playground (G) adavarski_HomeLab-k8s-DevSecOps-playground (G) arveske_Github-language-trends (G) bigpick_cve-reading-list (G) binganao_vulns-2022 (G) bsauce_kernel-exploit-factory (G) bsauce_kernel-security-learning (G) chenaotian_CVE-2022-0185 (G) CVE-2022-25636" title="chenaotian_CVE-2022-25636" target="_blank" >chenaotian_CVE-2022-25636 (G) cyberanand1337x_bug-bounty-2022 (G) discordianfish_cve-2022-0185-crash-poc (G) featherL_CVE-2022-0185-exploit (G) felixfu59_kernel-hack (G) hac425xxx_heap-exploitation-in-real-world (G) hardenedvault_ved (G) hktalent_TOP (G) joydo_CVE-Writeups (G) kdn111_linux-kernel-exploitation (G) khaclep007_CVE-2022-0185 (G) khanhdn111_linux-kernel-exploitation (G) khanhdz-06_linux-kernel-exploitation (G) khanhdz191_linux-kernel-exploitation (G) khanhhdz_linux-kernel-exploitation (G) khanhhdz06_linux-kernel-exploitation (G) khanhnd123_linux-kernel-exploitation (G) khu-capstone-design_kubernetes-vulnerability-investigation (G) krol3_kubernetes-security-checklist (G) kvesta_vesta (G) lafayette96_CVE-Errata-Tool (G) lockedbyte_lockedbyte (G) manas3c_CVE-POC (G) nestybox_sysbox (G) nestybox_sysbox-ee (G) nomi-sec_PoC-in-GitHub (G) ocastejon_linux-kernel-learning (G) shahparkhan_cve-2022-0185 (G) soosmile_POC (G) veritas501_CVE-2022-0185-PipeVersion (G) veritas501_pipe-primitive (G) weeka10_-hktalent-TOP (G) xairy_linux-kernel-exploitation (G) xuetusummer_Penetration_Testing_POC (G))
	kernel              :   5.10.52     :   CVE-2022-1012 (V) :   8.2       :   STAT           :   Exploit (Github: manas3c_CVE-POC (G) nomi-sec_PoC-in-GitHub (G))
	kernel              :   5.10.52     :   CVE-2022-41674    :   8.1       :   STAT           :   Exploit (Github: c0ld21_ndays (G))
	expat               :   2.4.7       :   CVE-2022-40674    :   8.1       :   STAT           :   Exploit (Github: chainguard-dev_image-comparison (G) manas3c_CVE-POC (G) maxim12z_ECommerce (G) nidhi7598_expat_2.1.0_CVE-2022-40674 (G) nomi-sec_PoC-in-GitHub (G))
	kernel              :   5.10.52     :   CVE-2023-3269     :   7.8       :   STAT           :   Exploit (Github: LumaKernel_awesome-stars (G) aneasystone_github-trending (G) izj007_wechat (G) kherrick_hacker-news (G) kun-g_Scraping-Github-trending (G) lrh2000_StackRot (G) nomi-sec_PoC-in-GitHub (G))
	kernel              :   5.10.52     :   CVE-2023-32233    :   7.8       :   STAT           :   Exploit (Github: CVEDB_awesome-cve-repo (G) CVEDB_top (G) Liuk3r_CVE-2023-32233 (G) Mr-xn_Penetration_Testing_POC (G) PIDAN-HEIDASHUAI_CVE-2023-32233 (G) Threekiii_CVE (G) hktalent_TOP (G) nomi-sec_PoC-in-GitHub (G) oferchen_POC-CVE-2023-32233 (G) xairy_linux-kernel-exploitation (G) xyxj1024_xyxj1024.github.io (G))
	kernel              :   5.10.52     :   CVE-2023-23559    :   7.8       :   STAT           :   Exploit (Github: szymonh_szymonh (G))
	kernel              :   5.10.52     :   CVE-2023-2008     :   7.8       :   STAT           :   Exploit (Github: Mr-xn_Penetration_Testing_POC (G) bluefrostsecurity_CVE-2023-2008 (G) em1ga3l_cve-msrc-extractor (G) nomi-sec_PoC-in-GitHub (G) xairy_linux-kernel-exploitation (G))
	kernel              :   5.10.52     :   CVE-2023-1829     :   7.8       :   STAT           :   Exploit (Github: Threekiii_CVE (G) star-sg_CVE (G) xairy_linux-kernel-exploitation (G))
	kernel              :   5.10.52     :   CVE-2023-0461     :   7.8       :   STAT           :   Exploit (Github: hheeyywweellccoommee_linux-4.19.72_CVE-2023-0461-ycnbd (G) hshivhare67_kernel_v4.19.72_CVE-2023-0461 (G) nidhi7598_linux-4.19.72_CVE-2023-0461 (G) nomi-sec_PoC-in-GitHub (G))
	kernel              :   5.10.52     :   CVE-2022-4744     :   7.8       :   STAT           :   Exploit (PSS: 171912/CentOS-Stream-9-Missing-Kernel-Security-Fix.html (L))
	kernel              :   5.10.52     :   CVE-2022-45934    :   7.8       :   STAT           :   Exploit (Github: Satheesh575555_linux-4.1.15_CVE-2022-45934 (G) Trinadh465_linux-4.1.15_CVE-2022-45934 (G) Trinadh465_linux-4.19.72_CVE-2022-45934 (G) manas3c_CVE-POC (G) nidhi7598_linux-3.0.35_CVE-2022-45934 (G) nomi-sec_PoC-in-GitHub (G))
	kernel              :   5.10.52     :   CVE-2022-42720    :   7.8       :   STAT           :   Exploit (Github: c0ld21_ndays (G))
	kernel              :   5.10.52     :   CVE-2022-4139     :   7.8       :   STAT           :   Exploit (Github: k0imet_pyfetch (G))
	kernel              :   5.10.52     :   CVE-2022-36123    :   7.8       :   STAT           :   Exploit (Github: sickcodes_security_blob_master_advisories_SICK-2022-128.md (G))
	kernel              :   5.10.52     :   CVE-2022-34918    :   7.8       :   STAT           :   Exploit (MSF: netfilter_nft_set_elem_init_privesc (L) / Github: JlSakuya_Linux-Privilege-Escalation-Exploits (G) Ly0nt4r_OSCP (G) Mr-xn_Penetration_Testing_POC (G) Sechack06_CVE-2022-34918 (G) Snoopy-Sec_Localroot-ALL-CVE (G) WhooAmii_POC_to_review (G) bsauce_kernel-exploit-factory (G) bsauce_kernel-security-learning (G) e-hakson_OSCP (G) eljosep_OSCP-Guide (G) felixfu59_kernel-hack (G) kdn111_linux-kernel-exploitation (G) khanhdn111_linux-kernel-exploitation (G) khanhdz-06_linux-kernel-exploitation (G) khanhdz191_linux-kernel-exploitation (G) khanhhdz_linux-kernel-exploitation (G) khanhhdz06_linux-kernel-exploitation (G) khanhnd123_linux-kernel-exploitation (G) lanleft_CVE2023-1829 (G) linulinu_CVE-2022-34918 (G) manas3c_CVE-POC (G) merlinepedra_CVE-2022-34918-LPE-PoC (G) merlinepedra25_CVE-2022-34918-LPE-PoC (G) nitishbadole_oscp-note-3 (G) nomi-sec_PoC-in-GitHub (G) purplewall1206_ERA-eBPF-assisted-Randomize-Allocator (G) randorisec_CVE-2022-34918-LPE-PoC (G) taielab_awesome-hacking-lists (G) tr3ss_gofetch (G) trhacknon_CVE-2022-34918-LPE-PoC (G) veritas501_CVE-2022-34918 (G) xairy_linux-kernel-exploitation (G) xuetusummer_Penetration_Testing_POC (G))
	kernel              :   5.10.52     :   CVE-2022-32250    :   7.8       :   STAT           :   Exploit (linux-exploit-suggester / Github: JlSakuya_Linux-Privilege-Escalation-Exploits (G) Mr-xn_Penetration_Testing_POC (G) Snoopy-Sec_Localroot-ALL-CVE (G) WhooAmii_POC_to_review (G) bsauce_kernel-exploit-factory (G) bsauce_kernel-security-learning (G) felixfu59_kernel-hack (G) kdn111_linux-kernel-exploitation (G) khanhdn111_linux-kernel-exploitation (G) khanhdz-06_linux-kernel-exploitation (G) khanhdz191_linux-kernel-exploitation (G) khanhhdz_linux-kernel-exploitation (G) khanhhdz06_linux-kernel-exploitation (G) khanhnd123_linux-kernel-exploitation (G) manas3c_CVE-POC (G) nomi-sec_PoC-in-GitHub (G) theori-io_CVE-2022-32250-exploit (G) xairy_linux-kernel-exploitation (G) xuetusummer_Penetration_Testing_POC (G) ysanatomic_CVE-2022-32250-LPE (G))
	kernel              :   5.10.52     :   CVE-2022-30594    :   7.8       :   STAT           :   Exploit (PSS: 170362/Linux-PT_SUSPEND_SECCOMP-Permission-Bypass-Ptracer-Death-Race.html (P) / Github: WhooAmii_POC_to_review (G) manas3c_CVE-POC (G) nidhi7598_linux-4.19.72_CVE-2022-30594 (G) nomi-sec_PoC-in-GitHub (G))
	kernel              :   5.10.52     :   CVE-2022-29968 (V):   7.8       :   STAT           :   Exploit (Snyk: SNYK-UNMANAGED-TORVALDSLINUX-3006622 (S) / Github: Mr-xn_Penetration_Testing_POC (G) WhooAmii_POC_to_review (G) jprx_CVE-2022-29968 (G) manas3c_CVE-POC (G) nomi-sec_PoC-in-GitHub (G) xuetusummer_Penetration_Testing_POC (G))
	kernel              :   5.10.52     :   CVE-2022-29581    :   7.8       :   STAT           :   Exploit (Github: Nidhi77777_linux-4.19.72_CVE-2022-29581 (G) WhooAmii_POC_to_review (G) manas3c_CVE-POC (G) nidhi7598_linux-4.19.72_CVE-2022-29581 (G) nidhihcl_linux-4.19.72_CVE-2022-29581 (G) nomi-sec_PoC-in-GitHub (G))
	kernel              :   5.10.52     :   CVE-2022-27666    :   7.8       :   STAT           :   Exploit (Github: Albocoder_cve-2022-27666-exploits (G) CVEDB_awesome-cve-repo (G) CVEDB_top (G) Ch4nc3n_PublicExploitation (G) JERRY123S_all-poc (G) JlSakuya_Linux-Privilege-Escalation-Exploits (G) Metarget_metarget (G) Mr-xn_Penetration_Testing_POC (G) WhooAmii_POC_to_review (G) bsauce_kernel-exploit-factory (G) bsauce_kernel-security-learning (G) cyberanand1337x_bug-bounty-2022 (G) hktalent_TOP (G) j4k0m_really-good-cybersec (G) kdn111_linux-kernel-exploitation (G) khanhdn111_linux-kernel-exploitation (G) khanhdz-06_linux-kernel-exploitation (G) khanhdz191_linux-kernel-exploitation (G) khanhhdz_linux-kernel-exploitation (G) khanhhdz06_linux-kernel-exploitation (G) khanhnd123_linux-kernel-exploitation (G) manas3c_CVE-POC (G) nomi-sec_PoC-in-GitHub (G) plummm_CVE-2022-27666 (G) weeka10_-hktalent-TOP (G) xairy_linux-kernel-exploitation (G) xuetusummer_Penetration_Testing_POC (G))
	kernel              :   5.10.52     :   CVE-2022-2639     :   7.8       :   STAT           :   Exploit (Github: EkamSinghWalia_Detection-and-Mitigation-for-CVE-2022-2639 (G) JlSakuya_Linux-Privilege-Escalation-Exploits (G) KayCHENvip_vulnerability-poc (G) Miraitowa70_POC-Notes (G) Mr-xn_Penetration_Testing_POC (G) Snoopy-Sec_Localroot-ALL-CVE (G) Threekiii_Awesome-POC (G) WhooAmii_POC_to_review (G) avboy1337_CVE-2022-2639-PipeVersion (G) bb33bb_CVE-2022-2639-PipeVersion (G) bsauce_kernel-exploit-factory (G) bsauce_kernel-security-learning (G) manas3c_CVE-POC (G) nomi-sec_PoC-in-GitHub (G) xuetusummer_Penetration_Testing_POC (G))
	kernel              :   5.10.52     :   CVE-2022-25265    :   7.8       :   STAT           :   Exploit (Github: nomi-sec_PoC-in-GitHub (G) x0reaxeax_exec-prot-bypass (G))
	kernel              :   5.10.52     :   CVE-2022-23222    :   7.8       :   STAT           :   Exploit (Github: Al1ex_LinuxEelvation (G) Awrrays_Pentest-Tips (G) CVEDB_awesome-cve-repo (G) CVEDB_top (G) Ch4nc3n_PublicExploitation (G) FridayOrtiz_CVE-2022-23222 (G) JERRY123S_all-poc (G) JlSakuya_Linux-Privilege-Escalation-Exploits (G) KayCHENvip_vulnerability-poc (G) LeoMarche_ProjetSecu (G) Metarget_metarget (G) Miraitowa70_POC-Notes (G) Mr-xn_Penetration_Testing_POC (G) PenteraIO_CVE-2022-23222-POC (G) PyterSmithDarkGhost_EXPLOITCVE-2022-23222 (G) Threekiii_Awesome-POC (G) WhooAmii_POC_to_review (G) cyberanand1337x_bug-bounty-2022 (G) hardenedvault_ved (G) hktalent_TOP (G) intel_linux-kernel-dcp (G) isabella232_linux-kernel-dcp (G) kdn111_linux-kernel-exploitation (G) kenplusplus_linux-kernel-dcp (G) khanhdn111_linux-kernel-exploitation (G) khanhdz-06_linux-kernel-exploitation (G) khanhdz191_linux-kernel-exploitation (G) khanhhdz_linux-kernel-exploitation (G) khanhhdz06_linux-kernel-exploitation (G) khanhnd123_linux-kernel-exploitation (G) makoto56_penetration-suite-toolkit (G) manas3c_CVE-POC (G) nomi-sec_PoC-in-GitHub (G) sapphire1896_xnu-linux (G) taielab_awesome-hacking-lists (G) tr3ee_CVE-2022-23222 (G) weeka10_-hktalent-TOP (G) wxrdnx_bpf_exploit_template (G) xairy_linux-kernel-exploitation (G) xuetusummer_Penetration_Testing_POC (G))
	kernel              :   5.10.52     :   CVE-2022-1786     :   7.8       :   STAT           :   Exploit (Github: RetSpill_RetSpill_demo (G) kdn111_linux-kernel-exploitation (G) khanhdn111_linux-kernel-exploitation (G) khanhdz-06_linux-kernel-exploitation (G) khanhdz191_linux-kernel-exploitation (G) khanhhdz_linux-kernel-exploitation (G) khanhhdz06_linux-kernel-exploitation (G) khanhnd123_linux-kernel-exploitation (G) scratchadams_Heap-Resources (G) xairy_linux-kernel-exploitation (G))
	kernel              :   5.10.52     :   CVE-2022-1011     :   7.8       :   STAT           :   Exploit (PSS: 166772/Linux-FUSE-Use-After-Free.html (P) / Github: PazDak_feathers-macos-detections (G) nomi-sec_PoC-in-GitHub (G) xkaneiki_CVE-2022-1011 (G))
	kernel              :   5.10.52     :   CVE-2022-0995     :   7.8       :   STAT           :   Exploit (MSF: cve_2022_0995_watch_queue (L) / Snyk: SNYK-UNMANAGED-TORVALDSLINUX-2933096 (S) / PSS: 166770/Linux-watch_queue-Filter-Out-Of-Bounds-Write.html (P) / Github: Al1ex_LinuxEelvation (G) AndreevSemen_CVE-2022-0995 (G) Awrrays_Pentest-Tips (G) B0nfee_CVE-2022-0995 (G) Bonfee_CVE-2022-0995 (G) CVEDB_awesome-cve-repo (G) CVEDB_top (G) Ch4nc3n_PublicExploitation (G) JERRY123S_all-poc (G) JlSakuya_Linux-Privilege-Escalation-Exploits (G) Metarget_metarget (G) Mr-xn_Penetration_Testing_POC (G) Snoopy-Sec_Localroot-ALL-CVE (G) WhooAmii_POC_to_review (G) bsauce_kernel-exploit-factory (G) bsauce_kernel-security-learning (G) cyberanand1337x_bug-bounty-2022 (G) frankzappasmustache_starred-repos (G) goldenscale_GS_GithubMirror (G) hktalent_TOP (G) kdn111_linux-kernel-exploitation (G) khanhdn111_linux-kernel-exploitation (G) khanhdz-06_linux-kernel-exploitation (G) khanhdz191_linux-kernel-exploitation (G) khanhhdz_linux-kernel-exploitation (G) khanhhdz06_linux-kernel-exploitation (G) khanhnd123_linux-kernel-exploitation (G) manas3c_CVE-POC (G) nomi-sec_PoC-in-GitHub (G) soosmile_POC (G) taielab_awesome-hacking-lists (G) tanjiti_sec_profile (G) weeka10_-hktalent-TOP (G) xairy_linux-kernel-exploitation (G) xuetusummer_Penetration_Testing_POC (G))
	kernel              :   5.10.52     :   CVE-2022-0847" title="CVE-2022-0847" target="_blank" >CVE-2022-0847     :   7.8       :   STAT           :   Exploit (linux-exploit-suggester / EDB ID: 50808 / MSF: cve_2022_0847_dirtypipe (L) / PSS: 166229/Dirty-Pipe-Linux-Privilege-Escalation.html (P) 166230/Dirty-Pipe-SUID-Binary-Hijack-Privilege-Escalation.html (P) / Github: 0xIronGoat_dirty-pipe (G) 0xTen_pwn-gym (G) 0xeremus_dirty-pipe-poc (G) 2xYuan_CVE-2022-0847 (G) 4O4errorrr_TP_be_root (G) 4bhishek0_CVE-2022-0847-Poc (G) 4luc4rdr5290_CVE-2022-0847 (G) Al1ex_CVE-2022-0847 (G) Al1ex_LinuxEelvation (G) AlexisAhmed_CVE-2022-0847-DirtyPipe-Exploits (G) AnastasiaLomova_PR1 (G) AnastasiaLomova_PR1.1 (G) Arinerron_CVE-2022-0847-DirtyPipe-Exploit (G) Awrrays_Pentest-Tips (G) AyoubNajim_cve-2022-0847dirtypipe-exploit (G) BlizzardEternity_CVE-2022-0847 (G) BlizzardEternity_DirtyPipe-Android (G) BlizzardEternity_dirtypipez-exploit (G) CVEDB_awesome-cve-repo (G) CVEDB_top (G) CYB3RK1D_CVE-2022-0847-POC (G) Ch4nc3n_PublicExploitation (G) DanaEpp_pwncat_dirtypipe (G) DataDog_dirtypipe-container-breakout-poc (G) DataFox_CVE-2022-0847 (G) DevataDev_PiracyTools (G) DylanBarbe_dirty-pipe-clone-4-root (G) DylanBarbe_hj (G) EagleTube_CVE-2022-0847 (G) FeFi7_attacking_embedded_linux (G) FedericoGaribay_Tarea-exploit (G) Getshell_LinuxTQ (G) GibzB_THM-Captured-Rooms (G) Greetdawn_CVE-2022-0847-DirtyPipe (G) Greetdawn_CVE-2022-0847-DirtyPipe- (G) Gustavo-Nogueira_Dirty-Pipe-Exploits (G) HadessCS_Awesome-Privilege-Escalation (G) IHenakaarachchi_debian11-dirty_pipe-patcher (G) ITMarcin2211_CVE-2022-0847-DirtyPipe-Exploit (G) Ignitetechnologies_Linux-Privilege-Escalation (G) JERRY123S_all-poc (G) Jean-Francois-C_Boot2root-CTFs-Writeups (G) JlSakuya_CVE-2022-0847-container-escape (G) JlSakuya_Linux-Privilege-Escalation-Exploits (G) KayCHENvip_vulnerability-poc (G) LP-H4cmilo_CVE-2022-0847_DirtyPipe_Exploits (G) LudovicPatho_CVE-2022-0847 (G) LudovicPatho_CVE-2022-0847_dirty-pipe (G) Ly0nt4r_OSCP (G) MCANMCAN_TheDirtyPipeExploit (G) Meowmycks_OSCPprep-Cute (G) Meowmycks_OSCPprep-Sar (G) Meowmycks_OSCPprep-hackme1 (G) Metarget_metarget (G) Miraitowa70_POC-Notes (G) Mr-xn_Penetration_Testing_POC (G) MrP1xel_CVE-2022-0847-dirty-pipe-kernel-checker (G) Mustafa1986_CVE-2022-0847-DirtyPipe-Exploit (G) Nekoox_dirty-pipe (G) NetKingJ_awesome-android-security (G) NxPnch_Linux-Privesc (G) Patocoh_Research-Dirty-Pipe (G) PenTestical_linpwn (G) Qwertozavr_PR1_3 (G) Qwertozavr_PR1_3.2 (G) Qwertozavr_PR1_TRPP (G) RACHO-PRG_Linux_Escalada_Privilegios (G) Shadowven_Vulnerability_Reproduction (G) Shotokhan_cve_2022_0847_shellcode (G) SnailDev_github-hot-hub (G) Snoopy-Sec_Localroot-ALL-CVE (G) T4t4ru_CVE-2022-0847 (G) Tanq16_link-hub (G) Threekiii_Awesome-POC (G) Turzum_ps-lab-cve-2022-0847 (G) Udyz_CVE-2022-0847 (G) UgoDasseleer_write-up-Intermediate-Nmap (G) V0WKeep3r_CVE-2022-0847-DirtyPipe-Exploit (G) VinuKalana_DirtyPipe-CVE-2022-0847 (G) WhooAmii_POC_to_review (G) XmasSnowISBACK_CVE-2022-0847-DirtyPipe-Exploits (G) ZWDeJun_ZWDeJun (G) adavarski_HomeLab-Proxmox-k8s-DevSecOps-playground (G) adavarski_HomeLab-k8s-DevSecOps-playground (G) ahrixia_CVE_2022_0847 (G) airbus-cert_dirtypipe-ebpf_detection (G) ajith737_Dirty-Pipe-CVE-2022-0847-POCs (G) al4xs_CVE-2022-0847-Dirty-Pipe (G) antx-code_CVE-2022-0847 (G) arttnba3_CVE-2022-0847 (G) aruncs31s_Ethical-h4ckers.github.io (G) aruncs31s_ethical-hacking (G) atksh_Dirty-Pipe-sudo-poc (G) babyshen_CVE-2022-0847 (G) badboy-sft_Dirty-Pipe-Oneshot (G) badboycxcc_script (G) basharkey_CVE-2022-0847-dirty-pipe-checker (G) bbaranoff_CVE-2022-0847 (G) beruangsalju_LocalPrivelegeEscalation (G) beruangsalju_LocalPrivilegeEscalation (G) binganao_vulns-2022 (G) bohr777_cve-2022-0847dirtypipe-exploit (G) boy-hack_zsxq (G) brant-ruan_poc-demo (G) breachnix_dirty-pipe-poc (G) bsauce_kernel-exploit-factory (G) bsauce_kernel-security-learning (G) c0ntempt_CVE-2022-0847 (G) carlosevieira_Dirty-Pipe (G) CVE-2022-0185" title="chenaotian_CVE-2022-0185" target="_blank" >chenaotian_CVE-2022-0185 (G) chenaotian_CVE-2022-0847 (G) crac-learning_CVE-analysis-reports (G) crowsec-edtech_Dirty-Pipe (G) crusoe112_DirtyPipePython (G) cspshivam_CVE-2022-0847-dirty-pipe-exploit (G) cyberanand1337x_bug-bounty-2022 (G) d-rn_vulBox (G) dadhee_CVE-2022-0847_DirtyPipeExploit (G) decrypthing_CVE_2022_0847 (G) drapl0n_dirtypipe (G) e-hakson_OSCP (G) edr1412_Dirty-Pipe (G) edsonjt81_CVE-2022-0847-DirtyPipe- (G) edsonjt81_CVE-2022-0847-Linux (G) edsonjt81_Linux-Privilege-Escalation (G) eduquintanilha_CVE-2022-0847-DirtyPipe-Exploits (G) eljosep_OSCP-Guide (G) emmaneugene_CS443-project (G) eremus-dev_Dirty-Pipe-sudo-poc (G) eric-glb_dirtypipe (G) febinrev_dirtypipez-exploit (G) felixfu59_kernel-hack (G) flux10n_CVE-2022-0847-DirtyPipe-Exploits (G) githublihaha_DirtyPIPE-CVE-2022-0847 (G) greenhandatsjtu_CVE-2022-0847-Container-Escape (G) gyaansastra_CVE-2022-0847 (G) hheeyywweellccoommee_CVE-2022-0847-gfobj (G) hktalent_TOP (G) hoanbi1812000_hoanbi1812000 (G) hugefiver_mystars (G) hugs42_infosec (G) icontempt_CVE-2022-0847 (G) ih3na_debian11-dirty_pipe-patcher (G) imfiver_CVE-2022-0847 (G) iohubos_iohubos (G) irwx777_CVE-2022-0847 (G) isaiahsimeone_COMP3320-VAPT (G) jamesbrunet_dirtypipe-writeup (G) joeymeech_CVE-2022-0847-Exploit-Implementation (G) jonathanbest7_cve-2022-0847 (G) jpts_CVE-2022-0847-DirtyPipe-Container-Breakout (G) kaosagnt_ansible-everyday (G) kdn111_linux-kernel-exploitation (G) khanhdn111_linux-kernel-exploitation (G) khanhdz-06_linux-kernel-exploitation (G) khanhdz191_linux-kernel-exploitation (G) khanhhdz_linux-kernel-exploitation (G) khanhhdz06_linux-kernel-exploitation (G) khanhnd123_linux-kernel-exploitation (G) knqyf263_CVE-2022-0847 (G) kun-g_Scraping-Github-trending (G) kwxk_Rutgers_Cyber_Range (G) lewiswu1209_sif (G) liamg_liamg (G) liamg_traitor (G) logit507_logit507 (G) logm1lo_CVE-2022-0847_DirtyPipe_Exploits (G) lonnyzhang423_github-hot-hub (G) lucksec_CVE-2022-0847 (G) makoto56_penetration-suite-toolkit (G) manas3c_CVE-POC (G) marksowell_my-stars (G) marksowell_starred (G) marksowell_stars (G) merlinepedra_TRAITOR (G) merlinepedra25_TRAITOR (G) mhanief_dirtypipe (G) michaelklaan_CVE-2022-0847-Dirty-Pipe (G) mrchucu1_CVE-2022-0847-Docker (G) murchie85_twitterCyberMonitor (G) mutur4_CVE-2022-0847 (G) nanaao_Dirtypipe-exploit (G) nanaao_dirtyPipe-automaticRoot (G) nitishbadole_oscp-note-3 (G) nomi-sec_PoC-in-GitHub (G) notl0cal_dpipe (G) notmariekondo_notmariekondo (G) orsuprasad_CVE-2022-0847-DirtyPipe-Exploits (G) parkjunmin_CTI-Search-Criminalip-Search-Tool (G) pen4uin_awesome-cloud-native-security (G) pen4uin_cloud-native-security (G) pentestblogin_pentestblog-CVE-2022-0847 (G) peterspbr_dirty-pipe-otw (G) phuonguno98_CVE-2022-0847-DirtyPipe-Exploits (G) pipiscrew_timeline (G) pmihsan_Dirty-Pipe-CVE-2022-0847 (G) polygraphene_DirtyPipe-Android (G) puckiestyle_CVE-2022-0847 (G) qwert419_linux- (G) r1is_CVE-2022-0847 (G) rahul1406_cve-2022-0847dirtypipe-exploit (G) realbatuhan_dirtypipetester (G) rexpository_linux-privilege-escalation (G) s3mPr1linux_CVE_2022_0847 (G) sa-infinity8888_Dirty-Pipe-CVE-2022-0847 (G) sarutobi12_sarutobi12 (G) scopion_dirty-pipe (G) si1ent-le_CVE-2022-0847 (G) siberiah0h_CVE-CNVD-HUB (G) siegfrkn_CSCI5403_CVE20220847_Detection (G) soosmile_POC (G) source-xu_docker-vuls (G) stefanoleggio_dirty-pipe-cola (G) stfnw_Debugging_Dirty_Pipe_CVE-2022-0847 (G) taielab_awesome-hacking-lists (G) teamssix_container-escape-check (G) terabitSec_dirtyPipe-automaticRoot (G) theo-goetzinger_TP_be_root (G) tiann_DirtyPipeRoot (G) tmoneypenny_CVE-2022-0847 (G) trhacknon_CVE-2022-0847-DirtyPipe-Exploit (G) trhacknon_dirtypipez-exploit (G) tstromberg_ioc-bench (G) tufanturhan_CVE-2022-0847-L-nux-PrivEsc (G) uhub_awesome-c (G) ukmihiran_Rubber_Ducky_Payloads (G) veritas501_pipe-primitive (G) versatilexec_CVE_2022_0847 (G) vknc_vknc.github.io (G) weeka10_-hktalent-TOP (G) wpressly_exploitations (G) xairy_linux-kernel-exploitation (G) xnderLAN_CVE-2022-0847 (G) xndpxs_CVE-2022-0847 (G) xuetusummer_Penetration_Testing_POC (G) yoeelingBin_CVE-2022-0847-Container-Escape (G) z3dc0ps_awesome-linux-exploits (G) (X))
	kernel              :   5.10.52     :   CVE-2022-0492     :   7.8       :   STAT           :   Exploit (Github: JadenQ_Cloud-Computing-Security-ProjectPage (G) LeoPer02_IDS-Dataset (G) Metarget_metarget (G) PaloAltoNetworks_can-ctr-escape-cve-2022-0492 (G) SPuerBRead_shovel (G) SgtMate_container_escape_showcase (G) SofianeHamlaoui_CVE-2022-0492-Checker (G) T1erno_CVE-2022-0492-Docker-Breakout-Checker-and-PoC (G) Trinadh465_device_renesas_kernel_AOSP10_r33_CVE-2022-0492 (G) WhooAmii_POC_to_review (G) adavarski_HomeLab-Proxmox-k8s-DevSecOps-playground (G) adavarski_HomeLab-k8s-DevSecOps-playground (G) bashofmann_hacking-kubernetes (G) bigpick_cve-reading-list (G) cdk-team_CDK (G) chenaotian_CVE-2022-0492 (G) hardenedvault_ved (G) kvesta_vesta (G) manas3c_CVE-POC (G) marksowell_my-stars (G) marksowell_starred (G) marksowell_stars (G) nomi-sec_PoC-in-GitHub (G) puckiestyle_CVE-2022-0492 (G) sam8k_Dynamic-and-Static-Analysis-of-SOUPs (G) soosmile_POC (G) ssst0n3_ssst0n3 (G) teamssix_container-escape-check (G) ttauveron_cheatsheet (G) yoeelingBin_CVE-2022-0492-Container-Escape (G))
	kernel              :   5.10.52     :   CVE-2021-42008    :   7.8       :   STAT           :   Exploit (Github: 0xdevil_CVE-2021-42008 (G) Al1ex_LinuxEelvation (G) BachoSeven_stellestelline (G) JlSakuya_Linux-Privilege-Escalation-Exploits (G) WhooAmii_POC_to_review (G) bcoles_kasld (G) bsauce_kernel-exploit-factory (G) bsauce_kernel-security-learning (G) hardenedvault_ved (G) kdn111_linux-kernel-exploitation (G) khanhdn111_linux-kernel-exploitation (G) khanhdz-06_linux-kernel-exploitation (G) khanhdz191_linux-kernel-exploitation (G) khanhhdz_linux-kernel-exploitation (G) khanhhdz06_linux-kernel-exploitation (G) khanhnd123_linux-kernel-exploitation (G) nomi-sec_PoC-in-GitHub (G) numanturle_CVE-2021-42008 (G) soosmile_POC (G) xairy_linux-kernel-exploitation (G))
	kernel              :   5.10.52     :   CVE-2021-41073 (V):   7.8       :   STAT           :   Exploit (Github: Ch4nc3n_PublicExploitation (G) DarkFunct_CVE_Exploits (G) JlSakuya_Linux-Privilege-Escalation-Exploits (G) Snoopy-Sec_Localroot-ALL-CVE (G) WhooAmii_POC_to_review (G) bsauce_kernel-exploit-factory (G) bsauce_kernel-security-learning (G) chompie1337_Linux_LPE_io_uring_CVE-2021-41073 (G) kdn111_linux-kernel-exploitation (G) khanhdn111_linux-kernel-exploitation (G) khanhdz-06_linux-kernel-exploitation (G) khanhdz191_linux-kernel-exploitation (G) khanhhdz_linux-kernel-exploitation (G) khanhhdz06_linux-kernel-exploitation (G) khanhnd123_linux-kernel-exploitation (G) nomi-sec_PoC-in-GitHub (G) soosmile_POC (G) star-sg_CVE (G) trhacknon_CVE2 (G) xairy_linux-kernel-exploitation (G))
	kernel              :   5.10.52     :   CVE-2021-34866    :   7.8       :   STAT           :   Exploit (Github: hardenedvault_ved (G) kdn111_linux-kernel-exploitation (G) khanhdn111_linux-kernel-exploitation (G) khanhdz-06_linux-kernel-exploitation (G) khanhdz191_linux-kernel-exploitation (G) khanhhdz_linux-kernel-exploitation (G) khanhhdz06_linux-kernel-exploitation (G) khanhnd123_linux-kernel-exploitation (G) xairy_linux-kernel-exploitation (G))
	kernel              :   5.10.52     :   CVE-2021-33034    :   7.8       :   STAT           :   Exploit (Github: Trinadh465_device_renesas_kernel_AOSP10_r33_CVE-2021-33034 (G) WhooAmii_POC_to_review (G) nomi-sec_PoC-in-GitHub (G))
	kernel              :   5.10.52     :   CVE-2021-27365    :   7.8       :   STAT           :   Exploit (linux-exploit-suggester / Github: JlSakuya_Linux-Privilege-Escalation-Exploits (G) aaronxie55_Presentation2_Markdown (G) c4pt000_kernel-5.11.6-expSEHDsec-HAXM-cgroup-virtio-nvidia-amd-kaliwifi (G) eeenvik1_scripts_for_YouTrack (G) gipi_cve-cemetery (G) kdn111_linux-kernel-exploitation (G) khanhdn111_linux-kernel-exploitation (G) khanhdz-06_linux-kernel-exploitation (G) khanhdz191_linux-kernel-exploitation (G) khanhhdz_linux-kernel-exploitation (G) khanhhdz06_linux-kernel-exploitation (G) khanhnd123_linux-kernel-exploitation (G) xairy_linux-kernel-exploitation (G))
	kernel              :   5.10.52     :   CVE-2021-23134    :   7.8       :   STAT           :   Exploit (Github: kdn111_linux-kernel-exploitation (G) khanhdn111_linux-kernel-exploitation (G) khanhdz-06_linux-kernel-exploitation (G) khanhdz191_linux-kernel-exploitation (G) khanhhdz_linux-kernel-exploitation (G) khanhhdz06_linux-kernel-exploitation (G) khanhnd123_linux-kernel-exploitation (G) xairy_linux-kernel-exploitation (G))
	openssl             :   1.1.1t      :   CVE-2023-2650     :   7.5       :   STAT/UEMU      :   Exploit (Github: hshivhare67_OpenSSL_1.1.1g_CVE-2023-2650 (G) nomi-sec_PoC-in-GitHub (G))
	openssl             :   1.1.1t      :   CVE-2023-0464     :   7.5       :   STAT/UEMU      :   Exploit (Github: 1g-v_DevSec_Docker_lab (G) Trinadh465_Openssl_1.1.1g_CVE-2023-0464 (G) cloudogu_ces-build-lib (G) nomi-sec_PoC-in-GitHub (G) ortelius_ms-textfile-crud (G))
	openssl             :   1.1.1       :   CVE-2023-2650     :   7.5       :   STAT/UEMU      :   Exploit (Github: hshivhare67_OpenSSL_1.1.1g_CVE-2023-2650 (G) nomi-sec_PoC-in-GitHub (G))
	openssl             :   1.1.1       :   CVE-2023-0464     :   7.5       :   STAT/UEMU      :   Exploit (Github: 1g-v_DevSec_Docker_lab (G) Trinadh465_Openssl_1.1.1g_CVE-2023-0464 (G) cloudogu_ces-build-lib (G) nomi-sec_PoC-in-GitHub (G) ortelius_ms-textfile-crud (G))
	openssl             :   1.1.1       :   CVE-2023-0215     :   7.5       :   STAT/UEMU      :   Exploit (Github: Tuttu7_Yum-command (G) bluesentinelsec_landing-zone (G) nidhi7598_OPENSSL_1.0.2_G2.5_CVE-2023-0215 (G) nidhi7598_OPENSSL_1.1.1g_G3_CVE-2023-0215 (G) nomi-sec_PoC-in-GitHub (G) rootameen_vulpine (G))
	openssl             :   1.1.1       :   CVE-2022-4450     :   7.5       :   STAT/UEMU      :   Exploit (Github: Tuttu7_Yum-command (G) bluesentinelsec_landing-zone (G) nidhi7598_OPENSSL_1.1.1g_G3_CVE-2022-4450 (G) nomi-sec_PoC-in-GitHub (G) peng-hui_CarpetFuzz (G) rootameen_vulpine (G) waugustus_CarpetFuzz (G) waugustus_waugustus (G))
	openssl             :   1.1.1       :   CVE-2022-0778     :   7.5       :   STAT/UEMU      :   Exploit (Snyk: SNYK-UNMANAGED-OPENSSL-2426984 (S) / PSS: 167344/OpenSSL-1.0.2-1.1.1-3.0-BN_mod_sqrt-Infinite-Loop.html (P) / Github: 0xUhaw_CVE-2022-0778 (G) BobTheShoplifter_CVE-2022-0778-POC (G) CVEDB_awesome-cve-repo (G) CVEDB_top (G) EnableSecurity_awesome-rtc-hacking (G) JERRY123S_all-poc (G) Mr-xn_Penetration_Testing_POC (G) Mrlucas5550100_PoC-CVE-2022-0778- (G) SnailDev_github-hot-hub (G) WhooAmii_POC_to_review (G) actions-marketplace-validations_neuvector_scan-action (G) bashofmann_neuvector-image-scan-action (G) cyberanand1337x_bug-bounty-2022 (G) drago-96_CVE-2022-0778 (G) fdl66_openssl-1.0.2u-fix-cve (G) gatecheckdev_gatecheck (G) halon_changelog (G) hktalent_TOP (G) isgo-golgo13_gokit-gorillakit-enginesvc (G) jkakavas_CVE-2022-0778-POC (G) jmartinezl_jmartinezl (G) jntass_TASSL-1.1.1 (G) lonnyzhang423_github-hot-hub (G) manas3c_CVE-POC (G) neuvector_scan-action (G) nomi-sec_PoC-in-GitHub (G) soosmile_POC (G) spaquet_docker-alpine-mailcatcher (G) tianocore-docs_ThirdPartySecurityAdvisories (G) weeka10_-hktalent-TOP (G) wllm-rbnt_asn1template (G) xuetusummer_Penetration_Testing_POC (G) yywing_cve-2022-0778 (G))
	openssl             :   1.1.1       :   CVE-2021-23840    :   7.5       :   STAT/UEMU      :   Exploit (Github: falk-werner_cve-check (G) fdl66_openssl-1.0.2u-fix-cve (G) fredrkl_trivy-demo (G) isgo-golgo13_gokit-gorillakit-enginesvc (G) jntass_TASSL-1.1.1k (G) thecyberbaby_Trivy-by-AquaSecurity (G) thecyberbaby_Trivy-by-aquaSecurity (G) vinamra28_tekton-image-scan-trivy (G))
	openssl             :   1.1.1       :   CVE-2020-1967     :   7.5       :   STAT/UEMU      :   Exploit (PSS: 157527/OpenSSL-signature_algorithms_cert-Denial-Of-Service.html (D) / Github: 0xT11_CVE-POC (G) Mohzeela_external-secret (G) developer3000S_PoC-in-GitHub (G) dragon7-fc_misc (G) fredrkl_trivy-demo (G) garethr_snykout (G) git-bom_bomsh (G) goharbor_pluggable-scanner-spec (G) hectorgie_PoC-in-GitHub (G) irsl_CVE-2020-1967 (G) jntass_TASSL-1.1.1k (G) nomi-sec_PoC-in-GitHub (G) omnibor_bomsh (G) rossmacarthur_sheldon-cross (G) siddharthraopotukuchi_trivy (G) snigdhasambitak_cks (G) soosmile_POC (G) t31m0_Vulnerability-Scanner-for-Containers (G) thecyberbaby_Trivy-by-AquaSecurity (G) thecyberbaby_Trivy-by-aquaSecurity (G) umahari_security (G) vinamra28_tekton-image-scan-trivy (G) yonhan3_openssl-cve (G))
	kernel              :   5.10.52     :   CVE-2022-36946    :   7.5       :   STAT           :   Exploit (Github: Mr-xn_Penetration_Testing_POC (G) Pwnzer0tt1_CVE-2022-36946 (G) Satheesh575555_linux-4.19.72_CVE-2022-36946 (G) WhooAmii_POC_to_review (G) XmasSnowISBACK_CVE-2022-36946 (G) manas3c_CVE-POC (G) nik012003_nik012003 (G) nomi-sec_PoC-in-GitHub (G) xuetusummer_Penetration_Testing_POC (G))
	kernel              :   5.10.52     :   CVE-2021-45485 (V):   7.5       :   STAT           :   Exploit (Github: Satheesh575555_linux-4.19.72_CVE-2021-45485 (G) WhooAmii_POC_to_review (G) nomi-sec_PoC-in-GitHub (G))
	gnupg               :   1.4.7       :   CVE-2019-14855    :   7.5       :   UEMU           :   Exploit (Github: SHA-mbles_SHA-mbles.github.io (G) garethr_snykout (G) hannob_pgpbugs (G))
	gnupg               :   1.4.7       :   CVE-2019-13050    :   7.5       :   UEMU           :   Exploit (Github: alphaSeclab_sec-daily-2019 (G) hannob_pgpbugs (G) nedenwalker_spring-boot-app-using-gradle (G) nedenwalker_spring-boot-app-with-log4j-vuln (G) simonsdave_clair-cicd (G))
	gnupg               :   1.4.7       :   CVE-2018-12020    :   7.5       :   UEMU           :   Exploit (PSS: 152703/Johnny-You-Are-Fired.html (P) / Github: hannob_pgpbugs (G) lnick2023_nicenice (G) qazbnm456_awesome-cve-poc (G) xbl3_awesome-cve-poc_qazbnm456 (G))
	glibc               :   2.34        :   CVE-2021-43396    :   7.5       :   STAT/UEMU      :   Exploit (Github: kenlavbah_log4jnotes (G))
	glibc               :   2.34        :   CVE-2021-38604    :   7.5       :   STAT/UEMU      :   Exploit (Github: dispera_giant-squid (G) nedenwalker_spring-boot-app-using-gradle (G) nedenwalker_spring-boot-app-with-log4j-vuln (G) thegeeklab_audit-exporter (G))
	expat               :   2.4.7       :   CVE-2022-43680    :   7.5       :   STAT           :   Exploit (Github: Nivaskumark_external_expat_AOSP10_r33_CVE-2022-43680 (G) Trinadh465_external_expat-2.1.0_CVE-2022-43680 (G) VeerMuchandi_s3c-springboot-demo (G) manas3c_CVE-POC (G) maxim12z_ECommerce (G) nidhi7598_expat_2.1.0_CVE-2022-43680 (G) nidhi7598_external_expat_AOSP10_r33_CVE-2022-43680 (G) nidhihcl_external_expat_2.1.0_CVE-2022-43680 (G) nomi-sec_PoC-in-GitHub (G))
	openssl             :   1.1.1       :   CVE-2023-0286     :   7.4       :   STAT/UEMU      :   Exploit (Github: Tuttu7_Yum-command (G) dejanb_guac-rs (G) nidhi7598_OPENSSL_1.1.11g_G3_CVE-2023-0286 (G) nidhi7598_OPENSSL_1.1.1g_G3_CVE-2023-0286 (G) nomi-sec_PoC-in-GitHub (G) xkcd-2347_trust-api (G))
	openssl             :   1.1.1       :   CVE-2021-3712     :   7.4       :   STAT/UEMU      :   Exploit (Github: Frannc0_test2 (G) NeXTLinux_griffon (G) anchore_grype (G) aymankhder_scanner-for-container (G) fdl66_openssl-1.0.2u-fix-cve (G) giantswarm_starboard-exporter (G) isgo-golgo13_gokit-gorillakit-enginesvc (G) jntass_TASSL-1.1.1 (G) leonov-av_scanvus (G) lucky-sideburn_secpod_wrap (G) metapull_attackfinder (G) tianocore-docs_ThirdPartySecurityAdvisories (G))
	openssl             :   1.1.1       :   CVE-2021-3450     :   7.4       :   STAT/UEMU      :   Exploit (Github: DNTYO_F5_Vulnerability (G) fredrkl_trivy-demo (G) isgo-golgo13_gokit-gorillakit-enginesvc (G) jntass_TASSL-1.1.1k (G) rnbochsr_yr_of_the_jellyfish (G) scriptzteam_glFTPd-v2.11ab-STABLE (G) thecyberbaby_Trivy-by-AquaSecurity (G) thecyberbaby_Trivy-by-aquaSecurity (G) tianocore-docs_ThirdPartySecurityAdvisories (G) vinamra28_tekton-image-scan-trivy (G))
	openssl             :   1.1.1       :   CVE-2019-1543     :   7.4       :   STAT/UEMU      :   Exploit (Github: ANTONYOH_midterm_trivy (G) KorayAgaya_TrivyWeb (G) McLaouth_trivi (G) Mohzeela_external-secret (G) aquasecurity_trivy (G) candrapw_trivy (G) cloudogu_ces-build-lib (G) fhirfactory_pegacorn-scanner-trivy (G) fredrkl_trivy-demo (G) georgearce24_aquasecurity-trivy (G) immydestiny_trivy-file (G) jntass_TASSL-1.1.1k (G) justPray_1122 (G) kaisenlinux_trivy (G) krishna-commits_trivy (G) krishna-commits_trivy-test (G) mrodden_vyger (G) pottava_trivy-restapi (G) rafavinnce_trivy_0.27.1 (G) ronomon_crypto-async (G) siddharthraopotukuchi_trivy (G) simiyo_trivy (G) t31m0_Vulnerability-Scanner-for-Containers (G) thecyberbaby_Trivy-by-AquaSecurity (G) thecyberbaby_Trivy-by-aquaSecurity (G) umahari_security (G))
	kernel              :   5.10.52     :   CVE-2021-27364    :   7.1       :   STAT           :   Exploit (Github: aaronxie55_Presentation2_Markdown (G) c4pt000_kernel-5.11.6-expSEHDsec-HAXM-cgroup-virtio-nvidia-amd-kaliwifi (G) kdn111_linux-kernel-exploitation (G) khanhdn111_linux-kernel-exploitation (G) khanhdz-06_linux-kernel-exploitation (G) khanhdz191_linux-kernel-exploitation (G) khanhhdz_linux-kernel-exploitation (G) khanhhdz06_linux-kernel-exploitation (G) khanhnd123_linux-kernel-exploitation (G) xairy_linux-kernel-exploitation (G))
	kernel              :   5.10.52     :   CVE-2023-35829    :   7         :   STAT           :   Exploit (Github: 20142995_sectool (G) apkc_CVE-2023-35829-poc (G) nomi-sec_PoC-in-GitHub (G) timb-machine_linux-malware (G))
	kernel              :   5.10.52     :   CVE-2022-41222    :   7         :   STAT           :   Exploit (PSS: 168466/Linux-Stable-5.4-5.10-Use-After-Free-Race-Condition.html (P))
	kernel              :   5.10.52     :   CVE-2022-2959     :   7         :   STAT           :   Exploit (Github: torvalds_linux_commit_189b0ddc245139af81198d1a3637cac74f96e13a (G))
	kernel              :   5.10.52     :   CVE-2022-29582 (V):   7         :   STAT           :   Exploit (Github: Ruia-ruia_CVE-2022-29582-Exploit (G) WhooAmii_POC_to_review (G) kdn111_linux-kernel-exploitation (G) khanhdn111_linux-kernel-exploitation (G) khanhdz-06_linux-kernel-exploitation (G) khanhdz191_linux-kernel-exploitation (G) khanhhdz_linux-kernel-exploitation (G) khanhhdz06_linux-kernel-exploitation (G) khanhnd123_linux-kernel-exploitation (G) manas3c_CVE-POC (G) nomi-sec_PoC-in-GitHub (G) tr3ss_gofetch (G) xairy_linux-kernel-exploitation (G))
	kernel              :   5.10.52     :   CVE-2022-1734     :   7         :   STAT           :   Exploit (Github: torvalds_linux_commit_d270453a0d9ec10bb8a802a142fb1b3601a83098 (G))
	kernel              :   5.10.52     :   CVE-2021-44733 (V):   7         :   STAT           :   Exploit (Github: WhooAmii_POC_to_review (G) joydo_CVE-Writeups (G) kdn111_linux-kernel-exploitation (G) khanhdn111_linux-kernel-exploitation (G) khanhdz-06_linux-kernel-exploitation (G) khanhdz191_linux-kernel-exploitation (G) khanhhdz_linux-kernel-exploitation (G) khanhhdz06_linux-kernel-exploitation (G) khanhnd123_linux-kernel-exploitation (G) nomi-sec_PoC-in-GitHub (G) pjlantz_optee-qemu (G) pjlantz_optee-qemu_blob_main_README.md (G) soosmile_POC (G) xairy_linux-kernel-exploitation (G))
	kernel              :   5.10.52     :   CVE-2021-4083     :   7         :   STAT           :   Exploit (PSS: 165504/Linux-Garbage-Collection-Memory-Corruption.html (P) / Github: advxrsary_vuln-scanner (G) sam8k_Dynamic-and-Static-Analysis-of-SOUPs (G))
	kernel              :   5.10.52     :   CVE-2021-40490    :   7         :   STAT           :   Exploit (Github: Nivaskumark_CVE-2021-40490_kernel_v4.19.72 (G) sam8k_Dynamic-and-Static-Analysis-of-SOUPs (G))
	kernel              :   5.10.52     :   CVE-2021-3609     :   7         :   STAT           :   Exploit (Github: kdn111_linux-kernel-exploitation (G) khanhdn111_linux-kernel-exploitation (G) khanhdz-06_linux-kernel-exploitation (G) khanhdz191_linux-kernel-exploitation (G) khanhhdz_linux-kernel-exploitation (G) khanhhdz06_linux-kernel-exploitation (G) khanhnd123_linux-kernel-exploitation (G) nrb547_kernel-exploitation_blob_main_cve-2021-3609_cve-2021-3609.md (G) xairy_linux-kernel-exploitation (G))
	kernel              :   5.10.52     :   CVE-2021-32399    :   7         :   STAT           :   Exploit (Github: WhooAmii_POC_to_review (G) nanopathi_linux-4.19.72_CVE-2021-32399 (G) nomi-sec_PoC-in-GitHub (G))
	kernel              :   5.10.52     :   CVE-2021-22600    :   7         :   STAT           :   Exploit (Github: r4j0x00_exploits (G) (X))
	kernel              :   5.10.52     :   CVE-2023-2002     :   6.8       :   STAT           :   Exploit (Snyk: SNYK-UNMANAGED-TORVALDSLINUX-5507220 (S) / Github: CVEDB_awesome-cve-repo (G) CVEDB_top (G) hktalent_TOP (G) lrh2000_CVE-2023-2002 (G) nomi-sec_PoC-in-GitHub (G))
	kernel              :   5.10.52     :   CVE-2021-4203 (V) :   6.8       :   STAT           :   Exploit (Github: sam8k_Dynamic-and-Static-Analysis-of-SOUPs (G))
	kernel              :   5.10.52     :   CVE-2022-2503     :   6.7       :   STAT           :   Exploit (Github: google_security-research_security_advisories_GHSA-6vq3-w69p-w63m (G))
	kernel              :   5.10.52     :   CVE-2021-42739    :   6.7       :   STAT           :   Exploit (Github: JaskaranNarula_Host_Errata_Info (G))
	kernel              :   5.10.52     :   CVE-2021-42327    :   6.7       :   STAT           :   Exploit (Github: WhooAmii_POC_to_review (G) docfate111_CVE-2021-42327 (G) kdn111_linux-kernel-exploitation (G) khanhdn111_linux-kernel-exploitation (G) khanhdz-06_linux-kernel-exploitation (G) khanhdz191_linux-kernel-exploitation (G) khanhhdz_linux-kernel-exploitation (G) khanhhdz06_linux-kernel-exploitation (G) khanhnd123_linux-kernel-exploitation (G) nomi-sec_PoC-in-GitHub (G) soosmile_POC (G) xairy_linux-kernel-exploitation (G))
	kernel              :   5.10.52     :   CVE-2022-1015" title="CVE-2022-1015" target="_blank" >CVE-2022-1015     :   6.6       :   STAT           :   Exploit (Github: CVE-2023-0179-PoC" title="H4K6_CVE-2023-0179-PoC" target="_blank" >H4K6_CVE-2023-0179-PoC (G) JlSakuya_Linux-Privilege-Escalation-Exploits (G) Mr-xn_Penetration_Testing_POC (G) TurtleARM_CVE-2023-0179-PoC (G) WhooAmii_POC_to_review (G) bsauce_kernel-exploit-factory (G) bsauce_kernel-security-learning (G) delsploit_CVE-2022-1015 (G) flexiondotorg_CNCF-02 (G) hardenedvault_ved (G) hktalent_TOP (G) kdn111_linux-kernel-exploitation (G) khanhdn111_linux-kernel-exploitation (G) khanhdz-06_linux-kernel-exploitation (G) khanhdz191_linux-kernel-exploitation (G) khanhhdz_linux-kernel-exploitation (G) khanhhdz06_linux-kernel-exploitation (G) khanhnd123_linux-kernel-exploitation (G) manas3c_CVE-POC (G) nomi-sec_PoC-in-GitHub (G) now4yreal_linux-kernel-vulnerabilities (G) now4yreal_linux-kernel-vulnerabilities-root-cause-analysis (G) pivik271_CVE-2022-1015 (G) pqlx_CVE-2022-1015 (G) pr0ln_bob_kern_exp1 (G) shuttterman_bob_kern_exp1 (G) wlswotmd_CVE-2022-1015 (G) xairy_linux-kernel-exploitation (G) xuetusummer_Penetration_Testing_POC (G) yaobinwen_robin_on_rails (G) ysanatomic_CVE-2022-1015 (G) zanezhub_CVE-2022-1015-1016 (G))
	net-snmp            :   5.9.1       :   CVE-2022-44793    :   6.5       :   UEMU           :   Exploit (Github: net-snmp_net-snmp_issues_475 (G))
	net-snmp            :   5.9.1       :   CVE-2022-44792    :   6.5       :   UEMU           :   Exploit (Github: net-snmp_net-snmp_issues_474 (G))
	kernel              :   5.10.52     :   CVE-2021-3573     :   6.4       :   STAT           :   Exploit (Github: hardenedvault_ved (G) kdn111_linux-kernel-exploitation (G) khanhdn111_linux-kernel-exploitation (G) khanhdz-06_linux-kernel-exploitation (G) khanhdz191_linux-kernel-exploitation (G) khanhhdz_linux-kernel-exploitation (G) khanhhdz06_linux-kernel-exploitation (G) khanhnd123_linux-kernel-exploitation (G) xairy_linux-kernel-exploitation (G))
	openssl             :   1.1.1       :   CVE-2022-4304     :   5.9       :   STAT/UEMU      :   Exploit (Github: Trinadh465_Openssl-1.1.1g_CVE-2022-4304 (G) Tuttu7_Yum-command (G) nomi-sec_PoC-in-GitHub (G))
	openssl             :   1.1.1       :   CVE-2021-4160     :   5.9       :   STAT/UEMU      :   Exploit (Github: actions-marketplace-validations_neuvector_scan-action (G) andrewd-sysdig_nodejs-helloworld (G) bashofmann_neuvector-image-scan-action (G) fdl66_openssl-1.0.2u-fix-cve (G) neuvector_scan-action (G) tianocore-docs_ThirdPartySecurityAdvisories (G))
	openssl             :   1.1.1       :   CVE-2021-3449     :   5.9       :   STAT/UEMU      :   Exploit (Github: AliceMongodin_NSAPool-PenTest (G) EdgeSecurityTeam_Vulnerability (G) FeFi7_attacking_embedded_linux (G) SF4bin_SEEKER_dataset (G) WhooAmii_POC_to_review (G) anquanscan_sec-tools (G) arindam0310018_04-Apr-2022-DevOps__Scan-Images-In-ACR-Using-Trivy (G) falk-werner_cve-check (G) fredrkl_trivy-demo (G) gitchangye_cve (G) isgo-golgo13_gokit-gorillakit-enginesvc (G) jntass_TASSL-1.1.1k (G) manas3c_CVE-POC (G) nomi-sec_PoC-in-GitHub (G) rnbochsr_yr_of_the_jellyfish (G) scriptzteam_glFTPd-v2.11ab-STABLE (G) soosmile_POC (G) taielab_awesome-hacking-lists (G) terorie_cve-2021-3449 (G) thecyberbaby_Trivy-by-AquaSecurity (G) thecyberbaby_Trivy-by-aquaSecurity (G) tianocore-docs_ThirdPartySecurityAdvisories (G) tzwlhack_Vulnerability (G) vinamra28_tekton-image-scan-trivy (G) yonhan3_openssl-cve (G))
	openssl             :   1.1.1       :   CVE-2021-23841    :   5.9       :   STAT/UEMU      :   Exploit (Github: Satheesh575555_Openssl_1_1_0_CVE-2021-23841 (G) Trinadh465_external_boringssl_openssl_1.1.0g_CVE-2021-23841 (G) WhooAmii_POC_to_review (G) arindam0310018_04-Apr-2022-DevOps__Scan-Images-In-ACR-Using-Trivy (G) falk-werner_cve-check (G) fdl66_openssl-1.0.2u-fix-cve (G) fredrkl_trivy-demo (G) isgo-golgo13_gokit-gorillakit-enginesvc (G) jntass_TASSL-1.1.1k (G) manas3c_CVE-POC (G) nomi-sec_PoC-in-GitHub (G) thecyberbaby_Trivy-by-AquaSecurity (G) thecyberbaby_Trivy-by-aquaSecurity (G) vinamra28_tekton-image-scan-trivy (G))
	openssl             :   1.1.1       :   CVE-2020-1971     :   5.9       :   STAT/UEMU      :   Exploit (Github: MBHudson_CVE-2020-1971 (G) Metztli_debian-openssl-1.1.1i (G) arindam0310018_04-Apr-2022-DevOps__Scan-Images-In-ACR-Using-Trivy (G) developer-guy_image-scanning-using-trivy-as-go-library (G) developer3000S_PoC-in-GitHub (G) fdl66_openssl-1.0.2u-fix-cve (G) fredrkl_trivy-demo (G) hectorgie_PoC-in-GitHub (G) jntass_TASSL-1.1.1k (G) nomi-sec_PoC-in-GitHub (G) scott-leung_tools (G) soosmile_POC (G) stevechanieee_-5-OpenSSL_Versioning (G) thecyberbaby_Trivy-by-AquaSecurity (G) thecyberbaby_Trivy-by-aquaSecurity (G) vinamra28_tekton-image-scan-trivy (G))
	openssl             :   1.1.1       :   CVE-2018-0735     :   5.9       :   STAT/UEMU      :   Exploit (Github: mrodden_vyger (G) romangol_cryptoMisuse (G))
	openssl             :   1.1.1       :   CVE-2018-0734     :   5.9       :   STAT/UEMU      :   Exploit (Github: javirodriguezzz_Shodan-Browser (G) mrodden_vyger (G))
	kernel              :   5.10.52     :   CVE-2023-1998     :   5.6       :   STAT           :   Exploit (EDB ID: 51384 / Github: google_security-research_security_advisories_GHSA-mj4w-6495-6crx (G))
	systemd             :   249         :   CVE-2022-4415     :   5.5       :   UEMU           :   Exploit (Github: cdupuis_image-api (G))
	systemd             :   249         :   CVE-2022-3821     :   5.5       :   UEMU           :   Exploit (Github: cdupuis_image-api (G))
	systemd             :   249         :   CVE-2021-3997     :   5.5       :   UEMU           :   Exploit (Snyk: SNYK-UNMANAGED-SYSTEMDSYSTEMD-2990192 (S))
	systemd             :   249         :   CVE-2021-33910    :   5.5       :   UEMU           :   Exploit (PSS: 163621/Sequoia-A-Deep-Root-In-Linuxs-Filesystem-Layer.html (L) / Github: sam0392in_aws-ecr-image-scanner (G))
	kernel              :   5.10.52     :   CVE-2023-23455    :   5.5       :   STAT           :   Exploit (Github: alopresto_epss_api_demo (G) alopresto6m_epss_api_demo (G))
	kernel              :   5.10.52     :   CVE-2023-23454    :   5.5       :   STAT           :   Exploit (Github: alopresto_epss_api_demo (G) alopresto6m_epss_api_demo (G))
	kernel              :   5.10.52     :   CVE-2023-1249     :   5.5       :   STAT           :   Exploit (PSS: 171912/CentOS-Stream-9-Missing-Kernel-Security-Fix.html (L))
	kernel              :   5.10.52     :   CVE-2022-42722    :   5.5       :   STAT           :   Exploit (Snyk: SNYK-UNMANAGED-TORVALDSLINUX-3050547 (S))
	kernel              :   5.10.52     :   CVE-2022-42703 (V):   5.5       :   STAT           :   Exploit (Github: Squirre17_hbp-attack-demo (G) bcoles_kasld (G) fardeen-ahmed_Bug-bounty-Writeups (G) kdn111_linux-kernel-exploitation (G) khanhdn111_linux-kernel-exploitation (G) khanhdz-06_linux-kernel-exploitation (G) khanhdz191_linux-kernel-exploitation (G) khanhhdz_linux-kernel-exploitation (G) khanhhdz06_linux-kernel-exploitation (G) khanhnd123_linux-kernel-exploitation (G) nomi-sec_PoC-in-GitHub (G) CVE-2023-3640" title="pray77_CVE-2023-3640" target="_blank" >pray77_CVE-2023-3640 (G) pray77_SCTF2023_kernelpwn (G) veritas501_hbp_attack_demo (G) xairy_linux-kernel-exploitation (G))
	kernel              :   5.10.52     :   CVE-2022-41218    :   5.5       :   STAT           :   Exploit (Github: V4bel_CVE-2022-41218 (G) WhooAmii_POC_to_review (G) kdn111_linux-kernel-exploitation (G) khanhdn111_linux-kernel-exploitation (G) khanhdz-06_linux-kernel-exploitation (G) khanhdz191_linux-kernel-exploitation (G) khanhhdz_linux-kernel-exploitation (G) khanhhdz06_linux-kernel-exploitation (G) khanhnd123_linux-kernel-exploitation (G) manas3c_CVE-POC (G) nomi-sec_PoC-in-GitHub (G) xairy_linux-kernel-exploitation (G))
	kernel              :   5.10.52     :   CVE-2022-25375    :   5.5       :   STAT           :   Exploit (Snyk: SNYK-UNMANAGED-TORVALDSLINUX-2407769 (S) / Github: WhooAmii_POC_to_review (G) manas3c_CVE-POC (G) nomi-sec_PoC-in-GitHub (G) soosmile_POC (G) szymonh_rndis-co (G) szymonh_szymonh (G))
	kernel              :   5.10.52     :   CVE-2022-2318     :   5.5       :   STAT           :   Exploit (Github: torvalds_linux_commit_9cc02ede696272c5271a401e4f27c262359bc2f6 (G))
	kernel              :   5.10.52     :   CVE-2022-2078     :   5.5       :   STAT           :   Exploit (Github: delsploit_CVE-2022-2078 (G) kdn111_linux-kernel-exploitation (G) khanhdn111_linux-kernel-exploitation (G) khanhdz-06_linux-kernel-exploitation (G) khanhdz191_linux-kernel-exploitation (G) khanhhdz_linux-kernel-exploitation (G) khanhhdz06_linux-kernel-exploitation (G) khanhnd123_linux-kernel-exploitation (G) nomi-sec_PoC-in-GitHub (G) xairy_linux-kernel-exploitation (G))
	kernel              :   5.10.52     :   CVE-2022-1016     :   5.5       :   STAT           :   Exploit (Github: kdn111_linux-kernel-exploitation (G) khanhdn111_linux-kernel-exploitation (G) khanhdz-06_linux-kernel-exploitation (G) khanhdz191_linux-kernel-exploitation (G) khanhhdz_linux-kernel-exploitation (G) khanhhdz06_linux-kernel-exploitation (G) khanhnd123_linux-kernel-exploitation (G) xairy_linux-kernel-exploitation (G) yaobinwen_robin_on_rails (G) CVE-2022-1015-1016" title="zanezhub_CVE-2022-1015-1016" target="_blank" >zanezhub_CVE-2022-1015-1016 (G))
	kernel              :   5.10.52     :   CVE-2022-0487     :   5.5       :   STAT           :   Exploit (Github: CVE-2022-0847" title="si1ent-le_CVE-2022-0847" target="_blank" >si1ent-le_CVE-2022-0847 (G))
	kernel              :   5.10.52     :   CVE-2022-0480 (V) :   5.5       :   STAT           :   Exploit (Github: kata-containers_kata-containers_issues_3373 (G))
	kernel              :   5.10.52     :   CVE-2021-45868 (V):   5.5       :   STAT           :   Exploit (Snyk: SNYK-UNMANAGED-TORVALDSLINUX-3006722 (S))
	kernel              :   5.10.52     :   CVE-2021-4155     :   5.5       :   STAT           :   Exploit (Github: lafayette96_CVE-Errata-Tool (G))
	kernel              :   5.10.52     :   CVE-2021-4150 (V) :   5.5       :   STAT           :   Exploit (Github: sam8k_Dynamic-and-Static-Analysis-of-SOUPs (G))
	kernel              :   5.10.52     :   CVE-2021-4148 (V) :   5.5       :   STAT           :   Exploit (Github: sam8k_Dynamic-and-Static-Analysis-of-SOUPs (G))
	kernel              :   5.10.52     :   CVE-2021-3679     :   5.5       :   STAT           :   Exploit (Github: aegistudio_RingBufferDetonator (G) nomi-sec_PoC-in-GitHub (G))
	kernel              :   5.10.52     :   CVE-2021-29650 (V):   5.5       :   STAT           :   Exploit (Github: woc-hack_tutorial (G))
	kernel              :   5.10.52     :   CVE-2021-29155    :   5.5       :   STAT           :   Exploit (Github: Kakashiiiiy_CVE-2021-29155 (G) WhooAmii_POC_to_review (G) benschlueter_CVE-2021-29155 (G) manas3c_CVE-POC (G) nomi-sec_PoC-in-GitHub (G) soosmile_POC (G))
	gnupg               :   1.4.7       :   CVE-2015-1607     :   5.5       :   UEMU           :   Exploit (Github: hannob_pgpbugs (G) mrash_afl-cve (G))
	gnupg               :   1.4.7       :   CVE-2015-1606     :   5.5       :   UEMU           :   Exploit (Github: hannob_pgpbugs (G) mrash_afl-cve (G))
	openssl             :   1.1.1t      :   CVE-2023-0466     :   5.3       :   STAT/UEMU      :   Exploit (Github: bluesentinelsec_landing-zone (G))
	openssl             :   1.1.1       :   CVE-2023-0466     :   5.3       :   STAT/UEMU      :   Exploit (Github: bluesentinelsec_landing-zone (G))
	openssl             :   1.1.1       :   CVE-2022-2097     :   5.3       :   STAT/UEMU      :   Exploit (Github: PeterThomasAwen_OpenSSLUpgrade1.1.1q-Ubuntu (G) WhooAmii_POC_to_review (G) cdupuis_image-api (G) isgo-golgo13_gokit-gorillakit-enginesvc (G) jntass_TASSL-1.1.1 (G) manas3c_CVE-POC (G) nomi-sec_PoC-in-GitHub (G) tianocore-docs_ThirdPartySecurityAdvisories (G))
	openssl             :   1.1.1       :   CVE-2019-1551     :   5.3       :   STAT/UEMU      :   Exploit (Github: Mohzeela_external-secret (G) arindam0310018_04-Apr-2022-DevOps__Scan-Images-In-ACR-Using-Trivy (G) fredrkl_trivy-demo (G) garethr_snykout (G) mrodden_vyger (G) siddharthraopotukuchi_trivy (G) t31m0_Vulnerability-Scanner-for-Containers (G) thecyberbaby_Trivy-by-AquaSecurity (G) thecyberbaby_Trivy-by-aquaSecurity (G) umahari_security (G) vinamra28_tekton-image-scan-trivy (G))
	openssl             :   1.1.1       :   CVE-2019-1549     :   5.3       :   STAT/UEMU      :   Exploit (Github: Mohzeela_external-secret (G) arindam0310018_04-Apr-2022-DevOps__Scan-Images-In-ACR-Using-Trivy (G) djschleen_ash (G) fredrkl_trivy-demo (G) jntass_TASSL-1.1.1k (G) mrodden_vyger (G) siddharthraopotukuchi_trivy (G) simiyo_trivy (G) t31m0_Vulnerability-Scanner-for-Containers (G) thecyberbaby_Trivy-by-AquaSecurity (G) thecyberbaby_Trivy-by-aquaSecurity (G) umahari_security (G) vinamra28_tekton-image-scan-trivy (G))
	gnupg               :   1.4.7       :   CVE-2016-6313     :   5.3       :   UEMU           :   Exploit (Github: hannob_pgpbugs (G) lacework_up-and-running-packer (G) rsumnerz_vuls (G) scottford-lw_up-and-running-packer (G) xmppadmin_vuls (G))
	gnupg               :   1.4.7       :   CVE-2014-4617     :   5 (v2)    :   UEMU           :   Exploit (Github: tinyzimmer_amzn-alas-query-api (G))
	gnupg               :   1.4.7       :   CVE-2006-3082     :   5 (v2)    :   UEMU           :   Exploit (EDB ID: 28077 / Github: mudongliang_LinuxFlaw (G) oneoy_cve- (G))
	openssl             :   1.1.1       :   CVE-2019-1547     :   4.7       :   STAT/UEMU      :   Exploit (Github: Mohzeela_external-secret (G) arindam0310018_04-Apr-2022-DevOps__Scan-Images-In-ACR-Using-Trivy (G) djschleen_ash (G) fredrkl_trivy-demo (G) jntass_TASSL-1.1.1k (G) mrodden_vyger (G) siddharthraopotukuchi_trivy (G) simiyo_trivy (G) t31m0_Vulnerability-Scanner-for-Containers (G) thecyberbaby_Trivy-by-AquaSecurity (G) thecyberbaby_Trivy-by-aquaSecurity (G) umahari_security (G) vinamra28_tekton-image-scan-trivy (G))
	kernel              :   5.10.52     :   CVE-2022-40307    :   4.7       :   STAT           :   Exploit (Github: SettRaziel_bsi_cert_bot (G))
	kernel              :   5.10.52     :   CVE-2021-33624    :   4.7       :   STAT           :   Exploit (Github: Kakashiiiiy_CVE-2021-33624 (G) WhooAmii_POC_to_review (G) benschlueter_CVE-2021-33624 (G) nomi-sec_PoC-in-GitHub (G) soosmile_POC (G))
	kernel              :   5.10.52     :   CVE-2022-25258    :   4.6       :   STAT           :   Exploit (Github: WhooAmii_POC_to_review (G) manas3c_CVE-POC (G) nomi-sec_PoC-in-GitHub (G) soosmile_POC (G) szymonh_d-os-descriptor (G) szymonh_szymonh (G))
	kernel              :   5.10.52     :   CVE-2022-0494     :   4.4       :   STAT           :   Exploit (Github: sam8k_Dynamic-and-Static-Analysis-of-SOUPs (G))
	kernel              :   5.10.52     :   CVE-2021-4032     :   4.4       :   STAT           :   Exploit (Github: CVE-2021-4034-NoGCC" title="EstamelGG_CVE-2021-4034-NoGCC" target="_blank" >EstamelGG_CVE-2021-4034-NoGCC (G))
	kernel              :   5.10.52     :   CVE-2021-27363    :   4.4       :   STAT           :   Exploit (Github: aaronxie55_Presentation2_Markdown (G) c4pt000_kernel-5.11.6-expSEHDsec-HAXM-cgroup-virtio-nvidia-amd-kaliwifi (G) kdn111_linux-kernel-exploitation (G) khanhdn111_linux-kernel-exploitation (G) khanhdz-06_linux-kernel-exploitation (G) khanhdz191_linux-kernel-exploitation (G) khanhhdz_linux-kernel-exploitation (G) khanhhdz06_linux-kernel-exploitation (G) khanhnd123_linux-kernel-exploitation (G) xairy_linux-kernel-exploitation (G))
	kernel              :   5.10.52     :   CVE-2020-26558    :   4.2       :   STAT           :   Exploit (Github: JeffroMF_awesome-bluetooth-security321 (G) engn33r_awesome-bluetooth-security (G))
	openssl             :   1.1.1       :   CVE-2019-1563     :   3.7       :   STAT/UEMU      :   Exploit (Github: Mohzeela_external-secret (G) arindam0310018_04-Apr-2022-DevOps__Scan-Images-In-ACR-Using-Trivy (G) djschleen_ash (G) fredrkl_trivy-demo (G) jntass_TASSL-1.1.1k (G) mrodden_vyger (G) siddharthraopotukuchi_trivy (G) simiyo_trivy (G) t31m0_Vulnerability-Scanner-for-Containers (G) thecyberbaby_Trivy-by-AquaSecurity (G) thecyberbaby_Trivy-by-aquaSecurity (G) umahari_security (G) vinamra28_tekton-image-scan-trivy (G))
	openssl             :   1.1.1       :   CVE-2019-1552     :   3.3       :   STAT/UEMU      :   Exploit (Github: imhunterand_hackerone-publicy-disclosed (G) javirodriguezzz_Shodan-Browser (G) jntass_TASSL-1.1.1k (G))
	kernel              :   5.10.52     :   CVE-2022-32296    :   3.3       :   STAT           :   Exploit (Github: 0xkol_rfc6056-device-tracker (G))