[+] Final vulnerability aggregator

This module aggregates all found version numbers together from S06, S08, S09, S24, S25 and S115 and searches with cve-search for known vulnerabilities.
Additionally the identified CVE details are matched with public exploit databases.


[*] Aggregate vulnerability details
[*] Collect version details of module s25_kernel_check.csv.
[*] Collect verified kernel details of module cve_results_kernel_4.14.105.csv.
[*] Collect version details of module s06_distribution_identification.csv.
[*] Collect version details of module s08_package_mgmt_extractor.csv.
[*] Collect version details of module s09_firmware_base_version_check.csv.
[*] Collect version details of module s116_qemu_version_detection.csv.

==> Software inventory generation.

[*] Software inventory initial overview:
[+] Found Version details (package management system check): bacnet:1
[+] Found Version details (package management system check): base-files:197-r9589-2407b1e
[+] Found Version details (package management system check): block-mount:2018-12-28-af93f4b8-4
[+] Found Version details (package management system check): busybox:1.30.1-2
[+] Found Version details (package management system check): bzip2:1.0.6-5
[+] Found Version details (package management system check): ca-bundle:20180409-3
[+] Found Version details (package management system check): customrelayd:1.2-1
[+] Found Version details (package management system check): dnsmasq:2.80-11
[+] Found Version details (package management system check): dropbear:2017.75-9
[+] Found Version details (package management system check): firewall:2019-01-02-70f8785b-2
[+] Found Version details (package management system check): fstools:2018-12-28-af93f4b8-4
[+] Found Version details (package management system check): fwtool:1
[+] Found Version details (package management system check): gdbserver:8.2.1-1
[+] Found Version details (package management system check): haveged:1.9.4-1
[+] Found Version details (package management system check): hostapd-common:2018-12-02-c2c6c01b-2
[+] Found Version details (package management system check): hostapd:2018-12-02-c2c6c01b-2
[+] Found Version details (package management system check): htop:2.2.0-2
[+] Found Version details (package management system check): i2c-tools:4.1-1
[+] Found Version details (package management system check): igmpproxy:0.2.1-4
[+] Found Version details (package management system check): ip6tables:1.8.2-3
[+] Found Version details (package management system check): iptables:1.8.2-3
[+] Found Version details (package management system check): iw:5.0.1-1
[+] Found Version details (package management system check): iwinfo:2019-03-01-cb108c54-1
[+] Found Version details (package management system check): jansson:2.12-1
[+] Found Version details (package management system check): jshn:2019-02-27-eeef7b50-1
[+] Found Version details (package management system check): jsonfilter:2018-02-04-c7e938d6-1
[+] Found Version details (package management system check): kernel:4.14.105-1-c284b912704ca43cd153b079f2184b85
[+] Found Version details (package management system check): kmod-cfg80211:4.14.105+4.19.23-1-4
[+] Found Version details (package management system check): kmod-fs-configfs:4.14.105-1
[+] Found Version details (package management system check): kmod-fs-vfat:4.14.105-1
[+] Found Version details (package management system check): kmod-i2c-algo-bit:4.14.105-1
[+] Found Version details (package management system check): kmod-i2c-core:4.14.105-1
[+] Found Version details (package management system check): kmod-i2c-gpio-custom:4.14.105-2
[+] Found Version details (package management system check): kmod-i2c-gpio:4.14.105-1
[+] Found Version details (package management system check): kmod-ip6tables:4.14.105-1
[+] Found Version details (package management system check): kmod-ipt-conntrack:4.14.105-1
[+] Found Version details (package management system check): kmod-ipt-core:4.14.105-1
[+] Found Version details (package management system check): kmod-ipt-nat:4.14.105-1
[+] Found Version details (package management system check): kmod-ipt-offload:4.14.105-1
[+] Found Version details (package management system check): kmod-leds-gpio:4.14.105-1
[+] Found Version details (package management system check): kmod-ledtrig-timer:4.14.105-1
[+] Found Version details (package management system check): kmod-lib-crc-ccitt:4.14.105-1
[+] Found Version details (package management system check): kmod-lib-crc-itu-t:4.14.105-1
[+] Found Version details (package management system check): kmod-lib-crc7:4.14.105-1
[+] Found Version details (package management system check): kmod-mac80211:4.14.105+4.19.23-1-4
[+] Found Version details (package management system check): kmod-mt76-core:4.14.105+2018-12-04-da00af00-1
[+] Found Version details (package management system check): kmod-mt7603:4.14.105+2018-12-04-da00af00-1
[+] Found Version details (package management system check): kmod-nf-conntrack6:4.14.105-1
[+] Found Version details (package management system check): kmod-nf-conntrack:4.14.105-1
[+] Found Version details (package management system check): kmod-nf-flow:4.14.105-1
[+] Found Version details (package management system check): kmod-nf-ipt6:4.14.105-1
[+] Found Version details (package management system check): kmod-nf-ipt:4.14.105-1
[+] Found Version details (package management system check): kmod-nf-nat:4.14.105-1
[+] Found Version details (package management system check): kmod-nf-reject6:4.14.105-1
[+] Found Version details (package management system check): kmod-nf-reject:4.14.105-1
[+] Found Version details (package management system check): kmod-nls-base:4.14.105-1
[+] Found Version details (package management system check): kmod-nls-cp437:4.14.105-1
[+] Found Version details (package management system check): kmod-nls-iso8859-1:4.14.105-1
[+] Found Version details (package management system check): kmod-nls-utf8:4.14.105-1
[+] Found Version details (package management system check): kmod-ppp:4.14.105-1
[+] Found Version details (package management system check): kmod-pppoe:4.14.105-1
[+] Found Version details (package management system check): kmod-pppox:4.14.105-1
[+] Found Version details (package management system check): kmod-scsi-core:4.14.105-1
[+] Found Version details (package management system check): kmod-scsi-generic:4.14.105-1
[+] Found Version details (package management system check): kmod-slhc:4.14.105-1
[+] Found Version details (package management system check): kmod-spi-bitbang:4.14.105-1
[+] Found Version details (package management system check): kmod-usb-core:4.14.105-1
[+] Found Version details (package management system check): kmod-usb-ehci:4.14.105-1
[+] Found Version details (package management system check): kmod-usb-ledtrig-usbport:4.14.105-1
[+] Found Version details (package management system check): kmod-usb-ohci:4.14.105-1
[+] Found Version details (package management system check): kmod-usb-storage:4.14.105-1
[+] Found Version details (package management system check): kmod-usb2:4.14.105-1
[+] Found Version details (package management system check): libblobmsg-json:2019-02-27-eeef7b50-1
[+] Found Version details (package management system check): libbz2-1.0:1.0.6-5
[+] Found Version details (package management system check): libc:2.27-1
[+] Found Version details (package management system check): libcares:1.15.0-4
[+] Found Version details (package management system check): libcurl4:7.64.0-1
[+] Found Version details (package management system check): libgcc1:7.4.0-1
[+] Found Version details (package management system check): libhavege:1.9.4-1
[+] Found Version details (package management system check): libi2c:4.1-1
[+] Found Version details (package management system check): libip4tc0:1.8.2-3
[+] Found Version details (package management system check): libip6tc0:1.8.2-3
[+] Found Version details (package management system check): libiwinfo-lua:2019-03-01-cb108c54-1
[+] Found Version details (package management system check): libiwinfo20181126:2019-03-01-cb108c54-1
[+] Found Version details (package management system check): libjson-c2:0.12.1-3
[+] Found Version details (package management system check): libjson-script:2019-02-27-eeef7b50-1
[+] Found Version details (package management system check): libjwt:1.8.0-1
[+] Found Version details (package management system check): liblua5.1.5:5.1.5-2
[+] Found Version details (package management system check): liblzma:5.2.4-2
[+] Found Version details (package management system check): libmbedtls12:2.16.0-2
[+] Found Version details (package management system check): libmosquitto-ssl:1.5.7-1
[+] Found Version details (package management system check): libncurses6:6.1-4
[+] Found Version details (package management system check): libnl-tiny:0.1-5
[+] Found Version details (package management system check): libopenssl1.1:1.1.1b-3
[+] Found Version details (package management system check): libpcap1:1.9.0-2
[+] Found Version details (package management system check): libpcre:8.42-2
[+] Found Version details (package management system check): libpthread:2.27-1
[+] Found Version details (package management system check): libreadline8:8.0-1
[+] Found Version details (package management system check): librt:2.27-1
[+] Found Version details (package management system check): libsqlite3:3260000-3
[+] Found Version details (package management system check): libssp:7.4.0-1
[+] Found Version details (package management system check): libthread-db:2.27-1
[+] Found Version details (package management system check): libubox20170601:2019-02-27-eeef7b50-1
[+] Found Version details (package management system check): libubus-lua:2018-10-06-221ce7e7-1
[+] Found Version details (package management system check): libubus20170705:2018-10-06-221ce7e7-1
[+] Found Version details (package management system check): libuci-lua:2018-08-11-4c8b4d6e-2
[+] Found Version details (package management system check): libuci20130104:2018-08-11-4c8b4d6e-2
[+] Found Version details (package management system check): libuclient20160123:2018-11-24-3ba74ebc-1
[+] Found Version details (package management system check): libuuid1:2.33-2
[+] Found Version details (package management system check): libxtables12:1.8.2-3
[+] Found Version details (package management system check): logd:2018-12-18-876c7f5b-1
[+] Found Version details (package management system check): lua:5.1.5-2
[+] Found Version details (package management system check): memtester:4.1.3-1
[+] Found Version details (package management system check): monit-nossl:5.25.2-2
[+] Found Version details (package management system check): mqtt-service:1.0-1
[+] Found Version details (package management system check): mtd:24
[+] Found Version details (package management system check): netifd:2019-01-31-5cd7215a-1
[+] Found Version details (package management system check): nginx:1.15.8-1
[+] Found Version details (package management system check): odhcp6c:2019-01-11-d2e247d8-16
[+] Found Version details (package management system check): odhcpd-ipv6only:2019-02-27-16c5b6c9-3
[+] Found Version details (package management system check): openssh-sftp-server:7.9p1-5
[+] Found Version details (package management system check): openwrt-keyring:2018-05-18-103a32e9-1
[+] Found Version details (package management system check): opkg:2019-01-31-d4ba162b-1
[+] Found Version details (package management system check): package:
[+] Found Version details (package management system check): php7-cgi:7.2.16-1
[+] Found Version details (package management system check): php7-cli:7.2.16-1
[+] Found Version details (package management system check): php7-fpm:7.2.16-1
[+] Found Version details (package management system check): php7-mod-json:7.2.16-1
[+] Found Version details (package management system check): php7-mod-mbstring:7.2.16-1
[+] Found Version details (package management system check): php7-mod-openssl:7.2.16-1
[+] Found Version details (package management system check): php7-mod-pcntl:7.2.16-1
[+] Found Version details (package management system check): php7-mod-pdo-sqlite:7.2.16-1
[+] Found Version details (package management system check): php7-mod-pdo:7.2.16-1
[+] Found Version details (package management system check): php7-mod-session:7.2.16-1
[+] Found Version details (package management system check): php7-mod-sockets:7.2.16-1
[+] Found Version details (package management system check): php7-mod-zip:7.2.16-1
[+] Found Version details (package management system check): php7:7.2.16-1
[+] Found Version details (package management system check): ppp-mod-pppoe:2.4.7.git-2018-06-23-1
[+] Found Version details (package management system check): ppp:2.4.7.git-2018-06-23-1
[+] Found Version details (package management system check): procd:2019-03-11-d876d1ca-1
[+] Found Version details (package management system check): rpcd:2018-11-28-3aa81d0d-1
[+] Found Version details (package management system check): samba36-server:3.6.25-14
[+] Found Version details (package management system check): screen:4.6.2-1
[+] Found Version details (package management system check): strace:4.26-1
[+] Found Version details (package management system check): sudo:1.8.26-1
[+] Found Version details (package management system check): swconfig:12
[+] Found Version details (package management system check): tar:1.32-1
[+] Found Version details (package management system check): terminfo:6.1-4
[+] Found Version details (package management system check): tls_tunnel:1.0-1
[+] Found Version details (package management system check): ubox:2018-12-18-876c7f5b-1
[+] Found Version details (package management system check): ubus:2018-10-06-221ce7e7-1
[+] Found Version details (package management system check): ubusd:2018-10-06-221ce7e7-1
[+] Found Version details (package management system check): uci:2018-08-11-4c8b4d6e-2
[+] Found Version details (package management system check): uclibcxx:0.2.4-3
[+] Found Version details (package management system check): uclient-fetch:2018-11-24-3ba74ebc-1
[+] Found Version details (package management system check): unzip:6.0-8
[+] Found Version details (package management system check): usign:2015-07-04-ef641914-1
[+] Found Version details (package management system check): wireless-regdb:2017-10-20-4343d359
[+] Found Version details (package management system check): wireless-tools:29-6
[+] Found Version details (package management system check): wpa-supplicant:2018-12-02-c2c6c01b-2
[+] Found Version details (package management system check): xz-utils:5.2.4-2
[+] Found Version details (package management system check): xz:5.2.4-2
[+] Found Version details (package management system check): zip:3.0-4
[+] Found Version details (package management system check): zlib:1.2.11-2
[+] Found Version details (package management system check): zoneinfo-africa:2018i-1
[+] Found Version details (package management system check): zoneinfo-asia:2018i-1
[+] Found Version details (package management system check): zoneinfo-atlantic:2018i-1
[+] Found Version details (package management system check): zoneinfo-australia-nz:2018i-1
[+] Found Version details (package management system check): zoneinfo-core:2018i-1
[+] Found Version details (package management system check): zoneinfo-europe:2018i-1
[+] Found Version details (package management system check): zoneinfo-india:2018i-1
[+] Found Version details (package management system check): zoneinfo-northamerica:2018i-1
[+] Found Version details (package management system check): zoneinfo-pacific:2018i-1
[+] Found Version details (package management system check): zoneinfo-poles:2018i-1
[+] Found Version details (package management system check): zoneinfo-simple:2018i-1
[+] Found Version details (package management system check): zoneinfo-southamerica:2018i-1
[+] Found Version details (statical check): GNU C Library (GNU libc) stable release version 2.27.
[+] Found Version details (statical check): busybox:1.30.1
[+] Found Version details (statical check): gnu:glibc:2.27
[+] Found Version details (statical check): gnu:ncurses:6.1.20180127
[+] Found Version details (statical check): gnu:sed:4.0
[+] Found Version details (statical check): htop:2.2.0
[+] Found Version details (statical check): igmpproxy:0.2.1
[+] Found Version details (statical check): libcurl:7.64.0
[+] Found Version details (statical check): lua:5.1.5
[+] Found Version details (statical check): memtester:4.1.3
[+] Found Version details (statical check): openssl:1.1.1b
[+] Found Version details (statical check): php:7.2.16
[+] Found Version details (statical check): udhcp:1.30.1
[+] Found Version details (statical check): xz-utils:5.2.4
[+] Found Version details (statical check): zend:engine:3.2.0
[+] Found Version details (statical check): zlib:1.2.11
[+] Found Version details (emulator): bzip2:1.0.6
[+] Found Version details (emulator): dnsmasq:2.80
[+] Found Version details (emulator): dropbear_ssh:2017.75
[+] Found Version details (emulator): gdb:8.2.1
[+] Found Version details (emulator): gnu:tar:1.32
[+] Found Version details (emulator): htop:2.2.0
[+] Found Version details (emulator): i2c-tools:4.1
[+] Found Version details (emulator): igmpproxy:0.2.1
[+] Found Version details (emulator): info-zip:unzip:6.00
[+] Found Version details (emulator): info-zip:zip:3.0
[+] Found Version details (emulator): info-zip:zip:6.00
[+] Found Version details (emulator): info-zip:zipcloak:3.0
[+] Found Version details (emulator): info-zip:zipnote:3.0
[+] Found Version details (emulator): liblzma:5.2.4
[+] Found Version details (emulator): lua:5.1.5
[+] Found Version details (emulator): memtester:4.1.3
[+] Found Version details (emulator): openssl:1.1.1b
[+] Found Version details (emulator): point-to-point_protocol:2.4.7
[+] Found Version details (emulator): screen:4.06.02
[+] Found Version details (emulator): strace:4.26
[+] Found Version details (emulator): sudo:1.8.26
[+] Found Version details (emulator): xz-utils:5.2.4
[+] Found Version details (emulator): zend:engine:3.2.0
[+] Found Version details (kernel): kernel:4.14.105
[+] Found Version details (kernel): kernel:4.14.105
[+] Found Version details (kernel): kernel:4.14.105
[+] Found Version details (kernel): kernel:4.14.105
[+] Found Version details (kernel): kernel:4.14.105
[+] Found Version details (kernel): kernel:4.14.105
[+] Found Version details (kernel - with verified vulnerability details): kernel:4.14.105

[-] WARNING: Broken version identifier found: GNU C Library (GNU libc) stable release version 2.27.
[-] WARNING: Broken version identifier found: package:



[*] Software inventory aggregated:
[+] Found Version details (aggregated): kernel:4.14.105:
[+] Found Version details (aggregated): kernel:4.14.105-1-c284b912704ca43cd153b079f2184b85
[+] Found Version details (aggregated): bacnet:1
[+] Found Version details (aggregated): base-files:197-r9589-2407b1e
[+] Found Version details (aggregated): block-mount:2018-12-28-af93f4b8-4
[+] Found Version details (aggregated): busybox:1.30.1
[+] Found Version details (aggregated): busybox:1.30.1-2
[+] Found Version details (aggregated): bzip2:1.0.6
[+] Found Version details (aggregated): bzip2:1.0.6-5
[+] Found Version details (aggregated): ca-bundle:20180409-3
[+] Found Version details (aggregated): customrelayd:1.2-1
[+] Found Version details (aggregated): dnsmasq:2.80
[+] Found Version details (aggregated): dnsmasq:2.80-11
[+] Found Version details (aggregated): dropbear:2017.75-9
[+] Found Version details (aggregated): dropbear_ssh:2017.75
[+] Found Version details (aggregated): firewall:2019-01-02-70f8785b-2
[+] Found Version details (aggregated): fstools:2018-12-28-af93f4b8-4
[+] Found Version details (aggregated): fwtool:1
[+] Found Version details (aggregated): gdb:8.2.1
[+] Found Version details (aggregated): gdbserver:8.2.1-1
[+] Found Version details (aggregated): gnu:glibc:2.27
[+] Found Version details (aggregated): gnu:ncurses:6.1.20180127
[+] Found Version details (aggregated): gnu:sed:4.0
[+] Found Version details (aggregated): gnu:tar:1.32
[+] Found Version details (aggregated): haveged:1.9.4-1
[+] Found Version details (aggregated): hostapd-common:2018-12-02-c2c6c01b-2
[+] Found Version details (aggregated): hostapd:2018-12-02-c2c6c01b-2
[+] Found Version details (aggregated): htop:2.2.0
[+] Found Version details (aggregated): htop:2.2.0-2
[+] Found Version details (aggregated): i2c-tools:4.1
[+] Found Version details (aggregated): i2c-tools:4.1-1
[+] Found Version details (aggregated): igmpproxy:0.2.1
[+] Found Version details (aggregated): igmpproxy:0.2.1-4
[+] Found Version details (aggregated): info-zip:unzip:6.00
[+] Found Version details (aggregated): info-zip:zip:3.0
[+] Found Version details (aggregated): info-zip:zip:6.00
[+] Found Version details (aggregated): info-zip:zipcloak:3.0
[+] Found Version details (aggregated): info-zip:zipnote:3.0
[+] Found Version details (aggregated): ip6tables:1.8.2-3
[+] Found Version details (aggregated): iptables:1.8.2-3
[+] Found Version details (aggregated): iw:5.0.1-1
[+] Found Version details (aggregated): iwinfo:2019-03-01-cb108c54-1
[+] Found Version details (aggregated): jansson:2.12-1
[+] Found Version details (aggregated): jshn:2019-02-27-eeef7b50-1
[+] Found Version details (aggregated): jsonfilter:2018-02-04-c7e938d6-1
[+] Found Version details (aggregated): kmod-cfg80211:4.14.105+4.19.23-1-4
[+] Found Version details (aggregated): kmod-fs-configfs:4.14.105-1
[+] Found Version details (aggregated): kmod-fs-vfat:4.14.105-1
[+] Found Version details (aggregated): kmod-i2c-algo-bit:4.14.105-1
[+] Found Version details (aggregated): kmod-i2c-core:4.14.105-1
[+] Found Version details (aggregated): kmod-i2c-gpio-custom:4.14.105-2
[+] Found Version details (aggregated): kmod-i2c-gpio:4.14.105-1
[+] Found Version details (aggregated): kmod-ip6tables:4.14.105-1
[+] Found Version details (aggregated): kmod-ipt-conntrack:4.14.105-1
[+] Found Version details (aggregated): kmod-ipt-core:4.14.105-1
[+] Found Version details (aggregated): kmod-ipt-nat:4.14.105-1
[+] Found Version details (aggregated): kmod-ipt-offload:4.14.105-1
[+] Found Version details (aggregated): kmod-leds-gpio:4.14.105-1
[+] Found Version details (aggregated): kmod-ledtrig-timer:4.14.105-1
[+] Found Version details (aggregated): kmod-lib-crc-ccitt:4.14.105-1
[+] Found Version details (aggregated): kmod-lib-crc-itu-t:4.14.105-1
[+] Found Version details (aggregated): kmod-lib-crc7:4.14.105-1
[+] Found Version details (aggregated): kmod-mac80211:4.14.105+4.19.23-1-4
[+] Found Version details (aggregated): kmod-mt76-core:4.14.105+2018-12-04-da00af00-1
[+] Found Version details (aggregated): kmod-mt7603:4.14.105+2018-12-04-da00af00-1
[+] Found Version details (aggregated): kmod-nf-conntrack6:4.14.105-1
[+] Found Version details (aggregated): kmod-nf-conntrack:4.14.105-1
[+] Found Version details (aggregated): kmod-nf-flow:4.14.105-1
[+] Found Version details (aggregated): kmod-nf-ipt6:4.14.105-1
[+] Found Version details (aggregated): kmod-nf-ipt:4.14.105-1
[+] Found Version details (aggregated): kmod-nf-nat:4.14.105-1
[+] Found Version details (aggregated): kmod-nf-reject6:4.14.105-1
[+] Found Version details (aggregated): kmod-nf-reject:4.14.105-1
[+] Found Version details (aggregated): kmod-nls-base:4.14.105-1
[+] Found Version details (aggregated): kmod-nls-cp437:4.14.105-1
[+] Found Version details (aggregated): kmod-nls-iso8859-1:4.14.105-1
[+] Found Version details (aggregated): kmod-nls-utf8:4.14.105-1
[+] Found Version details (aggregated): kmod-ppp:4.14.105-1
[+] Found Version details (aggregated): kmod-pppoe:4.14.105-1
[+] Found Version details (aggregated): kmod-pppox:4.14.105-1
[+] Found Version details (aggregated): kmod-scsi-core:4.14.105-1
[+] Found Version details (aggregated): kmod-scsi-generic:4.14.105-1
[+] Found Version details (aggregated): kmod-slhc:4.14.105-1
[+] Found Version details (aggregated): kmod-spi-bitbang:4.14.105-1
[+] Found Version details (aggregated): kmod-usb-core:4.14.105-1
[+] Found Version details (aggregated): kmod-usb-ehci:4.14.105-1
[+] Found Version details (aggregated): kmod-usb-ledtrig-usbport:4.14.105-1
[+] Found Version details (aggregated): kmod-usb-ohci:4.14.105-1
[+] Found Version details (aggregated): kmod-usb-storage:4.14.105-1
[+] Found Version details (aggregated): kmod-usb2:4.14.105-1
[+] Found Version details (aggregated): libblobmsg-json:2019-02-27-eeef7b50-1
[+] Found Version details (aggregated): libbz2-1.0:1.0.6-5
[+] Found Version details (aggregated): libc:2.27-1
[+] Found Version details (aggregated): libcares:1.15.0-4
[+] Found Version details (aggregated): libcurl4:7.64.0-1
[+] Found Version details (aggregated): libcurl:7.64.0
[+] Found Version details (aggregated): libgcc1:7.4.0-1
[+] Found Version details (aggregated): libhavege:1.9.4-1
[+] Found Version details (aggregated): libi2c:4.1-1
[+] Found Version details (aggregated): libip4tc0:1.8.2-3
[+] Found Version details (aggregated): libip6tc0:1.8.2-3
[+] Found Version details (aggregated): libiwinfo-lua:2019-03-01-cb108c54-1
[+] Found Version details (aggregated): libiwinfo20181126:2019-03-01-cb108c54-1
[+] Found Version details (aggregated): libjson-c2:0.12.1-3
[+] Found Version details (aggregated): libjson-script:2019-02-27-eeef7b50-1
[+] Found Version details (aggregated): libjwt:1.8.0-1
[+] Found Version details (aggregated): liblua5.1.5:5.1.5-2
[+] Found Version details (aggregated): liblzma:5.2.4
[+] Found Version details (aggregated): liblzma:5.2.4-2
[+] Found Version details (aggregated): libmbedtls12:2.16.0-2
[+] Found Version details (aggregated): libmosquitto-ssl:1.5.7-1
[+] Found Version details (aggregated): libncurses6:6.1-4
[+] Found Version details (aggregated): libnl-tiny:0.1-5
[+] Found Version details (aggregated): libopenssl1.1:1.1.1b-3
[+] Found Version details (aggregated): libpcap1:1.9.0-2
[+] Found Version details (aggregated): libpcre:8.42-2
[+] Found Version details (aggregated): libpthread:2.27-1
[+] Found Version details (aggregated): libreadline8:8.0-1
[+] Found Version details (aggregated): librt:2.27-1
[+] Found Version details (aggregated): libsqlite3:3260000-3
[+] Found Version details (aggregated): libssp:7.4.0-1
[+] Found Version details (aggregated): libthread-db:2.27-1
[+] Found Version details (aggregated): libubox20170601:2019-02-27-eeef7b50-1
[+] Found Version details (aggregated): libubus-lua:2018-10-06-221ce7e7-1
[+] Found Version details (aggregated): libubus20170705:2018-10-06-221ce7e7-1
[+] Found Version details (aggregated): libuci-lua:2018-08-11-4c8b4d6e-2
[+] Found Version details (aggregated): libuci20130104:2018-08-11-4c8b4d6e-2
[+] Found Version details (aggregated): libuclient20160123:2018-11-24-3ba74ebc-1
[+] Found Version details (aggregated): libuuid1:2.33-2
[+] Found Version details (aggregated): libxtables12:1.8.2-3
[+] Found Version details (aggregated): logd:2018-12-18-876c7f5b-1
[+] Found Version details (aggregated): lua:5.1.5
[+] Found Version details (aggregated): lua:5.1.5-2
[+] Found Version details (aggregated): memtester:4.1.3
[+] Found Version details (aggregated): memtester:4.1.3-1
[+] Found Version details (aggregated): monit-nossl:5.25.2-2
[+] Found Version details (aggregated): mqtt-service:1.0-1
[+] Found Version details (aggregated): mtd:24
[+] Found Version details (aggregated): netifd:2019-01-31-5cd7215a-1
[+] Found Version details (aggregated): nginx:1.15.8-1
[+] Found Version details (aggregated): odhcp6c:2019-01-11-d2e247d8-16
[+] Found Version details (aggregated): odhcpd-ipv6only:2019-02-27-16c5b6c9-3
[+] Found Version details (aggregated): openssh-sftp-server:7.9p1-5
[+] Found Version details (aggregated): openssl:1.1.1b
[+] Found Version details (aggregated): openwrt-keyring:2018-05-18-103a32e9-1
[+] Found Version details (aggregated): opkg:2019-01-31-d4ba162b-1
[+] Found Version details (aggregated): php7-cgi:7.2.16-1
[+] Found Version details (aggregated): php7-cli:7.2.16-1
[+] Found Version details (aggregated): php7-fpm:7.2.16-1
[+] Found Version details (aggregated): php7-mod-json:7.2.16-1
[+] Found Version details (aggregated): php7-mod-mbstring:7.2.16-1
[+] Found Version details (aggregated): php7-mod-openssl:7.2.16-1
[+] Found Version details (aggregated): php7-mod-pcntl:7.2.16-1
[+] Found Version details (aggregated): php7-mod-pdo-sqlite:7.2.16-1
[+] Found Version details (aggregated): php7-mod-pdo:7.2.16-1
[+] Found Version details (aggregated): php7-mod-session:7.2.16-1
[+] Found Version details (aggregated): php7-mod-sockets:7.2.16-1
[+] Found Version details (aggregated): php7-mod-zip:7.2.16-1
[+] Found Version details (aggregated): php7:7.2.16-1
[+] Found Version details (aggregated): php:7.2.16
[+] Found Version details (aggregated): point-to-point_protocol:2.4.7
[+] Found Version details (aggregated): ppp-mod-pppoe:2.4.7.git-2018-06-23-1
[+] Found Version details (aggregated): ppp:2.4.7.git-2018-06-23-1
[+] Found Version details (aggregated): procd:2019-03-11-d876d1ca-1
[+] Found Version details (aggregated): rpcd:2018-11-28-3aa81d0d-1
[+] Found Version details (aggregated): samba36-server:3.6.25-14
[+] Found Version details (aggregated): screen:4.06.02
[+] Found Version details (aggregated): screen:4.6.2-1
[+] Found Version details (aggregated): strace:4.26
[+] Found Version details (aggregated): strace:4.26-1
[+] Found Version details (aggregated): sudo:1.8.26
[+] Found Version details (aggregated): sudo:1.8.26-1
[+] Found Version details (aggregated): swconfig:12
[+] Found Version details (aggregated): tar:1.32-1
[+] Found Version details (aggregated): terminfo:6.1-4
[+] Found Version details (aggregated): tls_tunnel:1.0-1
[+] Found Version details (aggregated): ubox:2018-12-18-876c7f5b-1
[+] Found Version details (aggregated): ubus:2018-10-06-221ce7e7-1
[+] Found Version details (aggregated): ubusd:2018-10-06-221ce7e7-1
[+] Found Version details (aggregated): uci:2018-08-11-4c8b4d6e-2
[+] Found Version details (aggregated): uclibcxx:0.2.4-3
[+] Found Version details (aggregated): uclient-fetch:2018-11-24-3ba74ebc-1
[+] Found Version details (aggregated): udhcp:1.30.1
[+] Found Version details (aggregated): unzip:6.0-8
[+] Found Version details (aggregated): usign:2015-07-04-ef641914-1
[+] Found Version details (aggregated): wireless-regdb:2017-10-20-4343d359
[+] Found Version details (aggregated): wireless-tools:29-6
[+] Found Version details (aggregated): wpa-supplicant:2018-12-02-c2c6c01b-2
[+] Found Version details (aggregated): xz-utils:5.2.4
[+] Found Version details (aggregated): xz-utils:5.2.4-2
[+] Found Version details (aggregated): xz:5.2.4-2
[+] Found Version details (aggregated): zend:engine:3.2.0
[+] Found Version details (aggregated): zip:3.0-4
[+] Found Version details (aggregated): zlib:1.2.11
[+] Found Version details (aggregated): zlib:1.2.11-2
[+] Found Version details (aggregated): zoneinfo-africa:2018i-1
[+] Found Version details (aggregated): zoneinfo-asia:2018i-1
[+] Found Version details (aggregated): zoneinfo-atlantic:2018i-1
[+] Found Version details (aggregated): zoneinfo-australia-nz:2018i-1
[+] Found Version details (aggregated): zoneinfo-core:2018i-1
[+] Found Version details (aggregated): zoneinfo-europe:2018i-1
[+] Found Version details (aggregated): zoneinfo-india:2018i-1
[+] Found Version details (aggregated): zoneinfo-northamerica:2018i-1
[+] Found Version details (aggregated): zoneinfo-pacific:2018i-1
[+] Found Version details (aggregated): zoneinfo-poles:2018i-1
[+] Found Version details (aggregated): zoneinfo-simple:2018i-1
[+] Found Version details (aggregated): zoneinfo-southamerica:2018i-1




==> Collect CVE and exploit details from versions.

[*] Vulnerability details for bacnet / version 1 / source PACK:

[+] Found NO CVEs and NO exploits (including POC's) in bacnet with version 1 (source PACK).

[*] Vulnerability details for block-mount / version 2018-12-28-af93f4b8-4 / source PACK:
[*] Vulnerability details for kernel / version 4.14.105-1-c284b912704ca43cd153b079f2184b85 / source PACK:


[+] Found NO CVEs and NO exploits (including POC's) in block-mount with version 2018-12-28-af93f4b8-4 (source PACK).
[+] Found NO CVEs and NO exploits (including POC's) in kernel with version 4.14.105-1-c284b912704ca43cd153b079f2184b85 (source PACK).


[*] Vulnerability details for base-files / version 197-r9589-2407b1e / source PACK:

[+] Found NO CVEs and NO exploits (including POC's) in base-files with version 197-r9589-2407b1e (source PACK).

[*] Vulnerability details for busybox / version 1.30.1 / source STAT/PACK:

	busybox             :   1.30.1      :  	CVE-2022-28391    :   8.8       :   STAT/PACK      :   Exploit (Github: KazKobara_dockerfile_fswiki_local (G) grggls_crypto-devops-test (G) isgo-golgo13_gokit-gorillakit-enginesvc (G))
	busybox             :   1.30.1      :  	CVE-2018-1000500  :   8.1       :   STAT/PACK      :   Exploit (Github: alphaSeclab_sec-daily-2020 (G))
	busybox             :   1.30.1      :  	CVE-2021-42386    :   7.2       :   STAT/PACK      :   Exploit (Github: isgo-golgo13_gokit-gorillakit-enginesvc (G))
	busybox             :   1.30.1      :  	CVE-2021-42385    :   7.2       :   STAT/PACK      :   Exploit (Github: isgo-golgo13_gokit-gorillakit-enginesvc (G))
	busybox             :   1.30.1      :  	CVE-2021-42384    :   7.2       :   STAT/PACK      :   Exploit (Github: isgo-golgo13_gokit-gorillakit-enginesvc (G))
	busybox             :   1.30.1      :  	CVE-2021-42382    :   7.2       :   STAT/PACK      :   Exploit (Github: isgo-golgo13_gokit-gorillakit-enginesvc (G))
	busybox             :   1.30.1      :  	CVE-2021-42381    :   7.2       :   STAT/PACK      :   Exploit (Github: isgo-golgo13_gokit-gorillakit-enginesvc (G))
	busybox             :   1.30.1      :  	CVE-2021-42380    :   7.2       :   STAT/PACK      :   Exploit (Github: isgo-golgo13_gokit-gorillakit-enginesvc (G))
	busybox             :   1.30.1      :  	CVE-2021-42379    :   7.2       :   STAT/PACK      :   Exploit (Github: isgo-golgo13_gokit-gorillakit-enginesvc (G))
	busybox             :   1.30.1      :  	CVE-2021-42378    :   7.2       :   STAT/PACK      :   Exploit (Github: isgo-golgo13_gokit-gorillakit-enginesvc (G))
	busybox             :   1.30.1      :  	CVE-2021-42376    :   5.5       :   STAT/PACK      :   No exploit available
	busybox             :   1.30.1      :  	CVE-2021-42374    :   5.3       :   STAT/PACK      :   Exploit (Github: isgo-golgo13_gokit-gorillakit-enginesvc (G))

[+] Found 12 CVEs and 11 exploits (including POC's) in busybox with version 1.30.1 (source STAT/PACK).

[+] INFO: Vulnerability CVE-2019-18805 is a verified kernel vulnerability (kernel symbols)!
[+] INFO: Vulnerability CVE-2019-16746 is a verified kernel vulnerability (kernel symbols)!
[*] Vulnerability details for busybox / version 1.30.1-2 / source PACK:

[+] Found NO CVEs and NO exploits (including POC's) in busybox with version 1.30.1-2 (source PACK).

[*] Vulnerability details for bzip2 / version 1.0.6-5 / source PACK:

[+] Found NO CVEs and NO exploits (including POC's) in bzip2 with version 1.0.6-5 (source PACK).

[*] Vulnerability details for ca-bundle / version 20180409-3 / source PACK:

[+] Found NO CVEs and NO exploits (including POC's) in ca-bundle with version 20180409-3 (source PACK).

[*] Vulnerability details for bzip2 / version 1.0.6 / source UEMU/PACK:

	bzip2               :   1.0.6       :  	CVE-2019-12900    :   9.8       :   UEMU/PACK      :   Exploit (Github: bubbleguuum_zypperdiff (G) fredrkl_trivy-demo (G))
	bzip2               :   1.0.6       :  	CVE-2016-3189     :   6.5       :   UEMU/PACK      :   Exploit (Github: actions-marketplace-validations_phonito_phonito-scanner-action (G) bubbleguuum_zypperdiff (G) genuinetools_reg (G) ngkz_my-lfs-setup (G) orgTestCodacy11KRepos110MB_repo-3654-reg (G) phonito_phonito-scanner-action (G) phonito_phonito-vulnerable-container (G) strongcourage_uafbench (G) tomwillfixit_alpine-cvecheck (G) yfoelling_yair (G))

[+] Found 2 CVEs and 2 exploits (including POC's) in bzip2 with version 1.0.6 (source UEMU/PACK).

[+] INFO: Vulnerability CVE-2022-1012 is a verified kernel vulnerability (kernel symbols)!
[+] INFO: Vulnerability CVE-2019-19770 is a verified kernel vulnerability (kernel symbols)!
[*] Vulnerability details for customrelayd / version 1.2-1 / source PACK:

[+] Found NO CVEs and NO exploits (including POC's) in customrelayd with version 1.2-1 (source PACK).

[*] Vulnerability details for dnsmasq / version 2.80-11 / source PACK:

[+] Found NO CVEs and NO exploits (including POC's) in dnsmasq with version 2.80-11 (source PACK).

[*] Vulnerability details for dropbear / version 2017.75-9 / source PACK:

[+] Found NO CVEs and NO exploits (including POC's) in dropbear with version 2017.75-9 (source PACK).

[*] Vulnerability details for dropbear_ssh / version 2017.75 / source UEMU:

	dropbear_ssh        :   2017.75     :  	CVE-2020-36254    :   8.1       :   UEMU           :   Exploit (Github: Morton-L_BoltWrt (G))
	dropbear_ssh        :   2017.75     :  	CVE-2021-36369    :   7.5       :   UEMU           :   No exploit available
	dropbear_ssh        :   2017.75     :  	CVE-2019-12953    :   5.3       :   UEMU           :   No exploit available
	dropbear_ssh        :   2017.75     :  	CVE-2018-15599    :   5.3       :   UEMU           :   Exploit (Github: odolezal_silvercrest_zigbee_gateway (G) xtaran_dist-detect (G))

[+] Found 4 CVEs and 2 exploits (including POC's) in dropbear_ssh with version 2017.75 (source UEMU).

[+] WARNING: Vulnerability CVE-2023-0266 is a known exploited vulnerability.
[*] Vulnerability details for firewall / version 2019-01-02-70f8785b-2 / source PACK:

[+] Found NO CVEs and NO exploits (including POC's) in firewall with version 2019-01-02-70f8785b-2 (source PACK).

[*] Vulnerability details for dnsmasq / version 2.80 / source UEMU/PACK:

	dnsmasq             :   2.80        :  	CVE-2020-25682    :   8.1       :   UEMU/PACK      :   Exploit (Github: AZ-X_pique (G) DNTYO_F5_Vulnerability (G) kaosagnt_ansible-everyday (G) klcheung99_CSCM28CW2 (G))
	dnsmasq             :   2.80        :  	CVE-2020-25681    :   8.1       :   UEMU/PACK      :   Exploit (Github: AZ-X_pique (G) DNTYO_F5_Vulnerability (G) kaosagnt_ansible-everyday (G) klcheung99_CSCM28CW2 (G))
	dnsmasq             :   2.80        :  	CVE-2023-28450    :   7.5       :   UEMU/PACK      :   No exploit available
	dnsmasq             :   2.80        :  	CVE-2022-0934     :   7.5       :   UEMU/PACK      :   No exploit available
	dnsmasq             :   2.80        :  	CVE-2020-25687    :   5.9       :   UEMU/PACK      :   Exploit (Github: AZ-X_pique (G) DNTYO_F5_Vulnerability (G) kaosagnt_ansible-everyday (G) klcheung99_CSCM28CW2 (G))
	dnsmasq             :   2.80        :  	CVE-2020-25683    :   5.9       :   UEMU/PACK      :   Exploit (Github: AZ-X_pique (G) DNTYO_F5_Vulnerability (G) kaosagnt_ansible-everyday (G) klcheung99_CSCM28CW2 (G))
	dnsmasq             :   2.80        :  	CVE-2021-3448     :   4         :   UEMU/PACK      :   No exploit available
	dnsmasq             :   2.80        :  	CVE-2020-25686    :   3.7       :   UEMU/PACK      :   Exploit (Github: AZ-X_pique (G) CVEDB_awesome-cve-repo (G) CVEDB_top (G) DNTYO_F5_Vulnerability (G) EdgeSecurityTeam_Vulnerability (G) JERRY123S_all-poc (G) SexyBeast233_SecBooks (G) cyberanand1337x_bug-bounty-2022 (G) developer3000S_PoC-in-GitHub (G) hktalent_TOP (G) kaosagnt_ansible-everyday (G) klcheung99_CSCM28CW2 (G) knqyf263_dnspooq (G) mboukhalfa_multironic (G) nomi-sec_PoC-in-GitHub (G) tzwlhack_Vulnerability (G) weeka10_-hktalent-TOP (G))
	dnsmasq             :   2.80        :  	CVE-2020-25685    :   3.7       :   UEMU/PACK      :   Exploit (Github: AZ-X_pique (G) CVEDB_awesome-cve-repo (G) CVEDB_top (G) DNTYO_F5_Vulnerability (G) EdgeSecurityTeam_Vulnerability (G) JERRY123S_all-poc (G) SexyBeast233_SecBooks (G) cyberanand1337x_bug-bounty-2022 (G) hktalent_TOP (G) kaosagnt_ansible-everyday (G) klcheung99_CSCM28CW2 (G) knqyf263_dnspooq (G) mboukhalfa_multironic (G) tzwlhack_Vulnerability (G) weeka10_-hktalent-TOP (G))
	dnsmasq             :   2.80        :  	CVE-2020-25684    :   3.7       :   UEMU/PACK      :   Exploit (Github: AZ-X_pique (G) CVEDB_awesome-cve-repo (G) CVEDB_top (G) DNTYO_F5_Vulnerability (G) EdgeSecurityTeam_Vulnerability (G) JERRY123S_all-poc (G) SexyBeast233_SecBooks (G) cyberanand1337x_bug-bounty-2022 (G) developer3000S_PoC-in-GitHub (G) hktalent_TOP (G) kaosagnt_ansible-everyday (G) klcheung99_CSCM28CW2 (G) knqyf263_dnspooq (G) mboukhalfa_multironic (G) nomi-sec_PoC-in-GitHub (G) tzwlhack_Vulnerability (G) weeka10_-hktalent-TOP (G))
	dnsmasq             :   2.80        :  	CVE-2019-14834    :   3.7       :   UEMU/PACK      :   No exploit available

[+] Found 11 CVEs and 7 exploits (including POC's) in dnsmasq with version 2.80 (source UEMU/PACK).

[*] Vulnerability details for fstools / version 2018-12-28-af93f4b8-4 / source PACK:

[+] Found NO CVEs and NO exploits (including POC's) in fstools with version 2018-12-28-af93f4b8-4 (source PACK).

[*] Vulnerability details for fwtool / version 1 / source PACK:

[+] Found NO CVEs and NO exploits (including POC's) in fwtool with version 1 (source PACK).

[*] Vulnerability details for gdb / version 8.2.1 / source UEMU:

	gdb                 :   8.2.1       :  	CVE-2019-1010180  :   7.8       :   UEMU           :   No exploit available

[+] Found 1 CVEs and 0 exploits (including POC's) in gdb with version 8.2.1 (source UEMU).

[*] Vulnerability details for gdbserver / version 8.2.1-1 / source PACK:

[+] Found NO CVEs and NO exploits (including POC's) in gdbserver with version 8.2.1-1 (source PACK).

[*] Vulnerability details for ncurses / version 6.1.20180127 / source STAT:

[+] Found NO CVEs and NO exploits (including POC's) in ncurses with version 6.1.20180127 (source STAT).

[*] Vulnerability details for sed / version 4.0 / source STAT:

[+] Found NO CVEs and NO exploits (including POC's) in sed with version 4.0 (source STAT).

[*] Vulnerability details for tar / version 1.32 / source UEMU/PACK:

	tar                 :   1.32        :  	CVE-2022-48303    :   5.5       :   UEMU/PACK      :   No exploit available
	tar                 :   1.32        :  	CVE-2021-20193    :   5.5       :   UEMU/PACK      :   No exploit available

[+] Found 2 CVEs and 0 exploits (including POC's) in tar with version 1.32 (source UEMU/PACK).

[*] Vulnerability details for haveged / version 1.9.4-1 / source PACK:

[+] Found NO CVEs and NO exploits (including POC's) in haveged with version 1.9.4-1 (source PACK).

[+] INFO: Vulnerability CVE-2021-33909 is a verified kernel vulnerability (kernel symbols)!
[*] Vulnerability details for glibc / version 2.27 / source STAT:

	glibc               :   2.27        :  	CVE-2022-23219    :   9.8       :   STAT           :   No exploit available
	glibc               :   2.27        :  	CVE-2022-23218    :   9.8       :   STAT           :   No exploit available
	glibc               :   2.27        :  	CVE-2019-9169     :   9.8       :   STAT           :   Exploit (Github: flyrev_security-scan-ci-presentation (G))
	glibc               :   2.27        :  	CVE-2018-11236    :   9.8       :   STAT           :   Exploit (Github: 0xT11_CVE-POC (G) evilmiracle_CVE-2018-11236 (G) flyrev_security-scan-ci-presentation (G) simonsdave_clair-cicd (G))
	glibc               :   2.27        :  	CVE-2017-18269    :   9.8       :   STAT           :   Exploit (Github: fingolfin_memmove-bug (G) flyrev_security-scan-ci-presentation (G))
	glibc               :   2.27        :  	CVE-2021-35942    :   9.1       :   STAT           :   Exploit (Github: WynSon_CVE-2021-35042 (G) Zh0ngS0n1337_CVE-2021-35042 (G) dispera_giant-squid (G) madchap_opa-tests (G) n3utr1n00_CVE-2021-35042 (G) nedenwalker_spring-boot-app-using-gradle (G) nedenwalker_spring-boot-app-with-log4j-vuln (G) ruzickap_cks-notes (G) thegeeklab_audit-exporter (G))
	glibc               :   2.27        :  	CVE-2020-6096     :   8.1       :   STAT           :   Exploit (Github: Frannc0_test2 (G) KashaMalaga_cve2020-6096 (G) NeXTLinux_griffon (G) anchore_grype (G) aymankhder_scanner-for-container (G) dispera_giant-squid (G) domyrtille_interview_project (G) epequeno_devops-demo (G) garethr_snykout (G) kumarmadhu123_cve_web_scrapper (G) metapull_attackfinder (G) nedenwalker_spring-boot-app-using-gradle (G) nedenwalker_spring-boot-app-with-log4j-vuln (G) onzack_trivy-multiscanner (G) ruzickap_container-build (G) thegeeklab_audit-exporter (G))
	glibc               :   2.27        :  	CVE-2021-3999     :   7.8       :   STAT           :   Exploit (Github: flexiondotorg_CNCF-02 (G) maxim12z_ECommerce (G) rootameen_vulpine (G))
	glibc               :   2.27        :  	CVE-2019-6488     :   7.8       :   STAT           :   Exploit (Github: flyrev_security-scan-ci-presentation (G))
	glibc               :   2.27        :  	CVE-2018-11237    :   7.8       :   STAT           :   Exploit (PSS: 147870/GNU-glibc-Local-Buffer-Overflow.html (P) / Github: flyrev_security-scan-ci-presentation (G) simonsdave_clair-cicd (G))
	glibc               :   2.27        :  	CVE-2021-38604    :   7.5       :   STAT           :   Exploit (Github: dispera_giant-squid (G) nedenwalker_spring-boot-app-using-gradle (G) nedenwalker_spring-boot-app-with-log4j-vuln (G) thegeeklab_audit-exporter (G))
	glibc               :   2.27        :  	CVE-2021-3326     :   7.5       :   STAT           :   Exploit (Github: dispera_giant-squid (G) domyrtille_interview_project (G) epequeno_devops-demo (G) nedenwalker_spring-boot-app-using-gradle (G) nedenwalker_spring-boot-app-with-log4j-vuln (G) onzack_trivy-multiscanner (G))
	glibc               :   2.27        :  	CVE-2019-9192     :   7.5       :   STAT           :   Exploit (Github: CKL2022_meta-timesys (G) TimesysGit_meta-timesys (G) cdupuis_image-api (G) garethr_snykout (G) renren82_timesys (G) siva7080_meta-timesys (G) xlloss_meta-timesys (G))
	glibc               :   2.27        :  	CVE-2018-20796    :   7.5       :   STAT           :   Exploit (Github: cdupuis_image-api (G) flyrev_security-scan-ci-presentation (G) garethr_snykout (G))
	glibc               :   2.27        :  	CVE-2018-19591    :   7.5       :   STAT           :   Exploit (Github: simonsdave_clair-cicd (G))
	glibc               :   2.27        :  	CVE-2009-5155     :   7.5       :   STAT           :   Exploit (Github: flyrev_security-scan-ci-presentation (G) iakovmarkov_prometheus-vuls-exporter (G) nedenwalker_spring-boot-app-using-gradle (G) nedenwalker_spring-boot-app-with-log4j-vuln (G) thegeeklab_audit-exporter (G))
	glibc               :   2.27        :  	CVE-2020-1752     :   7         :   STAT           :   Exploit (Github: garethr_snykout (G))
	glibc               :   2.27        :  	CVE-2020-1751     :   7         :   STAT           :   Exploit (Github: Azure_container-scan (G) ExpLangcn_FuYao-Go (G) actions-marketplace-validations_Azure_container-scan (G) binxio_gcr-kritis-signer (G) drjhunter_container-scan (G) garethr_snykout (G))
	glibc               :   2.27        :  	CVE-2019-25013    :   5.9       :   STAT           :   Exploit (Github: YaleSpinup_ecr-api (G) brandoncamenisch_release-the-code-litecoin (G) dispera_giant-squid (G) domyrtille_interview_project (G) epequeno_devops-demo (G) nedenwalker_spring-boot-app-using-gradle (G) nedenwalker_spring-boot-app-with-log4j-vuln (G) onzack_trivy-multiscanner (G))
	glibc               :   2.27        :  	CVE-2015-8985     :   5.9       :   STAT           :   Exploit (Github: flyrev_security-scan-ci-presentation (G) mrash_afl-cve (G) nedenwalker_spring-boot-app-using-gradle (G) nedenwalker_spring-boot-app-with-log4j-vuln (G) yfoelling_yair (G))
	glibc               :   2.27        :  	CVE-2020-27618    :   5.5       :   STAT           :   Exploit (Github: dispera_giant-squid (G) domyrtille_interview_project (G) epequeno_devops-demo (G) nedenwalker_spring-boot-app-using-gradle (G) nedenwalker_spring-boot-app-with-log4j-vuln (G) onzack_trivy-multiscanner (G))
	glibc               :   2.27        :  	CVE-2020-10029    :   5.5       :   STAT           :   Exploit (Github: ForAllSecure_VulnerabilitiesLab (G) alphaSeclab_sec-daily-2020 (G) garethr_snykout (G))
	glibc               :   2.27        :  	CVE-2019-7309     :   5.5       :   STAT           :   Exploit (Github: flyrev_security-scan-ci-presentation (G))
	glibc               :   2.27        :  	CVE-2016-10739    :   5.3       :   STAT           :   Exploit (Github: CKL2022_meta-timesys (G) TimesysGit_meta-timesys (G) flyrev_security-scan-ci-presentation (G) nedenwalker_spring-boot-app-using-gradle (G) nedenwalker_spring-boot-app-with-log4j-vuln (G) renren82_timesys (G) siva7080_meta-timesys (G) xlloss_meta-timesys (G))

[+] Found 24 CVEs and 22 exploits (including POC's) in glibc with version 2.27 (source STAT).

[*] Vulnerability details for hostapd-common / version 2018-12-02-c2c6c01b-2 / source PACK:

[+] Found NO CVEs and NO exploits (including POC's) in hostapd-common with version 2018-12-02-c2c6c01b-2 (source PACK).

[*] Vulnerability details for hostapd / version 2018-12-02-c2c6c01b-2 / source PACK:

[+] Found NO CVEs and NO exploits (including POC's) in hostapd with version 2018-12-02-c2c6c01b-2 (source PACK).

[+] INFO: Vulnerability CVE-2020-29661 is a verified kernel vulnerability (kernel symbols)!
[*] Vulnerability details for htop / version 2.2.0 / source STAT/UEMU/PACK:

[+] Found NO CVEs and NO exploits (including POC's) in htop with version 2.2.0 (source STAT/UEMU/PACK).

[*] Vulnerability details for htop / version 2.2.0-2 / source PACK:

[+] Found NO CVEs and NO exploits (including POC's) in htop with version 2.2.0-2 (source PACK).

[*] Vulnerability details for i2c-tools / version 4.1 / source UEMU/PACK:

[+] Found NO CVEs and NO exploits (including POC's) in i2c-tools with version 4.1 (source UEMU/PACK).

[*] Vulnerability details for i2c-tools / version 4.1-1 / source PACK:

[+] Found NO CVEs and NO exploits (including POC's) in i2c-tools with version 4.1-1 (source PACK).

[*] Vulnerability details for igmpproxy / version 0.2.1 / source STAT/UEMU/PACK:

[+] Found NO CVEs and NO exploits (including POC's) in igmpproxy with version 0.2.1 (source STAT/UEMU/PACK).

[+] WARNING: Vulnerability CVE-2019-13272 is a known exploited vulnerability.
[+] INFO: Vulnerability CVE-2019-13272 is a verified kernel vulnerability (kernel symbols)!
[*] Vulnerability details for igmpproxy / version 0.2.1-4 / source PACK:

[+] Found NO CVEs and NO exploits (including POC's) in igmpproxy with version 0.2.1-4 (source PACK).

[*] Vulnerability details for unzip / version 6.00 / source UEMU:

[+] Found NO CVEs and NO exploits (including POC's) in unzip with version 6.00 (source UEMU).

[*] Vulnerability details for zip / version 3.0 / source UEMU/PACK:

[+] Found NO CVEs and NO exploits (including POC's) in zip with version 3.0 (source UEMU/PACK).

[+] INFO: Vulnerability CVE-2018-25020 is a verified kernel vulnerability (kernel symbols)!
[*] Vulnerability details for zip / version 6.00 / source UEMU:

[+] Found NO CVEs and NO exploits (including POC's) in zip with version 6.00 (source UEMU).

[*] Vulnerability details for zipcloak / version 3.0 / source UEMU:

[+] Found NO CVEs and NO exploits (including POC's) in zipcloak with version 3.0 (source UEMU).

[*] Vulnerability details for zipnote / version 3.0 / source UEMU:

[+] Found NO CVEs and NO exploits (including POC's) in zipnote with version 3.0 (source UEMU).

[*] Vulnerability details for ip6tables / version 1.8.2-3 / source PACK:

[+] Found NO CVEs and NO exploits (including POC's) in ip6tables with version 1.8.2-3 (source PACK).

[*] Vulnerability details for iptables / version 1.8.2-3 / source PACK:

[+] Found NO CVEs and NO exploits (including POC's) in iptables with version 1.8.2-3 (source PACK).

[+] INFO: Vulnerability CVE-2021-45485 is a verified kernel vulnerability (kernel symbols)!
[+] INFO: Vulnerability CVE-2019-8980 is a verified kernel vulnerability (kernel symbols)!
[*] Vulnerability details for iw / version 5.0.1-1 / source PACK:

[+] Found NO CVEs and NO exploits (including POC's) in iw with version 5.0.1-1 (source PACK).

[*] Vulnerability details for iwinfo / version 2019-03-01-cb108c54-1 / source PACK:

[+] Found NO CVEs and NO exploits (including POC's) in iwinfo with version 2019-03-01-cb108c54-1 (source PACK).

[*] Vulnerability details for jansson / version 2.12-1 / source PACK:

[+] Found NO CVEs and NO exploits (including POC's) in jansson with version 2.12-1 (source PACK).

[*] Vulnerability details for jshn / version 2019-02-27-eeef7b50-1 / source PACK:

[+] Found NO CVEs and NO exploits (including POC's) in jshn with version 2019-02-27-eeef7b50-1 (source PACK).

[*] Vulnerability details for jsonfilter / version 2018-02-04-c7e938d6-1 / source PACK:

[+] Found NO CVEs and NO exploits (including POC's) in jsonfilter with version 2018-02-04-c7e938d6-1 (source PACK).

[*] Vulnerability details for kmod-cfg80211 / version 4.14.105+4.19.23-1-4 / source PACK:

[+] Found NO CVEs and NO exploits (including POC's) in kmod-cfg80211 with version 4.14.105+4.19.23-1-4 (source PACK).

[*] Vulnerability details for kmod-fs-configfs / version 4.14.105-1 / source PACK:

[+] Found NO CVEs and NO exploits (including POC's) in kmod-fs-configfs with version 4.14.105-1 (source PACK).

[*] Vulnerability details for kmod-fs-vfat / version 4.14.105-1 / source PACK:

[+] Found NO CVEs and NO exploits (including POC's) in kmod-fs-vfat with version 4.14.105-1 (source PACK).

[*] Vulnerability details for kmod-i2c-algo-bit / version 4.14.105-1 / source PACK:

[+] Found NO CVEs and NO exploits (including POC's) in kmod-i2c-algo-bit with version 4.14.105-1 (source PACK).

[*] Vulnerability details for kmod-i2c-core / version 4.14.105-1 / source PACK:

[+] Found NO CVEs and NO exploits (including POC's) in kmod-i2c-core with version 4.14.105-1 (source PACK).

[*] Vulnerability details for kmod-i2c-gpio-custom / version 4.14.105-2 / source PACK:

[+] Found NO CVEs and NO exploits (including POC's) in kmod-i2c-gpio-custom with version 4.14.105-2 (source PACK).

[*] Vulnerability details for kmod-i2c-gpio / version 4.14.105-1 / source PACK:

[+] Found NO CVEs and NO exploits (including POC's) in kmod-i2c-gpio with version 4.14.105-1 (source PACK).

[*] Vulnerability details for kmod-ip6tables / version 4.14.105-1 / source PACK:

[+] Found NO CVEs and NO exploits (including POC's) in kmod-ip6tables with version 4.14.105-1 (source PACK).

[*] Vulnerability details for kmod-ipt-conntrack / version 4.14.105-1 / source PACK:

[+] Found NO CVEs and NO exploits (including POC's) in kmod-ipt-conntrack with version 4.14.105-1 (source PACK).

[*] Vulnerability details for kmod-ipt-core / version 4.14.105-1 / source PACK:

[+] Found NO CVEs and NO exploits (including POC's) in kmod-ipt-core with version 4.14.105-1 (source PACK).

[+] INFO: Vulnerability CVE-2020-29370 is a verified kernel vulnerability (kernel symbols)!
[+] INFO: Vulnerability CVE-2020-29369 is a verified kernel vulnerability (kernel symbols)!
[*] Vulnerability details for kmod-ipt-nat / version 4.14.105-1 / source PACK:

[+] Found NO CVEs and NO exploits (including POC's) in kmod-ipt-nat with version 4.14.105-1 (source PACK).

[*] Vulnerability details for kmod-ipt-offload / version 4.14.105-1 / source PACK:

[+] Found NO CVEs and NO exploits (including POC's) in kmod-ipt-offload with version 4.14.105-1 (source PACK).

[+] INFO: Vulnerability CVE-2021-4203 is a verified kernel vulnerability (kernel symbols)!
[*] Vulnerability details for kmod-leds-gpio / version 4.14.105-1 / source PACK:

[+] Found NO CVEs and NO exploits (including POC's) in kmod-leds-gpio with version 4.14.105-1 (source PACK).

[*] Vulnerability details for kmod-ledtrig-timer / version 4.14.105-1 / source PACK:

[+] Found NO CVEs and NO exploits (including POC's) in kmod-ledtrig-timer with version 4.14.105-1 (source PACK).

[*] Vulnerability details for kmod-lib-crc-ccitt / version 4.14.105-1 / source PACK:

[+] Found NO CVEs and NO exploits (including POC's) in kmod-lib-crc-ccitt with version 4.14.105-1 (source PACK).

[*] Vulnerability details for kmod-lib-crc-itu-t / version 4.14.105-1 / source PACK:

[+] Found NO CVEs and NO exploits (including POC's) in kmod-lib-crc-itu-t with version 4.14.105-1 (source PACK).

[+] INFO: Vulnerability CVE-2020-15436 is a verified kernel vulnerability (kernel symbols)!
[*] Vulnerability details for kmod-lib-crc7 / version 4.14.105-1 / source PACK:

[+] Found NO CVEs and NO exploits (including POC's) in kmod-lib-crc7 with version 4.14.105-1 (source PACK).

[+] INFO: Vulnerability CVE-2020-12464 is a verified kernel vulnerability (kernel symbols)!
[*] Vulnerability details for kmod-mac80211 / version 4.14.105+4.19.23-1-4 / source PACK:

[+] Found NO CVEs and NO exploits (including POC's) in kmod-mac80211 with version 4.14.105+4.19.23-1-4 (source PACK).

[*] Vulnerability details for kmod-mt76-core / version 4.14.105+2018-12-04-da00af00-1 / source PACK:

[+] Found NO CVEs and NO exploits (including POC's) in kmod-mt76-core with version 4.14.105+2018-12-04-da00af00-1 (source PACK).

[*] Vulnerability details for kmod-mt7603 / version 4.14.105+2018-12-04-da00af00-1 / source PACK:

[+] Found NO CVEs and NO exploits (including POC's) in kmod-mt7603 with version 4.14.105+2018-12-04-da00af00-1 (source PACK).

[*] Vulnerability details for kmod-nf-conntrack6 / version 4.14.105-1 / source PACK:

[+] Found NO CVEs and NO exploits (including POC's) in kmod-nf-conntrack6 with version 4.14.105-1 (source PACK).

[*] Vulnerability details for kmod-nf-conntrack / version 4.14.105-1 / source PACK:

[+] Found NO CVEs and NO exploits (including POC's) in kmod-nf-conntrack with version 4.14.105-1 (source PACK).

[*] Vulnerability details for kmod-nf-flow / version 4.14.105-1 / source PACK:

[+] Found NO CVEs and NO exploits (including POC's) in kmod-nf-flow with version 4.14.105-1 (source PACK).

[*] Vulnerability details for kmod-nf-ipt6 / version 4.14.105-1 / source PACK:

[+] Found NO CVEs and NO exploits (including POC's) in kmod-nf-ipt6 with version 4.14.105-1 (source PACK).

[*] Vulnerability details for kmod-nf-ipt / version 4.14.105-1 / source PACK:

[+] Found NO CVEs and NO exploits (including POC's) in kmod-nf-ipt with version 4.14.105-1 (source PACK).

[+] INFO: Vulnerability CVE-2020-27171 is a verified kernel vulnerability (kernel symbols)!
[+] INFO: Vulnerability CVE-2018-12232 is a verified kernel vulnerability (kernel symbols)!
[*] Vulnerability details for kmod-nf-nat / version 4.14.105-1 / source PACK:

[+] Found NO CVEs and NO exploits (including POC's) in kmod-nf-nat with version 4.14.105-1 (source PACK).

[*] Vulnerability details for kmod-nf-reject6 / version 4.14.105-1 / source PACK:

[+] Found NO CVEs and NO exploits (including POC's) in kmod-nf-reject6 with version 4.14.105-1 (source PACK).

[+] INFO: Vulnerability CVE-2019-7308 is a verified kernel vulnerability (kernel symbols)!
[*] Vulnerability details for kmod-nf-reject / version 4.14.105-1 / source PACK:

[+] Found NO CVEs and NO exploits (including POC's) in kmod-nf-reject with version 4.14.105-1 (source PACK).

[*] Vulnerability details for kmod-nls-base / version 4.14.105-1 / source PACK:

[+] Found NO CVEs and NO exploits (including POC's) in kmod-nls-base with version 4.14.105-1 (source PACK).

[*] Vulnerability details for kmod-nls-cp437 / version 4.14.105-1 / source PACK:

[+] Found NO CVEs and NO exploits (including POC's) in kmod-nls-cp437 with version 4.14.105-1 (source PACK).

[*] Vulnerability details for kmod-nls-iso8859-1 / version 4.14.105-1 / source PACK:

[+] Found NO CVEs and NO exploits (including POC's) in kmod-nls-iso8859-1 with version 4.14.105-1 (source PACK).

[*] Vulnerability details for kmod-nls-utf8 / version 4.14.105-1 / source PACK:

[+] Found NO CVEs and NO exploits (including POC's) in kmod-nls-utf8 with version 4.14.105-1 (source PACK).

[+] INFO: Vulnerability CVE-2023-0394 is a verified kernel vulnerability (kernel symbols)!
[+] INFO: Vulnerability CVE-2022-42703 is a verified kernel vulnerability (kernel symbols)!
[*] Vulnerability details for kmod-ppp / version 4.14.105-1 / source PACK:

[+] Found NO CVEs and NO exploits (including POC's) in kmod-ppp with version 4.14.105-1 (source PACK).

[*] Vulnerability details for kmod-pppoe / version 4.14.105-1 / source PACK:

[+] Found NO CVEs and NO exploits (including POC's) in kmod-pppoe with version 4.14.105-1 (source PACK).

[*] Vulnerability details for kmod-pppox / version 4.14.105-1 / source PACK:

[+] Found NO CVEs and NO exploits (including POC's) in kmod-pppox with version 4.14.105-1 (source PACK).

[+] INFO: Vulnerability CVE-2022-3543 is a verified kernel vulnerability (kernel symbols)!
[*] Vulnerability details for kmod-scsi-core / version 4.14.105-1 / source PACK:

[+] Found NO CVEs and NO exploits (including POC's) in kmod-scsi-core with version 4.14.105-1 (source PACK).

[*] Vulnerability details for kmod-scsi-generic / version 4.14.105-1 / source PACK:

[+] Found NO CVEs and NO exploits (including POC's) in kmod-scsi-generic with version 4.14.105-1 (source PACK).

[*] Vulnerability details for kmod-slhc / version 4.14.105-1 / source PACK:

[+] Found NO CVEs and NO exploits (including POC's) in kmod-slhc with version 4.14.105-1 (source PACK).

[*] Vulnerability details for kmod-spi-bitbang / version 4.14.105-1 / source PACK:

[+] Found NO CVEs and NO exploits (including POC's) in kmod-spi-bitbang with version 4.14.105-1 (source PACK).

[*] Vulnerability details for kmod-usb-core / version 4.14.105-1 / source PACK:

[+] Found NO CVEs and NO exploits (including POC's) in kmod-usb-core with version 4.14.105-1 (source PACK).

[+] INFO: Vulnerability CVE-2022-0480 is a verified kernel vulnerability (kernel symbols)!
[*] Vulnerability details for kmod-usb-ehci / version 4.14.105-1 / source PACK:

[+] Found NO CVEs and NO exploits (including POC's) in kmod-usb-ehci with version 4.14.105-1 (source PACK).

[+] INFO: Vulnerability CVE-2021-45868 is a verified kernel vulnerability (kernel symbols)!
[+] INFO: Vulnerability CVE-2021-45402 is a verified kernel vulnerability (kernel symbols)!
[*] Vulnerability details for kmod-usb-ledtrig-usbport / version 4.14.105-1 / source PACK:

[+] Found NO CVEs and NO exploits (including POC's) in kmod-usb-ledtrig-usbport with version 4.14.105-1 (source PACK).

[+] INFO: Vulnerability CVE-2021-4148 is a verified kernel vulnerability (kernel symbols)!
[*] Vulnerability details for kmod-usb-ohci / version 4.14.105-1 / source PACK:

[+] Found NO CVEs and NO exploits (including POC's) in kmod-usb-ohci with version 4.14.105-1 (source PACK).

[*] Vulnerability details for kmod-usb-storage / version 4.14.105-1 / source PACK:

[+] Found NO CVEs and NO exploits (including POC's) in kmod-usb-storage with version 4.14.105-1 (source PACK).

[*] Vulnerability details for kmod-usb2 / version 4.14.105-1 / source PACK:

[+] Found NO CVEs and NO exploits (including POC's) in kmod-usb2 with version 4.14.105-1 (source PACK).

[+] INFO: Vulnerability CVE-2021-31829 is a verified kernel vulnerability (kernel symbols)!
[+] INFO: Vulnerability CVE-2021-29650 is a verified kernel vulnerability (kernel symbols)!
[+] INFO: Vulnerability CVE-2021-29648 is a verified kernel vulnerability (kernel symbols)!
[*] Vulnerability details for libblobmsg-json / version 2019-02-27-eeef7b50-1 / source PACK:

[+] Found NO CVEs and NO exploits (including POC's) in libblobmsg-json with version 2019-02-27-eeef7b50-1 (source PACK).

[+] INFO: Vulnerability CVE-2021-29155 is a verified kernel vulnerability (kernel symbols)!
[*] Vulnerability details for libbz2-1.0 / version 1.0.6-5 / source PACK:

[+] Found NO CVEs and NO exploits (including POC's) in libbz2-1.0 with version 1.0.6-5 (source PACK).

[+] INFO: Vulnerability CVE-2021-20219 is a verified kernel vulnerability (kernel symbols)!
[*] Vulnerability details for libc / version 2.27-1 / source PACK:

[+] Found NO CVEs and NO exploits (including POC's) in libc with version 2.27-1 (source PACK).

[+] INFO: Vulnerability CVE-2020-36691 is a verified kernel vulnerability (kernel symbols)!
[*] Vulnerability details for libcares / version 1.15.0-4 / source PACK:

[+] Found NO CVEs and NO exploits (including POC's) in libcares with version 1.15.0-4 (source PACK).
[+] INFO: Vulnerability CVE-2020-27194 is a verified kernel vulnerability (kernel symbols)!

[*] Vulnerability details for libcurl4 / version 7.64.0-1 / source PACK:

[+] Found NO CVEs and NO exploits (including POC's) in libcurl4 with version 7.64.0-1 (source PACK).

[*] Vulnerability details for libgcc1 / version 7.4.0-1 / source PACK:

[+] Found NO CVEs and NO exploits (including POC's) in libgcc1 with version 7.4.0-1 (source PACK).

[*] Vulnerability details for libcurl / version 7.64.0 / source STAT:

	libcurl             :   7.64.0      :  	CVE-2019-5436     :   7.8       :   STAT           :   No exploit available
	libcurl             :   7.64.0      :  	CVE-2020-8286     :   7.5       :   STAT           :   Exploit (Github: YaleSpinup_ecr-api (G) salrashid123_envoy_mtls (G))
	libcurl             :   7.64.0      :  	CVE-2020-8285     :   7.5       :   STAT           :   No exploit available
	libcurl             :   7.64.0      :  	CVE-2020-8231     :   7.5       :   STAT           :   No exploit available
	libcurl             :   7.64.0      :  	CVE-2023-27536    :   5.9       :   STAT           :   Exploit (Github: 1g-v_DevSec_Docker_lab (G))
	libcurl             :   7.64.0      :  	CVE-2023-27535    :   5.9       :   STAT           :   Exploit (Github: 1g-v_DevSec_Docker_lab (G))
	libcurl             :   7.64.0      :  	CVE-2023-27538    :   5.5       :   STAT           :   No exploit available
	libcurl             :   7.64.0      :  	CVE-2021-22876    :   5.3       :   STAT           :   Exploit (Github: indece-official_clair-client (G))
	libcurl             :   7.64.0      :  	CVE-2021-22924    :   3.7       :   STAT           :   Exploit (Github: Trinadh465_external_curl_AOSP10_r33_CVE-2021-22924 (G) kenlavbah_log4jnotes (G) nomi-sec_PoC-in-GitHub (G))
	libcurl             :   7.64.0      :  	CVE-2021-22890    :   3.7       :   STAT           :   Exploit (Github: indece-official_clair-client (G))

[+] Found 10 CVEs and 6 exploits (including POC's) in libcurl with version 7.64.0 (source STAT).

[*] Vulnerability details for libhavege / version 1.9.4-1 / source PACK:

[+] Found NO CVEs and NO exploits (including POC's) in libhavege with version 1.9.4-1 (source PACK).

[+] INFO: Vulnerability CVE-2019-20422 is a verified kernel vulnerability (kernel symbols)!
[*] Vulnerability details for libi2c / version 4.1-1 / source PACK:

[+] Found NO CVEs and NO exploits (including POC's) in libi2c with version 4.1-1 (source PACK).

[+] INFO: Vulnerability CVE-2019-19055 is a verified kernel vulnerability (kernel symbols)!
[*] Vulnerability details for libip4tc0 / version 1.8.2-3 / source PACK:

[+] Found NO CVEs and NO exploits (including POC's) in libip4tc0 with version 1.8.2-3 (source PACK).

[*] Vulnerability details for libip6tc0 / version 1.8.2-3 / source PACK:

[+] Found NO CVEs and NO exploits (including POC's) in libip6tc0 with version 1.8.2-3 (source PACK).

[+] INFO: Vulnerability CVE-2019-12819 is a verified kernel vulnerability (kernel symbols)!
[*] Vulnerability details for libiwinfo-lua / version 2019-03-01-cb108c54-1 / source PACK:

[+] Found NO CVEs and NO exploits (including POC's) in libiwinfo-lua with version 2019-03-01-cb108c54-1 (source PACK).

[+] INFO: Vulnerability CVE-2019-12381 is a verified kernel vulnerability (kernel symbols)!
[*] Vulnerability details for libiwinfo20181126 / version 2019-03-01-cb108c54-1 / source PACK:

[+] INFO: Vulnerability CVE-2019-12378 is a verified kernel vulnerability (kernel symbols)!
[+] Found NO CVEs and NO exploits (including POC's) in libiwinfo20181126 with version 2019-03-01-cb108c54-1 (source PACK).

[*] Vulnerability details for libjson-c2 / version 0.12.1-3 / source PACK:

[+] Found NO CVEs and NO exploits (including POC's) in libjson-c2 with version 0.12.1-3 (source PACK).

[*] Vulnerability details for libjson-script / version 2019-02-27-eeef7b50-1 / source PACK:

[+] Found NO CVEs and NO exploits (including POC's) in libjson-script with version 2019-02-27-eeef7b50-1 (source PACK).

[*] Vulnerability details for libjwt / version 1.8.0-1 / source PACK:

[+] Found NO CVEs and NO exploits (including POC's) in libjwt with version 1.8.0-1 (source PACK).

[*] Vulnerability details for liblua5.1.5 / version 5.1.5-2 / source PACK:

[+] Found NO CVEs and NO exploits (including POC's) in liblua5.1.5 with version 5.1.5-2 (source PACK).

[*] Vulnerability details for liblzma / version 5.2.4 / source UEMU/PACK:

[+] Found NO CVEs and NO exploits (including POC's) in liblzma with version 5.2.4 (source UEMU/PACK).

[*] Vulnerability details for libmbedtls12 / version 2.16.0-2 / source PACK:

[+] Found NO CVEs and NO exploits (including POC's) in libmbedtls12 with version 2.16.0-2 (source PACK).

[*] Vulnerability details for liblzma / version 5.2.4-2 / source PACK:

[+] Found NO CVEs and NO exploits (including POC's) in liblzma with version 5.2.4-2 (source PACK).

[+] INFO: Vulnerability CVE-2019-18282 is a verified kernel vulnerability (kernel symbols)!
[*] Vulnerability details for libmosquitto-ssl / version 1.5.7-1 / source PACK:

[+] Found NO CVEs and NO exploits (including POC's) in libmosquitto-ssl with version 1.5.7-1 (source PACK).

[*] Vulnerability details for libncurses6 / version 6.1-4 / source PACK:

[+] Found NO CVEs and NO exploits (including POC's) in libncurses6 with version 6.1-4 (source PACK).

[*] Vulnerability details for libnl-tiny / version 0.1-5 / source PACK:

[+] Found NO CVEs and NO exploits (including POC's) in libnl-tiny with version 0.1-5 (source PACK).

[+] INFO: Vulnerability CVE-2023-0590 is a verified kernel vulnerability (kernel symbols)!
[*] Vulnerability details for libpcap1 / version 1.9.0-2 / source PACK:

[+] Found NO CVEs and NO exploits (including POC's) in libpcap1 with version 1.9.0-2 (source PACK).

[*] Vulnerability details for libopenssl1.1 / version 1.1.1b-3 / source PACK:

[+] Found NO CVEs and NO exploits (including POC's) in libopenssl1.1 with version 1.1.1b-3 (source PACK).

[+] INFO: Vulnerability CVE-2021-33624 is a verified kernel vulnerability (kernel symbols)!
[+] INFO: Vulnerability CVE-2020-27170 is a verified kernel vulnerability (kernel symbols)!
[+] INFO: Vulnerability CVE-2020-12114 is a verified kernel vulnerability (kernel symbols)!
[*] Vulnerability details for libpcre / version 8.42-2 / source PACK:

[+] Found NO CVEs and NO exploits (including POC's) in libpcre with version 8.42-2 (source PACK).

[*] Vulnerability details for libpthread / version 2.27-1 / source PACK:

[+] Found NO CVEs and NO exploits (including POC's) in libpthread with version 2.27-1 (source PACK).

[*] Vulnerability details for libreadline8 / version 8.0-1 / source PACK:

[+] Found NO CVEs and NO exploits (including POC's) in libreadline8 with version 8.0-1 (source PACK).

[*] Vulnerability details for librt / version 2.27-1 / source PACK:

[+] Found NO CVEs and NO exploits (including POC's) in librt with version 2.27-1 (source PACK).

[*] Vulnerability details for libsqlite3 / version 3260000-3 / source PACK:

[+] Found NO CVEs and NO exploits (including POC's) in libsqlite3 with version 3260000-3 (source PACK).

[*] Vulnerability details for libssp / version 7.4.0-1 / source PACK:

[+] Found NO CVEs and NO exploits (including POC's) in libssp with version 7.4.0-1 (source PACK).

[*] Vulnerability details for libthread-db / version 2.27-1 / source PACK:

[+] Found NO CVEs and NO exploits (including POC's) in libthread-db with version 2.27-1 (source PACK).

[*] Vulnerability details for libubox20170601 / version 2019-02-27-eeef7b50-1 / source PACK:

[+] Found NO CVEs and NO exploits (including POC's) in libubox20170601 with version 2019-02-27-eeef7b50-1 (source PACK).

[+] INFO: Vulnerability CVE-2022-0494 is a verified kernel vulnerability (kernel symbols)!
[*] Vulnerability details for libubus-lua / version 2018-10-06-221ce7e7-1 / source PACK:

[+] Found NO CVEs and NO exploits (including POC's) in libubus-lua with version 2018-10-06-221ce7e7-1 (source PACK).

[*] Vulnerability details for libubus20170705 / version 2018-10-06-221ce7e7-1 / source PACK:

[+] Found NO CVEs and NO exploits (including POC's) in libubus20170705 with version 2018-10-06-221ce7e7-1 (source PACK).

[+] INFO: Vulnerability CVE-2020-29660 is a verified kernel vulnerability (kernel symbols)!
[*] Vulnerability details for libuci-lua / version 2018-08-11-4c8b4d6e-2 / source PACK:

[+] Found NO CVEs and NO exploits (including POC's) in libuci-lua with version 2018-08-11-4c8b4d6e-2 (source PACK).

[*] Vulnerability details for libuci20130104 / version 2018-08-11-4c8b4d6e-2 / source PACK:

[+] Found NO CVEs and NO exploits (including POC's) in libuci20130104 with version 2018-08-11-4c8b4d6e-2 (source PACK).

[*] Vulnerability details for libuclient20160123 / version 2018-11-24-3ba74ebc-1 / source PACK:

[+] Found NO CVEs and NO exploits (including POC's) in libuclient20160123 with version 2018-11-24-3ba74ebc-1 (source PACK).

[*] Vulnerability details for libuuid1 / version 2.33-2 / source PACK:

[+] Found NO CVEs and NO exploits (including POC's) in libuuid1 with version 2.33-2 (source PACK).

[+] INFO: Vulnerability CVE-2020-16166 is a verified kernel vulnerability (kernel symbols)!
[+] INFO: Vulnerability CVE-2020-29374 is a verified kernel vulnerability (kernel symbols)!
[*] Vulnerability details for libxtables12 / version 1.8.2-3 / source PACK:

[+] Found NO CVEs and NO exploits (including POC's) in libxtables12 with version 1.8.2-3 (source PACK).

[+] INFO: Vulnerability CVE-2021-45486 is a verified kernel vulnerability (kernel symbols)!
[+] INFO: Vulnerability CVE-2021-38209 is a verified kernel vulnerability (kernel symbols)!
[*] Vulnerability details for logd / version 2018-12-18-876c7f5b-1 / source PACK:

[+] Found NO CVEs and NO exploits (including POC's) in logd with version 2018-12-18-876c7f5b-1 (source PACK).

[+] INFO: Vulnerability CVE-2018-13053 is a verified kernel vulnerability (kernel symbols)!
[*] Vulnerability details for lua / version 5.1.5 / source STAT/UEMU/PACK:

	lua                 :   5.1.5       :  	CVE-2014-5461     :   5 (v2)    :   STAT/UEMU/PACK :   Exploit (Github: bharatsunny_dagda (G) eliasgranderubio_dagda (G) man151098_dagda (G) samboy_lunacy (G))

[+] Found 1 CVEs and 1 exploits (including POC's) in lua with version 5.1.5 (source STAT/UEMU/PACK).

[*] Vulnerability details for lua / version 5.1.5-2 / source PACK:

[+] Found NO CVEs and NO exploits (including POC's) in lua with version 5.1.5-2 (source PACK).

[*] Vulnerability details for kernel / version 4.14.105 / source STAT/PACK:

	kernel              :   4.14.105    :  	CVE-2015-7312     :   4.4 (v2)  :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2021-3773     :   9.8       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2019-18814    :   9.8       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2019-18805 (V):   9.8       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2019-17133    :   9.8       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2019-16746 (V):   9.8       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2019-15505    :   9.8       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2019-14901    :   9.8       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2019-14897    :   9.8       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2019-14896    :   9.8       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2019-14895    :   9.8       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2019-10126    :   9.8       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2019-15926    :   9.1       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2022-42896    :   8.8       :   STAT/PACK      :   Exploit (Github: Satheesh575555_linux-4.19.72_CVE-2022-42896 (G) Trinadh465_linux-4.19.72_CVE-2022-42896 (G) hshivhare67_kernel_v4.19.72_CVE-2022-42896_new (G) hshivhare67_kernel_v4.19.72_CVE-2022-42896_old (G) kdn111_linux-kernel-exploitation (G) khanhdn111_linux-kernel-exploitation (G) khanhdz-06_linux-kernel-exploitation (G) khanhdz191_linux-kernel-exploitation (G) khanhhdz_linux-kernel-exploitation (G) khanhhdz06_linux-kernel-exploitation (G) khanhnd123_linux-kernel-exploitation (G) nidhi7598_linux-4.1.15_CVE-2022-42896 (G) nomi-sec_PoC-in-GitHub (G) xairy_linux-kernel-exploitation (G))
	kernel              :   4.14.105    :  	CVE-2022-27223    :   8.8       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2022-2196     :   8.8       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2022-0435     :   8.8       :   STAT/PACK      :   Exploit (Github: kdn111_linux-kernel-exploitation (G) khanhdn111_linux-kernel-exploitation (G) khanhdz-06_linux-kernel-exploitation (G) khanhdz191_linux-kernel-exploitation (G) khanhhdz_linux-kernel-exploitation (G) khanhhdz06_linux-kernel-exploitation (G) khanhnd123_linux-kernel-exploitation (G) manas3c_CVE-POC (G) nomi-sec_PoC-in-GitHub (G) wlswotmd_CVE-2022-0435 (G) xairy_linux-kernel-exploitation (G))
	kernel              :   4.14.105    :  	CVE-2021-3656     :   8.8       :   STAT/PACK      :   Exploit (Github: nomi-sec_PoC-in-GitHub (G) rami08448_CVE-2021-3656-Demo (G))
	kernel              :   4.14.105    :  	CVE-2021-3653     :   8.8       :   STAT/PACK      :   Exploit (Github: rami08448_CVE-2021-3656-Demo (G))
	kernel              :   4.14.105    :  	CVE-2021-28660    :   8.8       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2020-29569    :   8.8       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2019-3846     :   8.8       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2019-17666    :   8.8       :   STAT/PACK      :   Exploit (Github: alphaSeclab_sec-daily-2019 (G))
	kernel              :   4.14.105    :  	CVE-2019-14821    :   8.8       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2019-10220    :   8.8       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2019-9500     :   8.3       :   STAT/PACK      :   Exploit (Github: 0xT11_CVE-POC (G) developer3000S_PoC-in-GitHub (G) hectorgie_PoC-in-GitHub (G) kdn111_linux-kernel-exploitation (G) khanhdn111_linux-kernel-exploitation (G) khanhdz-06_linux-kernel-exploitation (G) khanhdz191_linux-kernel-exploitation (G) khanhhdz_linux-kernel-exploitation (G) khanhhdz06_linux-kernel-exploitation (G) khanhnd123_linux-kernel-exploitation (G) lnick2023_nicenice (G) qazbnm456_awesome-cve-poc (G) xairy_linux-kernel-exploitation (G) xbl3_awesome-cve-poc_qazbnm456 (G))
	kernel              :   4.14.105    :  	CVE-2022-1012 (V) :   8.2       :   STAT/PACK      :   Exploit (Github: manas3c_CVE-POC (G) nomi-sec_PoC-in-GitHub (G))
	kernel              :   4.14.105    :  	CVE-2019-19770 (V):   8.2       :   STAT/PACK      :   Exploit (Github: mcgrof_break-blktrace (G))
	kernel              :   4.14.105    :  	CVE-2023-32254    :   8.1       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2023-32250    :   8.1       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2020-28374    :   8.1       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2019-11815    :   8.1       :   STAT/PACK      :   Exploit (Github: Sec20-Paper310_Paper310 (G) alphaSeclab_sec-daily-2019 (G))
	kernel              :   4.14.105    :  	CVE-2018-20836    :   8.1       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2021-4157     :   8         :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2023-35788    :   7.8       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2023-3390     :   7.8       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2023-3269     :   7.8       :   STAT/PACK      :   Exploit (Github: LumaKernel_awesome-stars (G) aneasystone_github-trending (G) izj007_wechat (G) kherrick_hacker-news (G) kun-g_Scraping-Github-trending (G) lrh2000_StackRot (G) nomi-sec_PoC-in-GitHub (G))
	kernel              :   4.14.105    :  	CVE-2023-32233    :   7.8       :   STAT/PACK      :   Exploit (Github: CVEDB_awesome-cve-repo (G) CVEDB_top (G) Liuk3r_CVE-2023-32233 (G) Mr-xn_Penetration_Testing_POC (G) PIDAN-HEIDASHUAI_CVE-2023-32233 (G) Threekiii_CVE (G) hktalent_TOP (G) nomi-sec_PoC-in-GitHub (G) oferchen_POC-CVE-2023-32233 (G) xairy_linux-kernel-exploitation (G) xyxj1024_xyxj1024.github.io (G))
	kernel              :   4.14.105    :  	CVE-2023-31436    :   7.8       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2023-3117     :   7.8       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2023-3111     :   7.8       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2023-3090     :   7.8       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2023-28464    :   7.8       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2023-26242    :   7.8       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2023-23559    :   7.8       :   STAT/PACK      :   Exploit (Github: szymonh_szymonh (G))
	kernel              :   4.14.105    :  	CVE-2023-23003    :   7.8       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2023-22995    :   7.8       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2023-2124     :   7.8       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2023-2008     :   7.8       :   STAT/PACK      :   Exploit (Github: Mr-xn_Penetration_Testing_POC (G) bluefrostsecurity_CVE-2023-2008 (G) em1ga3l_cve-msrc-extractor (G) nomi-sec_PoC-in-GitHub (G) xairy_linux-kernel-exploitation (G))
	kernel              :   4.14.105    :  	CVE-2023-2007     :   7.8       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2023-1829     :   7.8       :   STAT/PACK      :   Exploit (Github: Threekiii_CVE (G) star-sg_CVE (G) xairy_linux-kernel-exploitation (G))
	kernel              :   4.14.105    :  	CVE-2023-1670     :   7.8       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2023-1281     :   7.8       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2023-1118     :   7.8       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2023-0461     :   7.8       :   STAT/PACK      :   Exploit (Github: hheeyywweellccoommee_linux-4.19.72_CVE-2023-0461-ycnbd (G) hshivhare67_kernel_v4.19.72_CVE-2023-0461 (G) nidhi7598_linux-4.19.72_CVE-2023-0461 (G) nomi-sec_PoC-in-GitHub (G))
	kernel              :   4.14.105    :  	CVE-2023-0266     :   7.8       :   STAT/PACK      :   No exploit available (X)
	kernel              :   4.14.105    :  	CVE-2023-0240     :   7.8       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2023-0030     :   7.8       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2022-48425    :   7.8       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2022-48423    :   7.8       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2022-47519    :   7.8       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2022-47518    :   7.8       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2022-45934    :   7.8       :   STAT/PACK      :   Exploit (Github: Satheesh575555_linux-4.1.15_CVE-2022-45934 (G) Trinadh465_linux-4.1.15_CVE-2022-45934 (G) Trinadh465_linux-4.19.72_CVE-2022-45934 (G) manas3c_CVE-POC (G) nidhi7598_linux-3.0.35_CVE-2022-45934 (G) nomi-sec_PoC-in-GitHub (G))
	kernel              :   4.14.105    :  	CVE-2022-4378     :   7.8       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2022-4095     :   7.8       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2022-39189    :   7.8       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2022-36123    :   7.8       :   STAT/PACK      :   Exploit (Github: sickcodes_security_blob_master_advisories_SICK-2022-128.md (G))
	kernel              :   4.14.105    :  	CVE-2022-3565     :   7.8       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2022-3545     :   7.8       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2022-34918    :   7.8       :   STAT/PACK      :   Exploit (MSF: netfilter_nft_set_elem_init_privesc (L) / Github: JlSakuya_Linux-Privilege-Escalation-Exploits (G) Ly0nt4r_OSCP (G) Mr-xn_Penetration_Testing_POC (G) Sechack06_CVE-2022-34918 (G) Snoopy-Sec_Localroot-ALL-CVE (G) WhooAmii_POC_to_review (G) bsauce_kernel-exploit-factory (G) bsauce_kernel-security-learning (G) e-hakson_OSCP (G) eljosep_OSCP-Guide (G) felixfu59_kernel-hack (G) kdn111_linux-kernel-exploitation (G) khanhdn111_linux-kernel-exploitation (G) khanhdz-06_linux-kernel-exploitation (G) khanhdz191_linux-kernel-exploitation (G) khanhhdz_linux-kernel-exploitation (G) khanhhdz06_linux-kernel-exploitation (G) khanhnd123_linux-kernel-exploitation (G) lanleft_CVE2023-1829 (G) linulinu_CVE-2022-34918 (G) manas3c_CVE-POC (G) merlinepedra_CVE-2022-34918-LPE-PoC (G) merlinepedra25_CVE-2022-34918-LPE-PoC (G) nitishbadole_oscp-note-3 (G) nomi-sec_PoC-in-GitHub (G) purplewall1206_ERA-eBPF-assisted-Randomize-Allocator (G) randorisec_CVE-2022-34918-LPE-PoC (G) taielab_awesome-hacking-lists (G) tr3ss_gofetch (G) trhacknon_CVE-2022-34918-LPE-PoC (G) veritas501_CVE-2022-34918 (G) xairy_linux-kernel-exploitation (G) xuetusummer_Penetration_Testing_POC (G))
	kernel              :   4.14.105    :  	CVE-2022-3424     :   7.8       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2022-32981    :   7.8       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2022-3239     :   7.8       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2022-32250    :   7.8       :   STAT/PACK      :   Exploit (linux-exploit-suggester / Github: JlSakuya_Linux-Privilege-Escalation-Exploits (G) Mr-xn_Penetration_Testing_POC (G) Snoopy-Sec_Localroot-ALL-CVE (G) WhooAmii_POC_to_review (G) bsauce_kernel-exploit-factory (G) bsauce_kernel-security-learning (G) felixfu59_kernel-hack (G) kdn111_linux-kernel-exploitation (G) khanhdn111_linux-kernel-exploitation (G) khanhdz-06_linux-kernel-exploitation (G) khanhdz191_linux-kernel-exploitation (G) khanhhdz_linux-kernel-exploitation (G) khanhhdz06_linux-kernel-exploitation (G) khanhnd123_linux-kernel-exploitation (G) manas3c_CVE-POC (G) nomi-sec_PoC-in-GitHub (G) theori-io_CVE-2022-32250-exploit (G) xairy_linux-kernel-exploitation (G) xuetusummer_Penetration_Testing_POC (G) ysanatomic_CVE-2022-32250-LPE (G))
	kernel              :   4.14.105    :  	CVE-2022-30594    :   7.8       :   STAT/PACK      :   Exploit (PSS: 170362/Linux-PT_SUSPEND_SECCOMP-Permission-Bypass-Ptracer-Death-Race.html (P) / Github: WhooAmii_POC_to_review (G) manas3c_CVE-POC (G) nidhi7598_linux-4.19.72_CVE-2022-30594 (G) nomi-sec_PoC-in-GitHub (G))
	kernel              :   4.14.105    :  	CVE-2022-29968    :   7.8       :   STAT/PACK      :   Exploit (Snyk: SNYK-UNMANAGED-TORVALDSLINUX-3006622 (S) / Github: Mr-xn_Penetration_Testing_POC (G) WhooAmii_POC_to_review (G) jprx_CVE-2022-29968 (G) manas3c_CVE-POC (G) nomi-sec_PoC-in-GitHub (G) xuetusummer_Penetration_Testing_POC (G))
	kernel              :   4.14.105    :  	CVE-2022-2978     :   7.8       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2022-2977     :   7.8       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2022-29581    :   7.8       :   STAT/PACK      :   Exploit (Github: Nidhi77777_linux-4.19.72_CVE-2022-29581 (G) WhooAmii_POC_to_review (G) manas3c_CVE-POC (G) nidhi7598_linux-4.19.72_CVE-2022-29581 (G) nidhihcl_linux-4.19.72_CVE-2022-29581 (G) nomi-sec_PoC-in-GitHub (G))
	kernel              :   4.14.105    :  	CVE-2022-28390    :   7.8       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2022-27666    :   7.8       :   STAT/PACK      :   Exploit (Github: Albocoder_cve-2022-27666-exploits (G) CVEDB_awesome-cve-repo (G) CVEDB_top (G) Ch4nc3n_PublicExploitation (G) JERRY123S_all-poc (G) JlSakuya_Linux-Privilege-Escalation-Exploits (G) Metarget_metarget (G) Mr-xn_Penetration_Testing_POC (G) WhooAmii_POC_to_review (G) bsauce_kernel-exploit-factory (G) bsauce_kernel-security-learning (G) cyberanand1337x_bug-bounty-2022 (G) hktalent_TOP (G) j4k0m_really-good-cybersec (G) kdn111_linux-kernel-exploitation (G) khanhdn111_linux-kernel-exploitation (G) khanhdz-06_linux-kernel-exploitation (G) khanhdz191_linux-kernel-exploitation (G) khanhhdz_linux-kernel-exploitation (G) khanhhdz06_linux-kernel-exploitation (G) khanhnd123_linux-kernel-exploitation (G) manas3c_CVE-POC (G) nomi-sec_PoC-in-GitHub (G) plummm_CVE-2022-27666 (G) weeka10_-hktalent-TOP (G) xairy_linux-kernel-exploitation (G) xuetusummer_Penetration_Testing_POC (G))
	kernel              :   4.14.105    :  	CVE-2022-26490    :   7.8       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2022-25265    :   7.8       :   STAT/PACK      :   Exploit (Github: nomi-sec_PoC-in-GitHub (G) x0reaxeax_exec-prot-bypass (G))
	kernel              :   4.14.105    :  	CVE-2022-24958    :   7.8       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2022-1652     :   7.8       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2022-1419     :   7.8       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2022-1011     :   7.8       :   STAT/PACK      :   Exploit (PSS: 166772/Linux-FUSE-Use-After-Free.html (P) / Github: PazDak_feathers-macos-detections (G) nomi-sec_PoC-in-GitHub (G) xkaneiki_CVE-2022-1011 (G))
	kernel              :   4.14.105    :  	CVE-2022-0516     :   7.8       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2022-0492     :   7.8       :   STAT/PACK      :   Exploit (Github: JadenQ_Cloud-Computing-Security-ProjectPage (G) LeoPer02_IDS-Dataset (G) Metarget_metarget (G) PaloAltoNetworks_can-ctr-escape-cve-2022-0492 (G) SPuerBRead_shovel (G) SgtMate_container_escape_showcase (G) SofianeHamlaoui_CVE-2022-0492-Checker (G) T1erno_CVE-2022-0492-Docker-Breakout-Checker-and-PoC (G) Trinadh465_device_renesas_kernel_AOSP10_r33_CVE-2022-0492 (G) WhooAmii_POC_to_review (G) adavarski_HomeLab-Proxmox-k8s-DevSecOps-playground (G) adavarski_HomeLab-k8s-DevSecOps-playground (G) bashofmann_hacking-kubernetes (G) bigpick_cve-reading-list (G) cdk-team_CDK (G) chenaotian_CVE-2022-0492 (G) hardenedvault_ved (G) kvesta_vesta (G) manas3c_CVE-POC (G) marksowell_my-stars (G) marksowell_starred (G) marksowell_stars (G) nomi-sec_PoC-in-GitHub (G) puckiestyle_CVE-2022-0492 (G) sam8k_Dynamic-and-Static-Analysis-of-SOUPs (G) soosmile_POC (G) ssst0n3_ssst0n3 (G) teamssix_container-escape-check (G) ttauveron_cheatsheet (G) yoeelingBin_CVE-2022-0492-Container-Escape (G))
	kernel              :   4.14.105    :  	CVE-2022-0330     :   7.8       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2021-45469    :   7.8       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2021-42252    :   7.8       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2021-42008    :   7.8       :   STAT/PACK      :   Exploit (Github: 0xdevil_CVE-2021-42008 (G) Al1ex_LinuxEelvation (G) BachoSeven_stellestelline (G) JlSakuya_Linux-Privilege-Escalation-Exploits (G) WhooAmii_POC_to_review (G) bcoles_kasld (G) bsauce_kernel-exploit-factory (G) bsauce_kernel-security-learning (G) hardenedvault_ved (G) kdn111_linux-kernel-exploitation (G) khanhdn111_linux-kernel-exploitation (G) khanhdz-06_linux-kernel-exploitation (G) khanhdz191_linux-kernel-exploitation (G) khanhhdz_linux-kernel-exploitation (G) khanhhdz06_linux-kernel-exploitation (G) khanhnd123_linux-kernel-exploitation (G) nomi-sec_PoC-in-GitHub (G) numanturle_CVE-2021-42008 (G) soosmile_POC (G) xairy_linux-kernel-exploitation (G))
	kernel              :   4.14.105    :  	CVE-2021-4197     :   7.8       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2021-41864    :   7.8       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2021-4037     :   7.8       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2021-3847     :   7.8       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2021-38300    :   7.8       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2021-38166    :   7.8       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2021-38160    :   7.8       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2021-3760     :   7.8       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2021-37576    :   7.8       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2021-3715     :   7.8       :   STAT/PACK      :   Exploit (Github: Markakd_CVE-2022-2588 (G) Markakd_GREBE (G) Markakd_kernel_exploit (G) VoidCybersec_thatone (G) bsauce_kernel-exploit-factory (G) dom4570_CVE-2022-2588 (G) kdn111_linux-kernel-exploitation (G) khanhdn111_linux-kernel-exploitation (G) khanhdz-06_linux-kernel-exploitation (G) khanhdz191_linux-kernel-exploitation (G) khanhhdz_linux-kernel-exploitation (G) khanhhdz06_linux-kernel-exploitation (G) khanhnd123_linux-kernel-exploitation (G) xairy_linux-kernel-exploitation (G))
	kernel              :   4.14.105    :  	CVE-2021-3612     :   7.8       :   STAT/PACK      :   Exploit (Github: actions-marketplace-validations_doshyt_cve-monitor (G))
	kernel              :   4.14.105    :  	CVE-2021-3483     :   7.8       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2021-3444     :   7.8       :   STAT/PACK      :   Exploit (Github: Wi1L-Y_News (G))
	kernel              :   4.14.105    :  	CVE-2021-33909 (V):   7.8       :   STAT/PACK      :   Exploit (PSS: 163621/Sequoia-A-Deep-Root-In-Linuxs-Filesystem-Layer.html (L) / Github: ChoKyuWon_exploit_articles (G) ChrisTheCoolHut_CVE-2021-33909 (G) H0j3n_EzpzCheatSheet (G) Liang2580_CVE-2021-33909 (G) Mr-xn_Penetration_Testing_POC (G) baerwolf_cve-2021-33909 (G) bbinfosec43_CVE-2021-33909 (G) gitezri_LinuxVulnerabilities (G) hac425xxx_heap-exploitation-in-real-world (G) hardenedvault_ved (G) huike007_penetration_poc (G) joydo_CVE-Writeups (G) kaosagnt_ansible-everyday (G) kdn111_linux-kernel-exploitation (G) khanhdn111_linux-kernel-exploitation (G) khanhdz-06_linux-kernel-exploitation (G) khanhdz191_linux-kernel-exploitation (G) khanhhdz_linux-kernel-exploitation (G) khanhhdz06_linux-kernel-exploitation (G) khanhnd123_linux-kernel-exploitation (G) knewbury01_codeql-workshop-integer-conversion (G) makoto56_penetration-suite-toolkit (G) nomi-sec_PoC-in-GitHub (G) sfowl_deep-directory (G) winterwolf32_CVE-S---Penetration_Testing_POC- (G) xairy_linux-kernel-exploitation (G) xuetusummer_Penetration_Testing_POC (G))
	kernel              :   4.14.105    :  	CVE-2021-3347     :   7.8       :   STAT/PACK      :   Exploit (Github: WhooAmii_POC_to_review (G) manas3c_CVE-POC (G) nanopathi_linux-4.19.72_CVE-2021-3347 (G) nomi-sec_PoC-in-GitHub (G))
	kernel              :   4.14.105    :  	CVE-2021-33034    :   7.8       :   STAT/PACK      :   Exploit (Github: Trinadh465_device_renesas_kernel_AOSP10_r33_CVE-2021-33034 (G) WhooAmii_POC_to_review (G) nomi-sec_PoC-in-GitHub (G))
	kernel              :   4.14.105    :  	CVE-2021-33033    :   7.8       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2021-29154    :   7.8       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2021-28952    :   7.8       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2021-27365    :   7.8       :   STAT/PACK      :   Exploit (linux-exploit-suggester / Github: JlSakuya_Linux-Privilege-Escalation-Exploits (G) aaronxie55_Presentation2_Markdown (G) c4pt000_kernel-5.11.6-expSEHDsec-HAXM-cgroup-virtio-nvidia-amd-kaliwifi (G) eeenvik1_scripts_for_YouTrack (G) gipi_cve-cemetery (G) kdn111_linux-kernel-exploitation (G) khanhdn111_linux-kernel-exploitation (G) khanhdz-06_linux-kernel-exploitation (G) khanhdz191_linux-kernel-exploitation (G) khanhhdz_linux-kernel-exploitation (G) khanhhdz06_linux-kernel-exploitation (G) khanhnd123_linux-kernel-exploitation (G) xairy_linux-kernel-exploitation (G))
	kernel              :   4.14.105    :  	CVE-2021-26930    :   7.8       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2021-23134    :   7.8       :   STAT/PACK      :   Exploit (Github: kdn111_linux-kernel-exploitation (G) khanhdn111_linux-kernel-exploitation (G) khanhdz-06_linux-kernel-exploitation (G) khanhdz191_linux-kernel-exploitation (G) khanhhdz_linux-kernel-exploitation (G) khanhhdz06_linux-kernel-exploitation (G) khanhnd123_linux-kernel-exploitation (G) xairy_linux-kernel-exploitation (G))
	kernel              :   4.14.105    :  	CVE-2021-22555    :   7.8       :   STAT/PACK      :   Exploit (linux-exploit-suggester / EDB ID: 50135 / MSF: netfilter_xtables_heap_oob_write_priv_esc (L) / PSS: 163528/Linux-Kernel-Netfilter-Heap-Out-Of-Bounds-Write.html (D) / Github: Al1ex_LinuxEelvation (G) AndreevSemen_CVE-2022-0995 (G) AvavaAYA_ctf-writeup-collection (G) B0nfee_CVE-2022-0995 (G) Bonfee_CVE-2022-0995 (G) Ch4nc3n_PublicExploitation (G) ChoKyuWon_exploit_articles (G) JlSakuya_Linux-Privilege-Escalation-Exploits (G) JoneyJunior_cve-2021-22555 (G) Metarget_awesome-cloud-native-security (G) Metarget_metarget (G) Mr-xn_Penetration_Testing_POC (G) PIG-007_kernelAll (G) Snoopy-Sec_Localroot-ALL-CVE (G) WhooAmii_POC_to_review (G) YunDingLab_struct_sanitizer (G) adavarski_HomeLab-Proxmox-k8s-DevSecOps-playground (G) adavarski_HomeLab-k8s-DevSecOps-playground (G) arttnba3_D3CTF2023_d3kcache (G) atesemre_awesome-cloud-native-security (G) bcoles_kasld (G) bcoles_kernel-exploits (G) bsauce_kernel-exploit-factory (G) bsauce_kernel-security-learning (G) cgwalters_container-cve-2021-22555 (G) cpuu_LinuxKernelCVE (G) ctrsploit_ctrsploit (G) daletoniris_CVE-2021-22555-esc-priv (G) google_security-research (G) google_security-research_security_advisories_GHSA-xxx5-8mvq-3528 (G) hac425xxx_heap-exploitation-in-real-world (G) hacking-kubernetes_hacking-kubernetes.info (G) hardenedvault_ved (G) huike007_penetration_poc (G) j4k0m_really-good-cybersec (G) joydo_CVE-Writeups (G) kdn111_linux-kernel-exploitation (G) khanhdn111_linux-kernel-exploitation (G) khanhdz-06_linux-kernel-exploitation (G) khanhdz191_linux-kernel-exploitation (G) khanhhdz_linux-kernel-exploitation (G) khanhhdz06_linux-kernel-exploitation (G) khanhnd123_linux-kernel-exploitation (G) makoto56_penetration-suite-toolkit (G) manas3c_CVE-POC (G) masjohncook_netsec-project (G) nomi-sec_PoC-in-GitHub (G) reni2study_Cloud-Native-Security2 (G) ssst0n3_ctrsploit_archived (G) teamssix_container-escape-check (G) veritas501_CVE-2021-22555-PipeVersion (G) veritas501_pipe-primitive (G) winterwolf32_CVE-S---Penetration_Testing_POC- (G) xairy_linux-kernel-exploitation (G) xuetusummer_Penetration_Testing_POC (G) xyjl-ly_CVE-2021-22555-Exploit (G))
	kernel              :   4.14.105    :  	CVE-2021-20268    :   7.8       :   STAT/PACK      :   Exploit (Github: dylandreimerink_gobpfld (G))
	kernel              :   4.14.105    :  	CVE-2020-7053     :   7.8       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2020-36385    :   7.8       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2020-36313    :   7.8       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2020-29661 (V):   7.8       :   STAT/PACK      :   Exploit (PSS: 160681/Linux-TIOCSPGRP-Broken-Locking.html (P))
	kernel              :   4.14.105    :  	CVE-2020-27786    :   7.8       :   STAT/PACK      :   Exploit (Github: c0ld21_ndays (G) kdn111_linux-kernel-exploitation (G) khanhdn111_linux-kernel-exploitation (G) khanhdz-06_linux-kernel-exploitation (G) khanhdz191_linux-kernel-exploitation (G) khanhhdz_linux-kernel-exploitation (G) khanhhdz06_linux-kernel-exploitation (G) khanhnd123_linux-kernel-exploitation (G) kiks7_CVE-2020-27786-Kernel-Exploit (G) xairy_linux-kernel-exploitation (G))
	kernel              :   4.14.105    :  	CVE-2020-25671    :   7.8       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2020-25670    :   7.8       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2020-25669    :   7.8       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2020-25220    :   7.8       :   STAT/PACK      :   Exploit (Github: 404notf0und_CVE-Flow (G) alphaSeclab_sec-daily-2020 (G) kdn111_linux-kernel-exploitation (G) khanhdn111_linux-kernel-exploitation (G) khanhdz-06_linux-kernel-exploitation (G) khanhdz191_linux-kernel-exploitation (G) khanhhdz_linux-kernel-exploitation (G) khanhhdz06_linux-kernel-exploitation (G) khanhnd123_linux-kernel-exploitation (G) xairy_linux-kernel-exploitation (G))
	kernel              :   4.14.105    :  	CVE-2020-14386    :   7.8       :   STAT/PACK      :   Exploit (Github: 0xT11_CVE-POC (G) DNTYO_F5_Vulnerability (G) Metarget_awesome-cloud-native-security (G) Metarget_metarget (G) atesemre_awesome-cloud-native-security (G) brant-ruan_awesome-container-escape (G) cgwalters_cve-2020-14386 (G) developer3000S_PoC-in-GitHub (G) hacking-kubernetes_hacking-kubernetes.info (G) hectorgie_PoC-in-GitHub (G) kdn111_linux-kernel-exploitation (G) khanhdn111_linux-kernel-exploitation (G) khanhdz-06_linux-kernel-exploitation (G) khanhdz191_linux-kernel-exploitation (G) khanhhdz_linux-kernel-exploitation (G) khanhhdz06_linux-kernel-exploitation (G) khanhnd123_linux-kernel-exploitation (G) kruztw_CVE (G) neargle_my-re0-k8s-security (G) nomi-sec_PoC-in-GitHub (G) orgTestCodacy11KRepos110MB_repo-3574-my-re0-k8s-security (G) reni2study_Cloud-Native-Security2 (G) sderosiaux_every-single-day-i-tldr (G) soosmile_POC (G) source-xu_docker-vuls (G) taielab_awesome-hacking-lists (G) teamssix_container-escape-check (G) xairy_linux-kernel-exploitation (G))
	kernel              :   4.14.105    :  	CVE-2020-14381    :   7.8       :   STAT/PACK      :   Exploit (Github: kdn111_linux-kernel-exploitation (G) khanhdn111_linux-kernel-exploitation (G) khanhdz-06_linux-kernel-exploitation (G) khanhdz191_linux-kernel-exploitation (G) khanhhdz_linux-kernel-exploitation (G) khanhhdz06_linux-kernel-exploitation (G) khanhnd123_linux-kernel-exploitation (G) nanopathi_linux-4.19.72_CVE-2020-14381 (G) nomi-sec_PoC-in-GitHub (G) xairy_linux-kernel-exploitation (G))
	kernel              :   4.14.105    :  	CVE-2020-14356    :   7.8       :   STAT/PACK      :   Exploit (Github: 404notf0und_CVE-Flow (G) ShaikUsaf_linux-4.19.72_CVE-2020-14356 (G) alphaSeclab_sec-daily-2020 (G) kdn111_linux-kernel-exploitation (G) khanhdn111_linux-kernel-exploitation (G) khanhdz-06_linux-kernel-exploitation (G) khanhdz191_linux-kernel-exploitation (G) khanhhdz_linux-kernel-exploitation (G) khanhhdz06_linux-kernel-exploitation (G) khanhnd123_linux-kernel-exploitation (G) xairy_linux-kernel-exploitation (G))
	kernel              :   4.14.105    :  	CVE-2020-14351    :   7.8       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2020-13974    :   7.8       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2020-12657    :   7.8       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2020-12653    :   7.8       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2020-11725    :   7.8       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2020-10757    :   7.8       :   STAT/PACK      :   Exploit (Github: ShaikUsaf_linux-4.19.72_CVE-2020-10757 (G) nomi-sec_PoC-in-GitHub (G))
	kernel              :   4.14.105    :  	CVE-2019-7221     :   7.8       :   STAT/PACK      :   Exploit (PSS: 151713/KVM-VMX-Preemption-Timer-Use-After-Free.html (P) / Github: torvalds_linux_commits_master_arch_x86_kvm (G))
	kernel              :   4.14.105    :  	CVE-2019-25045    :   7.8       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2019-19816    :   7.8       :   STAT/PACK      :   Exploit (Github: bobfuzzer_CVE_tree_master_CVE-2019-19816 (G))
	kernel              :   4.14.105    :  	CVE-2019-19543    :   7.8       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2019-19252    :   7.8       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2019-19241    :   7.8       :   STAT/PACK      :   Exploit (EDB ID: 47779 / PSS: 155669/Linux-sendmsg-Privilege-Escalation.html (P))
	kernel              :   4.14.105    :  	CVE-2019-15925    :   7.8       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2019-15918    :   7.8       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2019-15117    :   7.8       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2019-14835    :   7.8       :   STAT/PACK      :   Exploit (Github: alphaSeclab_sec-daily-2019 (G) kaosagnt_ansible-everyday (G))
	kernel              :   4.14.105    :  	CVE-2019-14816    :   7.8       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2019-14815    :   7.8       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2019-14814    :   7.8       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2019-13272 (V):   7.8       :   STAT/PACK      :   Exploit (linux-exploit-suggester / EDB ID: 47133 / MSF: ptrace_traceme_pkexec_helper (L) / PSS: 165051/Linux-Kernel-5.1.x-PTRACE_TRACEME-pkexec-Local-Privilege-Escalation.html (L) 153663/Linux-PTRACE_TRACEME-Broken-Permission-Object-Lifetime-Handling.html (P) 156929/Linux-PTRACE_TRACEME-Local-Root.html (L) / Github: 0xMrNiko_Awesome-Red-Teaming (G) 0xT11_CVE-POC (G) Al1ex_LinuxEelvation (G) Amar224_Pentest-Tools (G) AnonVulc_Pentest-Tools (G) CVEDB_awesome-cve-repo (G) CVEDB_top (G) CnHack3r_Penetration_PoC (G) Cyc1eC_CVE-2019-13272 (G) De4dCr0w_Linux-kernel-EoP-exp (G) Getshell_LinuxTQ (G) GgKendall_secureCodingDemo (G) H0j3n_EzpzCheatSheet (G) H1CH444MREB0RN_PenTest-free-tools (G) HaleyWei_POC-available (G) Huandtx_CVE-2019-13272 (G) JERRY123S_all-poc (G) JlSakuya_Linux-Privilege-Escalation-Exploits (G) Mehedi-Babu_pentest_tools_repo (G) Mr-xn_Penetration_Testing_POC (G) ONQLin_OS-CourseDesign (G) Offensive-Penetration-Security_OPSEC-Hall-of-fame (G) RashmikaEkanayake_Privilege-Escalation-CVE-2019-13272- (G) S3cur3Th1sSh1t_Pentest-Tools (G) SexyBeast233_SecBooks (G) Snoopy-Sec_Localroot-ALL-CVE (G) Tharana_Exploiting-a-Linux-kernel-vulnerability (G) Tharana_vulnerability-exploitation (G) Waseem27-art_ART-TOOLKIT (G) YIXINSHUWU_Penetration_Testing_POC (G) YellowVeN0m_Pentesters-toolbox (G) alphaSeclab_sec-daily-2019 (G) anoaghost_Localroot_Compile (G) babyshen_CVE-2019-13272 (G) bcoles_kernel-exploits (G) bigbigliang-malwarebenchmark_cve-2019-13272 (G) cedelasen_htb-laboratory (G) chorankates_Irked (G) cyberanand1337x_bug-bounty-2022 (G) datntsec_CVE-2019-13272 (G) developer3000S_PoC-in-GitHub (G) fei9747_LinuxEelvation (G) fengjixuchui_RedTeamer (G) go-bi_go-bi-soft (G) hack-parthsharma_Pentest-Tools (G) hasee2018_Penetration_Testing_POC (G) hectorgie_PoC-in-GitHub (G) hktalent_TOP (G) huike007_penetration_poc (G) huike007_poc (G) icecliffs_Linux-For-Root (G) jana30116_CVE-2019-13272-Local-Privilege-Escalation (G) jared1981_More-Pentest-Tools (G) jas502n_CVE-2019-13272 (G) jiayy_android_vuln_poc-exp (G) karlhat_Ksplice-demo (G) lnick2023_nicenice (G) merlinepedra_Pentest-Tools (G) merlinepedra25_Pentest-Tools (G) merlinepedra25_Pentest-Tools-1 (G) n3t1nv4d3_kernel-exploits (G) nitishbadole_Pentest_Tools (G) nu11secur1ty_CVE-mitre (G) oneoy_CVE-2019-13272 (G) password520_Penetration_PoC (G) password520_RedTeamer (G) pathakabhi24_Pentest-Tools (G) pjgmonteiro_Pentest-tools (G) polosec_CVE-2019-13272 (G) pwnCmndr_LinuxPrivEsc (G) qazbnm456_awesome-cve-poc (G) rakjong_LinuxElevation (G) retr0-13_Pentest-Tools (G) severnake_Pentest-Tools (G) sumedhaDharmasena_-Kernel-ptrace-c-mishandles-vulnerability-CVE-2019-13272 (G) teddy47_CVE-2019-13272---Documentation (G) theyoge_AD-Pentesting-Tools (G) weeka10_-hktalent-TOP (G) winterwolf32_CVE-S---Penetration_Testing_POC- (G) xbl3_awesome-cve-poc_qazbnm456 (G) xuetusummer_Penetration_Testing_POC (G) yedada-wei_- (G) yedada-wei_gongkaishouji (G) (X))
	kernel              :   4.14.105    :  	CVE-2019-12456    :   7.8       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2019-12454    :   7.8       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2019-11487    :   7.8       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2019-0145     :   7.8       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2018-8822     :   7.8       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2018-6555     :   7.8       :   STAT/PACK      :   Exploit (Github: kdn111_linux-kernel-exploitation (G) khanhdn111_linux-kernel-exploitation (G) khanhdz-06_linux-kernel-exploitation (G) khanhdz191_linux-kernel-exploitation (G) khanhhdz_linux-kernel-exploitation (G) khanhhdz06_linux-kernel-exploitation (G) khanhnd123_linux-kernel-exploitation (G) xairy_linux-kernel-exploitation (G))
	kernel              :   4.14.105    :  	CVE-2018-25020 (V):   7.8       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2018-20976    :   7.8       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2018-20856    :   7.8       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2018-20854    :   7.8       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2018-20669    :   7.8       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2018-19824    :   7.8       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2018-18281    :   7.8       :   STAT/PACK      :   Exploit (PSS: 150001/Linux-mremap-TLB-Flush-Too-Late.html (P) / Github: jiayy_android_vuln_poc-exp (G) kdn111_linux-kernel-exploitation (G) khanhdn111_linux-kernel-exploitation (G) khanhdz-06_linux-kernel-exploitation (G) khanhdz191_linux-kernel-exploitation (G) khanhhdz_linux-kernel-exploitation (G) khanhhdz06_linux-kernel-exploitation (G) khanhnd123_linux-kernel-exploitation (G) xairy_linux-kernel-exploitation (G))
	kernel              :   4.14.105    :  	CVE-2018-15471    :   7.8       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2018-14734    :   7.8       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2018-12233    :   7.8       :   STAT/PACK      :   Exploit (Github: shankarapailoor_moonshine (G))
	kernel              :   4.14.105    :  	CVE-2018-10879    :   7.8       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2018-10878    :   7.8       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2018-10853    :   7.8       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2016-2854     :   7.8       :   STAT/PACK      :   Exploit (EDB ID: 41761 / PSS: 141914/AUFS-Ubuntu-15.10-Privilege-Escalation.html (P))
	kernel              :   4.14.105    :  	CVE-2016-2853     :   7.8       :   STAT/PACK      :   Exploit (EDB ID: 41761 / PSS: 141914/AUFS-Ubuntu-15.10-Privilege-Escalation.html (P))
	kernel              :   4.14.105    :  	CVE-2015-0571     :   7.8       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2015-0570     :   7.8       :   STAT/PACK      :   Exploit (Github: R0B1NL1N_linux-kernel-exploitation (G) Technoashofficial_kernel-exploitation-linux (G) kdn111_linux-kernel-exploitation (G) khanhdn111_linux-kernel-exploitation (G) khanhdz-06_linux-kernel-exploitation (G) khanhdz191_linux-kernel-exploitation (G) khanhhdz_linux-kernel-exploitation (G) khanhhdz06_linux-kernel-exploitation (G) khanhnd123_linux-kernel-exploitation (G) skbasava_Linux-Kernel-exploit (G) xairy_linux-kernel-exploitation (G))
	kernel              :   4.14.105    :  	CVE-2015-0569     :   7.8       :   STAT/PACK      :   Exploit (EDB ID: 39308 / PSS: 135372/Linux-Kernel-prima-WLAN-Driver-Heap-Overflow.html (P) / Github: tangsilian_android-vuln (G))
	kernel              :   4.14.105    :  	CVE-2019-3900     :   7.7       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2018-1000026  :   7.7       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2023-1390     :   7.5       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2022-43945    :   7.5       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2022-36946    :   7.5       :   STAT/PACK      :   Exploit (Github: Mr-xn_Penetration_Testing_POC (G) Pwnzer0tt1_CVE-2022-36946 (G) Satheesh575555_linux-4.19.72_CVE-2022-36946 (G) WhooAmii_POC_to_review (G) XmasSnowISBACK_CVE-2022-36946 (G) manas3c_CVE-POC (G) nik012003_nik012003 (G) nomi-sec_PoC-in-GitHub (G) xuetusummer_Penetration_Testing_POC (G))
	kernel              :   4.14.105    :  	CVE-2022-1199     :   7.5       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2021-45485 (V):   7.5       :   STAT/PACK      :   Exploit (Github: Satheesh575555_linux-4.19.72_CVE-2021-45485 (G) WhooAmii_POC_to_review (G) nomi-sec_PoC-in-GitHub (G))
	kernel              :   4.14.105    :  	CVE-2021-38207    :   7.5       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2021-38202    :   7.5       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2021-38201    :   7.5       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2020-25645    :   7.5       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2019-8980 (V) :   7.5       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2019-19078    :   7.5       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2019-19075    :   7.5       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2019-19074    :   7.5       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2019-19071    :   7.5       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2019-19064    :   7.5       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2019-19061    :   7.5       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2019-19060    :   7.5       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2019-19052    :   7.5       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2019-19049    :   7.5       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2019-18807    :   7.5       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2019-17075    :   7.5       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2019-16995    :   7.5       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2019-16921    :   7.5       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2019-16714    :   7.5       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2019-16413    :   7.5       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2019-15916    :   7.5       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2019-15538    :   7.5       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2019-15099    :   7.5       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2019-12818    :   7.5       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2019-12615    :   7.5       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2019-11810    :   7.5       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2019-11479    :   7.5       :   STAT/PACK      :   Exploit (Github: hightemp_docLinux (G) kaosagnt_ansible-everyday (G) misanthropos_FFFFM (G))
	kernel              :   4.14.105    :  	CVE-2019-11478    :   7.5       :   STAT/PACK      :   Exploit (Github: hightemp_docLinux (G) kaosagnt_ansible-everyday (G) misanthropos_FFFFM (G))
	kernel              :   4.14.105    :  	CVE-2019-11477    :   7.5       :   STAT/PACK      :   Exploit (Github: 0xT11_CVE-POC (G) developer3000S_PoC-in-GitHub (G) fengjian_kpatch-sack-panic (G) hectorgie_PoC-in-GitHub (G) hightemp_docLinux (G) kaosagnt_ansible-everyday (G) lucassbeiler_linux_hardening_arsenal (G) misanthropos_FFFFM (G) sasqwatch_cve-2019-11477-poc (G) sonoransun_tcp_sack_fix (G))
	kernel              :   4.14.105    :  	CVE-2019-10639    :   7.5       :   STAT/PACK      :   Exploit (Github: bcoles_kasld (G))
	kernel              :   4.14.105    :  	CVE-2018-6412     :   7.5       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2018-5391     :   7.5       :   STAT/PACK      :   Exploit (Github: chetanshirke_my_ref (G))
	kernel              :   4.14.105    :  	CVE-2018-5390     :   7.5       :   STAT/PACK      :   Exploit (Github: hiboma_hiboma (G) lnick2023_nicenice (G) qazbnm456_awesome-cve-poc (G) xbl3_awesome-cve-poc_qazbnm456 (G))
	kernel              :   4.14.105    :  	CVE-2018-16871    :   7.5       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2017-1000410  :   7.5       :   STAT/PACK      :   Exploit (Github: JeffroMF_awesome-bluetooth-security321 (G) engn33r_awesome-bluetooth-security (G))
	kernel              :   4.14.105    :  	CVE-2021-20322    :   7.4       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2020-25705    :   7.4       :   STAT/PACK      :   Exploit (Github: developer3000S_PoC-in-GitHub (G) hectorgie_PoC-in-GitHub (G) nanopathi_linux-4.19.72_CVE-2020-25705 (G) nomi-sec_PoC-in-GitHub (G) tdwyer_CVE-2020-25705 (G))
	kernel              :   4.14.105    :  	CVE-2017-1000407  :   7.4       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2020-25643    :   7.2       :   STAT/PACK      :   Exploit (Github: DNTYO_F5_Vulnerability (G))
	kernel              :   4.14.105    :  	CVE-2023-3268     :   7.1       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2023-3141     :   7.1       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2023-1838     :   7.1       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2023-1380     :   7.1       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2022-48502    :   7.1       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2022-47520    :   7.1       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2022-41858    :   7.1       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2022-33742    :   7.1       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2022-33741    :   7.1       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2022-33740    :   7.1       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2022-3202     :   7.1       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2022-26365    :   7.1       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2022-1973     :   7.1       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2022-1671     :   7.1       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2022-1651     :   7.1       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2022-1353     :   7.1       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2022-0850     :   7.1       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2021-4204     :   7.1       :   STAT/PACK      :   Exploit (Github: Metarget_metarget (G) Mr-xn_Penetration_Testing_POC (G) WhooAmii_POC_to_review (G) kdn111_linux-kernel-exploitation (G) khanhdn111_linux-kernel-exploitation (G) khanhdz-06_linux-kernel-exploitation (G) khanhdz191_linux-kernel-exploitation (G) khanhhdz_linux-kernel-exploitation (G) khanhhdz06_linux-kernel-exploitation (G) khanhnd123_linux-kernel-exploitation (G) manas3c_CVE-POC (G) nomi-sec_PoC-in-GitHub (G) tr3ee_CVE-2021-4204 (G) xairy_linux-kernel-exploitation (G) xuetusummer_Penetration_Testing_POC (G))
	kernel              :   4.14.105    :  	CVE-2021-4090     :   7.1       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2021-3752     :   7.1       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2021-3739     :   7.1       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2021-3506     :   7.1       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2021-3501     :   7.1       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2021-32078    :   7.1       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2021-27364    :   7.1       :   STAT/PACK      :   Exploit (Github: aaronxie55_Presentation2_Markdown (G) c4pt000_kernel-5.11.6-expSEHDsec-HAXM-cgroup-virtio-nvidia-amd-kaliwifi (G) kdn111_linux-kernel-exploitation (G) khanhdn111_linux-kernel-exploitation (G) khanhdz-06_linux-kernel-exploitation (G) khanhdz191_linux-kernel-exploitation (G) khanhhdz_linux-kernel-exploitation (G) khanhhdz06_linux-kernel-exploitation (G) khanhnd123_linux-kernel-exploitation (G) xairy_linux-kernel-exploitation (G))
	kernel              :   4.14.105    :  	CVE-2020-9383     :   7.1       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2020-8648     :   7.1       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2020-36386    :   7.1       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2020-24394    :   7.1       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2020-12654    :   7.1       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2020-11668    :   7.1       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2018-18021    :   7.1       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2023-35829    :   7         :   STAT/PACK      :   Exploit (Github: 20142995_sectool (G) apkc_CVE-2023-35829-poc (G) nomi-sec_PoC-in-GitHub (G) timb-machine_linux-malware (G))
	kernel              :   4.14.105    :  	CVE-2023-35828    :   7         :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2023-35827    :   7         :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2023-35826    :   7         :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2023-35824    :   7         :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2023-35823    :   7         :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2023-28466    :   7         :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2023-2006     :   7         :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2023-1989     :   7         :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2023-1872     :   7         :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2022-45919    :   7         :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2022-45886    :   7         :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2022-45885    :   7         :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2022-45884    :   7         :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2022-41222    :   7         :   STAT/PACK      :   Exploit (PSS: 168466/Linux-Stable-5.4-5.10-Use-After-Free-Race-Condition.html (P))
	kernel              :   4.14.105    :  	CVE-2022-3649     :   7         :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2022-3635     :   7         :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2022-3028     :   7         :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2022-2961     :   7         :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2022-29582    :   7         :   STAT/PACK      :   Exploit (Github: Ruia-ruia_CVE-2022-29582-Exploit (G) WhooAmii_POC_to_review (G) kdn111_linux-kernel-exploitation (G) khanhdn111_linux-kernel-exploitation (G) khanhdz-06_linux-kernel-exploitation (G) khanhdz191_linux-kernel-exploitation (G) khanhhdz_linux-kernel-exploitation (G) khanhhdz06_linux-kernel-exploitation (G) khanhnd123_linux-kernel-exploitation (G) manas3c_CVE-POC (G) nomi-sec_PoC-in-GitHub (G) tr3ss_gofetch (G) xairy_linux-kernel-exploitation (G))
	kernel              :   4.14.105    :  	CVE-2022-28796    :   7         :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2022-1734     :   7         :   STAT/PACK      :   Exploit (Github: torvalds_linux_commit_d270453a0d9ec10bb8a802a142fb1b3601a83098 (G))
	kernel              :   4.14.105    :  	CVE-2022-1048     :   7         :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2021-44733    :   7         :   STAT/PACK      :   Exploit (Github: WhooAmii_POC_to_review (G) joydo_CVE-Writeups (G) kdn111_linux-kernel-exploitation (G) khanhdn111_linux-kernel-exploitation (G) khanhdz-06_linux-kernel-exploitation (G) khanhdz191_linux-kernel-exploitation (G) khanhhdz_linux-kernel-exploitation (G) khanhhdz06_linux-kernel-exploitation (G) khanhnd123_linux-kernel-exploitation (G) nomi-sec_PoC-in-GitHub (G) pjlantz_optee-qemu (G) pjlantz_optee-qemu_blob_main_README.md (G) soosmile_POC (G) xairy_linux-kernel-exploitation (G))
	kernel              :   4.14.105    :  	CVE-2021-4202     :   7         :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2021-4083     :   7         :   STAT/PACK      :   Exploit (PSS: 165504/Linux-Garbage-Collection-Memory-Corruption.html (P) / Github: advxrsary_vuln-scanner (G) sam8k_Dynamic-and-Static-Analysis-of-SOUPs (G))
	kernel              :   4.14.105    :  	CVE-2021-40490    :   7         :   STAT/PACK      :   Exploit (Github: Nivaskumark_CVE-2021-40490_kernel_v4.19.72 (G) sam8k_Dynamic-and-Static-Analysis-of-SOUPs (G))
	kernel              :   4.14.105    :  	CVE-2021-3640     :   7         :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2021-3609     :   7         :   STAT/PACK      :   Exploit (Github: kdn111_linux-kernel-exploitation (G) khanhdn111_linux-kernel-exploitation (G) khanhdz-06_linux-kernel-exploitation (G) khanhdz191_linux-kernel-exploitation (G) khanhhdz_linux-kernel-exploitation (G) khanhhdz06_linux-kernel-exploitation (G) khanhnd123_linux-kernel-exploitation (G) nrb547_kernel-exploitation_blob_main_cve-2021-3609_cve-2021-3609.md (G) xairy_linux-kernel-exploitation (G))
	kernel              :   4.14.105    :  	CVE-2021-3348     :   7         :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2021-32399    :   7         :   STAT/PACK      :   Exploit (Github: WhooAmii_POC_to_review (G) nanopathi_linux-4.19.72_CVE-2021-32399 (G) nomi-sec_PoC-in-GitHub (G))
	kernel              :   4.14.105    :  	CVE-2021-23133    :   7         :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2020-29370 (V):   7         :   STAT/PACK      :   Exploit (Github: nanopathi_linux-4.19.72_CVE-2020-29370 (G))
	kernel              :   4.14.105    :  	CVE-2020-29369 (V):   7         :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2020-29368    :   7         :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2020-25212    :   7         :   STAT/PACK      :   Exploit (Github: 404notf0und_CVE-Flow (G))
	kernel              :   4.14.105    :  	CVE-2019-18683    :   7         :   STAT/PACK      :   Exploit (Github: 0xT11_CVE-POC (G) De4dCr0w_Linux-kernel-EoP-exp (G) Limesss_cve-2019-18683 (G) developer3000S_PoC-in-GitHub (G) hectorgie_PoC-in-GitHub (G) kdn111_linux-kernel-exploitation (G) khanhdn111_linux-kernel-exploitation (G) khanhdz-06_linux-kernel-exploitation (G) khanhdz191_linux-kernel-exploitation (G) khanhhdz_linux-kernel-exploitation (G) khanhhdz06_linux-kernel-exploitation (G) khanhnd123_linux-kernel-exploitation (G) lnick2023_nicenice (G) qazbnm456_awesome-cve-poc (G) sanjana123-cloud_CVE-2019-18683 (G) xairy_linux-kernel-exploitation (G) xbl3_awesome-cve-poc_qazbnm456 (G))
	kernel              :   4.14.105    :  	CVE-2019-15917    :   7         :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2019-13233    :   7         :   STAT/PACK      :   Exploit (Github: Sec20-Paper310_Paper310 (G))
	kernel              :   4.14.105    :  	CVE-2019-12817    :   7         :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2019-11811    :   7         :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2019-11599    :   7         :   STAT/PACK      :   Exploit (EDB ID: 46781 / PSS: 152663/Linux-Missing-Lockdown.html (P) / Github: HaleyWei_POC-available (G) Sec20-Paper310_Paper310 (G))
	kernel              :   4.14.105    :  	CVE-2019-11486    :   7         :   STAT/PACK      :   Exploit (Github: Sec20-Paper310_Paper310 (G))
	kernel              :   4.14.105    :  	CVE-2023-2002     :   6.8       :   STAT/PACK      :   Exploit (Snyk: SNYK-UNMANAGED-TORVALDSLINUX-5507220 (S) / Github: CVEDB_awesome-cve-repo (G) CVEDB_top (G) hktalent_TOP (G) lrh2000_CVE-2023-2002 (G) nomi-sec_PoC-in-GitHub (G))
	kernel              :   4.14.105    :  	CVE-2023-1079     :   6.8       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2022-1789     :   6.8       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2021-4203 (V) :   6.8       :   STAT/PACK      :   Exploit (Github: sam8k_Dynamic-and-Static-Analysis-of-SOUPs (G))
	kernel              :   4.14.105    :  	CVE-2021-38204    :   6.8       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2021-33656    :   6.8       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2019-19532    :   6.8       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2019-19531    :   6.8       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2019-19527    :   6.8       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2019-14283    :   6.8       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2019-13631    :   6.8       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2018-20169    :   6.8       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2023-32269    :   6.7       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2023-3159     :   6.7       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2023-28772    :   6.7       :   STAT/PACK      :   Exploit (Github: Satheesh575555_linux-4.1.15_CVE-2023-28772 (G) Trinadh465_linux-4.1.15_CVE-2023-28772 (G) hheeyywweellccoommee_linux-4.1.15_CVE-2023-28772-ipchu (G) hshivhare67_kernel_v4.1.15_CVE-2023-28772 (G) nidhi7598_linux-4.19.72_CVE-2023-28772 (G) nomi-sec_PoC-in-GitHub (G))
	kernel              :   4.14.105    :  	CVE-2023-2513     :   6.7       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2023-2194     :   6.7       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2022-43750    :   6.7       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2022-2991     :   6.7       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2022-2503     :   6.7       :   STAT/PACK      :   Exploit (Github: google_security-research_security_advisories_GHSA-6vq3-w69p-w63m (G))
	kernel              :   4.14.105    :  	CVE-2021-43975    :   6.7       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2021-42739    :   6.7       :   STAT/PACK      :   Exploit (Github: JaskaranNarula_Host_Errata_Info (G))
	kernel              :   4.14.105    :  	CVE-2021-42327    :   6.7       :   STAT/PACK      :   Exploit (Github: WhooAmii_POC_to_review (G) docfate111_CVE-2021-42327 (G) kdn111_linux-kernel-exploitation (G) khanhdn111_linux-kernel-exploitation (G) khanhdz-06_linux-kernel-exploitation (G) khanhdz191_linux-kernel-exploitation (G) khanhhdz_linux-kernel-exploitation (G) khanhhdz06_linux-kernel-exploitation (G) khanhnd123_linux-kernel-exploitation (G) nomi-sec_PoC-in-GitHub (G) soosmile_POC (G) xairy_linux-kernel-exploitation (G))
	kernel              :   4.14.105    :  	CVE-2021-3411     :   6.7       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2021-33655    :   6.7       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2021-31916    :   6.7       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2021-28972    :   6.7       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2021-20292    :   6.7       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2020-36694    :   6.7       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2020-36158    :   6.7       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2020-35499    :   6.7       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2020-27777    :   6.7       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2020-15780    :   6.7       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2020-15436 (V):   6.7       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2020-12770    :   6.7       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2020-12659    :   6.7       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2020-12465    :   6.7       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2020-12464 (V):   6.7       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2019-20908    :   6.7       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2019-20636    :   6.7       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2019-19769    :   6.7       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2019-15090    :   6.7       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2022-1015     :   6.6       :   STAT/PACK      :   Exploit (Github: H4K6_CVE-2023-0179-PoC (G) JlSakuya_Linux-Privilege-Escalation-Exploits (G) Mr-xn_Penetration_Testing_POC (G) TurtleARM_CVE-2023-0179-PoC (G) WhooAmii_POC_to_review (G) bsauce_kernel-exploit-factory (G) bsauce_kernel-security-learning (G) delsploit_CVE-2022-1015 (G) flexiondotorg_CNCF-02 (G) hardenedvault_ved (G) hktalent_TOP (G) kdn111_linux-kernel-exploitation (G) khanhdn111_linux-kernel-exploitation (G) khanhdz-06_linux-kernel-exploitation (G) khanhdz191_linux-kernel-exploitation (G) khanhhdz_linux-kernel-exploitation (G) khanhhdz06_linux-kernel-exploitation (G) khanhnd123_linux-kernel-exploitation (G) manas3c_CVE-POC (G) nomi-sec_PoC-in-GitHub (G) now4yreal_linux-kernel-vulnerabilities (G) now4yreal_linux-kernel-vulnerabilities-root-cause-analysis (G) pivik271_CVE-2022-1015 (G) pqlx_CVE-2022-1015 (G) pr0ln_bob_kern_exp1 (G) shuttterman_bob_kern_exp1 (G) wlswotmd_CVE-2022-1015 (G) xairy_linux-kernel-exploitation (G) xuetusummer_Penetration_Testing_POC (G) yaobinwen_robin_on_rails (G) ysanatomic_CVE-2022-1015 (G) zanezhub_CVE-2022-1015-1016 (G))
	kernel              :   4.14.105    :  	CVE-2020-14331    :   6.6       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2023-30456    :   6.5       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2022-3643     :   6.5       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2021-38199    :   6.5       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2021-3772     :   6.5       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2021-3178     :   6.5       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2021-28715    :   6.5       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2021-28714    :   6.5       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2021-28688    :   6.5       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2021-28038    :   6.5       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2020-29373    :   6.5       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2020-26541    :   6.5       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2020-13143    :   6.5       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2019-5108     :   6.5       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2019-3460     :   6.5       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2019-3459     :   6.5       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2019-19046    :   6.5       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2019-17351    :   6.5       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2019-10638    :   6.5       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2018-15572    :   6.5       :   STAT/PACK      :   Exploit (Github: codexlynx_hardware-attacks-state-of-the-art (G) elivepatch_livepatch-overlay (G))
	kernel              :   4.14.105    :  	CVE-2023-33203    :   6.4       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2023-30772    :   6.4       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2022-45888    :   6.4       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2022-44034    :   6.4       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2022-44033    :   6.4       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2022-44032    :   6.4       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2021-37159    :   6.4       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2021-3573     :   6.4       :   STAT/PACK      :   Exploit (Github: hardenedvault_ved (G) kdn111_linux-kernel-exploitation (G) khanhdn111_linux-kernel-exploitation (G) khanhdz-06_linux-kernel-exploitation (G) khanhdz191_linux-kernel-exploitation (G) khanhhdz_linux-kernel-exploitation (G) khanhhdz06_linux-kernel-exploitation (G) khanhnd123_linux-kernel-exploitation (G) xairy_linux-kernel-exploitation (G))
	kernel              :   4.14.105    :  	CVE-2020-25285    :   6.4       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2020-10690    :   6.4       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2019-15214    :   6.4       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2023-1855     :   6.3       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2023-1611     :   6.3       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2019-19529    :   6.3       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2018-12633    :   6.3       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2021-30002    :   6.2       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2019-14284    :   6.2       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2022-39842    :   6.1       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2022-1508     :   6.1       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2020-8647     :   6.1       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2019-19602    :   6.1       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2019-19528    :   6.1       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2019-19332    :   6.1       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2018-16658    :   6.1       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2020-27171 (V):   6         :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2020-25211    :   6         :   STAT/PACK      :   Exploit (Github: 404notf0und_CVE-Flow (G))
	kernel              :   4.14.105    :  	CVE-2020-11565    :   6         :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2020-8649     :   5.9       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2020-36516    :   5.9       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2020-28097    :   5.9       :   STAT/PACK      :   Exploit (Github: sam8k_Dynamic-and-Static-Analysis-of-SOUPs (G))
	kernel              :   4.14.105    :  	CVE-2020-10711    :   5.9       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2019-19081    :   5.9       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2019-19080    :   5.9       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2019-19076    :   5.9       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2018-12232 (V):   5.9       :   STAT/PACK      :   Exploit (Github: hiboma_hiboma (G) shankarapailoor_moonshine (G))
	kernel              :   4.14.105    :  	CVE-2018-11412    :   5.9       :   STAT/PACK      :   Exploit (EDB ID: 44832 / PSS: 148054/Linux-Kernel-ext4_read_inline_data-Memory-Corruption.html (P))
	kernel              :   4.14.105    :  	CVE-2018-1108     :   5.9       :   STAT/PACK      :   Exploit (PSS: 147423/Linux-RNG-Flaws.html (P))
	kernel              :   4.14.105    :  	CVE-2020-28915    :   5.8       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2023-23039    :   5.7       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2023-1206     :   5.7       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2022-3533     :   5.7       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2023-1998     :   5.6       :   STAT/PACK      :   Exploit (EDB ID: 51384 / Github: google_security-research_security_advisories_GHSA-mj4w-6495-6crx (G))
	kernel              :   4.14.105    :  	CVE-2020-14390    :   5.6       :   STAT/PACK      :   Exploit (Github: ZIllR0_Routers (G))
	kernel              :   4.14.105    :  	CVE-2019-7308 (V) :   5.6       :   STAT/PACK      :   Exploit (PSS: 151475/Linux-Insufficient-eBPF-Spectre-V1-Mitigation.html (P) / Github: CKExploits_pwnlinux (G) fengjixuchui_CPU-vulnerabiility-collections (G) houjingyi233_CPU-vulnerability-collections (G) kdn111_linux-kernel-exploitation (G) khanhdn111_linux-kernel-exploitation (G) khanhdz-06_linux-kernel-exploitation (G) khanhdz191_linux-kernel-exploitation (G) khanhhdz_linux-kernel-exploitation (G) khanhhdz06_linux-kernel-exploitation (G) khanhnd123_linux-kernel-exploitation (G) xairy_linux-kernel-exploitation (G))
	kernel              :   4.14.105    :  	CVE-2019-15902    :   5.6       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2023-37454    :   5.5       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2023-34256    :   5.5       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2023-3359     :   5.5       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2023-3358     :   5.5       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2023-3357     :   5.5       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2023-3355     :   5.5       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2023-3220     :   5.5       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2023-3161     :   5.5       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2023-3022     :   5.5       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2023-2985     :   5.5       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2023-28328    :   5.5       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2023-28327    :   5.5       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2023-23455    :   5.5       :   STAT/PACK      :   Exploit (Github: alopresto_epss_api_demo (G) alopresto6m_epss_api_demo (G))
	kernel              :   4.14.105    :  	CVE-2023-23454    :   5.5       :   STAT/PACK      :   Exploit (Github: alopresto_epss_api_demo (G) alopresto6m_epss_api_demo (G))
	kernel              :   4.14.105    :  	CVE-2023-23006    :   5.5       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2023-23005    :   5.5       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2023-23004    :   5.5       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2023-23002    :   5.5       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2023-23001    :   5.5       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2023-23000    :   5.5       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2023-22999    :   5.5       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2023-22998    :   5.5       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2023-22997    :   5.5       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2023-22996    :   5.5       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2023-2177     :   5.5       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2023-2166     :   5.5       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2023-2162     :   5.5       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2023-1249     :   5.5       :   STAT/PACK      :   Exploit (PSS: 171912/CentOS-Stream-9-Missing-Kernel-Security-Fix.html (L))
	kernel              :   4.14.105    :  	CVE-2023-1195     :   5.5       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2023-1095     :   5.5       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2023-0615     :   5.5       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2023-0469     :   5.5       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2023-0459     :   5.5       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2023-0394 (V) :   5.5       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2022-47929    :   5.5       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2022-4662     :   5.5       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2022-45869    :   5.5       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2022-42703 (V):   5.5       :   STAT/PACK      :   Exploit (Github: Squirre17_hbp-attack-demo (G) bcoles_kasld (G) fardeen-ahmed_Bug-bounty-Writeups (G) kdn111_linux-kernel-exploitation (G) khanhdn111_linux-kernel-exploitation (G) khanhdz-06_linux-kernel-exploitation (G) khanhdz191_linux-kernel-exploitation (G) khanhhdz_linux-kernel-exploitation (G) khanhhdz06_linux-kernel-exploitation (G) khanhnd123_linux-kernel-exploitation (G) nomi-sec_PoC-in-GitHub (G) pray77_CVE-2023-3640 (G) pray77_SCTF2023_kernelpwn (G) veritas501_hbp_attack_demo (G) xairy_linux-kernel-exploitation (G))
	kernel              :   4.14.105    :  	CVE-2022-42329    :   5.5       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2022-42328    :   5.5       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2022-4127     :   5.5       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2022-41218    :   5.5       :   STAT/PACK      :   Exploit (Github: V4bel_CVE-2022-41218 (G) WhooAmii_POC_to_review (G) kdn111_linux-kernel-exploitation (G) khanhdn111_linux-kernel-exploitation (G) khanhdz-06_linux-kernel-exploitation (G) khanhdz191_linux-kernel-exploitation (G) khanhhdz_linux-kernel-exploitation (G) khanhhdz06_linux-kernel-exploitation (G) khanhnd123_linux-kernel-exploitation (G) manas3c_CVE-POC (G) nomi-sec_PoC-in-GitHub (G) xairy_linux-kernel-exploitation (G))
	kernel              :   4.14.105    :  	CVE-2022-40768    :   5.5       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2022-40476    :   5.5       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2022-39190    :   5.5       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2022-3707     :   5.5       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2022-36879    :   5.5       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2022-36280    :   5.5       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2022-3606     :   5.5       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2022-3595     :   5.5       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2022-3586     :   5.5       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2022-3544     :   5.5       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2022-3543 (V) :   5.5       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2022-34495    :   5.5       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2022-34494    :   5.5       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2022-3344     :   5.5       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2022-3115     :   5.5       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2022-3114     :   5.5       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2022-3113     :   5.5       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2022-3112     :   5.5       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2022-3111     :   5.5       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2022-3110     :   5.5       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2022-3108     :   5.5       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2022-3107     :   5.5       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2022-3106     :   5.5       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2022-3105     :   5.5       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2022-3104     :   5.5       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2022-3078     :   5.5       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2022-3077     :   5.5       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2022-2905     :   5.5       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2022-2873     :   5.5       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2022-28389    :   5.5       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2022-28388    :   5.5       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2022-28356    :   5.5       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2022-27950    :   5.5       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2022-2785     :   5.5       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2022-26966    :   5.5       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2022-26878    :   5.5       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2022-25375    :   5.5       :   STAT/PACK      :   Exploit (Snyk: SNYK-UNMANAGED-TORVALDSLINUX-2407769 (S) / Github: WhooAmii_POC_to_review (G) manas3c_CVE-POC (G) nomi-sec_PoC-in-GitHub (G) soosmile_POC (G) szymonh_rndis-co (G) szymonh_szymonh (G))
	kernel              :   4.14.105    :  	CVE-2022-24959    :   5.5       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2022-2380     :   5.5       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2022-2318     :   5.5       :   STAT/PACK      :   Exploit (Github: torvalds_linux_commit_9cc02ede696272c5271a401e4f27c262359bc2f6 (G))
	kernel              :   4.14.105    :  	CVE-2022-2153     :   5.5       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2022-2078     :   5.5       :   STAT/PACK      :   Exploit (Github: delsploit_CVE-2022-2078 (G) kdn111_linux-kernel-exploitation (G) khanhdn111_linux-kernel-exploitation (G) khanhdz-06_linux-kernel-exploitation (G) khanhdz191_linux-kernel-exploitation (G) khanhhdz_linux-kernel-exploitation (G) khanhhdz06_linux-kernel-exploitation (G) khanhnd123_linux-kernel-exploitation (G) nomi-sec_PoC-in-GitHub (G) xairy_linux-kernel-exploitation (G))
	kernel              :   4.14.105    :  	CVE-2022-1852     :   5.5       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2022-1263     :   5.5       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2022-1204     :   5.5       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2022-1198     :   5.5       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2022-1195     :   5.5       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2022-1016     :   5.5       :   STAT/PACK      :   Exploit (Github: kdn111_linux-kernel-exploitation (G) khanhdn111_linux-kernel-exploitation (G) khanhdz-06_linux-kernel-exploitation (G) khanhdz191_linux-kernel-exploitation (G) khanhhdz_linux-kernel-exploitation (G) khanhhdz06_linux-kernel-exploitation (G) khanhnd123_linux-kernel-exploitation (G) xairy_linux-kernel-exploitation (G) yaobinwen_robin_on_rails (G) zanezhub_CVE-2022-1015-1016 (G))
	kernel              :   4.14.105    :  	CVE-2022-0854     :   5.5       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2022-0617     :   5.5       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2022-0487     :   5.5       :   STAT/PACK      :   Exploit (Github: si1ent-le_CVE-2022-0847 (G))
	kernel              :   4.14.105    :  	CVE-2022-0480 (V) :   5.5       :   STAT/PACK      :   Exploit (Github: kata-containers_kata-containers_issues_3373 (G))
	kernel              :   4.14.105    :  	CVE-2022-0433     :   5.5       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2022-0382     :   5.5       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2022-0322     :   5.5       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2022-0264     :   5.5       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2022-0171     :   5.5       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2021-46283    :   5.5       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2021-45868 (V):   5.5       :   STAT/PACK      :   Exploit (Snyk: SNYK-UNMANAGED-TORVALDSLINUX-3006722 (S))
	kernel              :   4.14.105    :  	CVE-2021-45480    :   5.5       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2021-45402 (V):   5.5       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2021-45095    :   5.5       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2021-44879    :   5.5       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2021-43389    :   5.5       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2021-4155     :   5.5       :   STAT/PACK      :   Exploit (Github: lafayette96_CVE-Errata-Tool (G))
	kernel              :   4.14.105    :  	CVE-2021-4150     :   5.5       :   STAT/PACK      :   Exploit (Github: sam8k_Dynamic-and-Static-Analysis-of-SOUPs (G))
	kernel              :   4.14.105    :  	CVE-2021-4149     :   5.5       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2021-4148 (V) :   5.5       :   STAT/PACK      :   Exploit (Github: sam8k_Dynamic-and-Static-Analysis-of-SOUPs (G))
	kernel              :   4.14.105    :  	CVE-2021-4135     :   5.5       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2021-4095     :   5.5       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2021-4023     :   5.5       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2021-38208    :   5.5       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2021-38206    :   5.5       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2021-38203    :   5.5       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2021-38200    :   5.5       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2021-38198    :   5.5       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2021-3764     :   5.5       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2021-3744     :   5.5       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2021-3736     :   5.5       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2021-3732     :   5.5       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2021-3679     :   5.5       :   STAT/PACK      :   Exploit (Github: aegistudio_RingBufferDetonator (G) nomi-sec_PoC-in-GitHub (G))
	kernel              :   4.14.105    :  	CVE-2021-3659     :   5.5       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2021-3564     :   5.5       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2021-35477    :   5.5       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2021-34693    :   5.5       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2021-34556    :   5.5       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2021-3428     :   5.5       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2021-31829 (V):   5.5       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2021-30178    :   5.5       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2021-29650 (V):   5.5       :   STAT/PACK      :   Exploit (Github: woc-hack_tutorial (G))
	kernel              :   4.14.105    :  	CVE-2021-29649    :   5.5       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2021-29648 (V):   5.5       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2021-29647    :   5.5       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2021-29646    :   5.5       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2021-29264    :   5.5       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2021-29155 (V):   5.5       :   STAT/PACK      :   Exploit (Github: Kakashiiiiy_CVE-2021-29155 (G) WhooAmii_POC_to_review (G) benschlueter_CVE-2021-29155 (G) manas3c_CVE-POC (G) nomi-sec_PoC-in-GitHub (G) soosmile_POC (G))
	kernel              :   4.14.105    :  	CVE-2021-28971    :   5.5       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2021-28951    :   5.5       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2021-28950    :   5.5       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2021-26932    :   5.5       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2021-26931    :   5.5       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2021-20320    :   5.5       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2021-20219 (V):   5.5       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2020-8992     :   5.5       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2020-36691 (V):   5.5       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2020-36322    :   5.5       :   STAT/PACK      :   Exploit (Github: JaskaranNarula_Host_Errata_Info (G))
	kernel              :   4.14.105    :  	CVE-2020-36312    :   5.5       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2020-36311    :   5.5       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2020-36310    :   5.5       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2020-28941    :   5.5       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2020-27830    :   5.5       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2020-27784    :   5.5       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2020-27673    :   5.5       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2020-27194 (V):   5.5       :   STAT/PACK      :   Exploit (Github: Al1ex_LinuxEelvation (G) JlSakuya_Linux-Privilege-Escalation-Exploits (G) OrangeGzY_security-research-learning (G) bsauce_kernel-exploit-factory (G) bsauce_kernel-security-learning (G) developer3000S_PoC-in-GitHub (G) hectorgie_PoC-in-GitHub (G) kdn111_linux-kernel-exploitation (G) khanhdn111_linux-kernel-exploitation (G) khanhdz-06_linux-kernel-exploitation (G) khanhdz191_linux-kernel-exploitation (G) khanhhdz_linux-kernel-exploitation (G) khanhhdz06_linux-kernel-exploitation (G) khanhnd123_linux-kernel-exploitation (G) kruztw_CVE (G) nomi-sec_PoC-in-GitHub (G) scannells_exploits (G) willinin_CVE-2020-27194-exp (G) xairy_linux-kernel-exploitation (G) xmzyshypnc_CVE-2020-27194 (G))
	kernel              :   4.14.105    :  	CVE-2020-27152    :   5.5       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2020-26088    :   5.5       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2020-25704    :   5.5       :   STAT/PACK      :   Exploit (Github: JaskaranNarula_Host_Errata_Info (G))
	kernel              :   4.14.105    :  	CVE-2020-25673    :   5.5       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2020-25641    :   5.5       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2020-15393    :   5.5       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2020-14385    :   5.5       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2020-14314    :   5.5       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2020-12771    :   5.5       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2020-12769    :   5.5       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2020-12768    :   5.5       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2020-12656    :   5.5       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2020-12655    :   5.5       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2020-11669    :   5.5       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2020-10781    :   5.5       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2020-10774    :   5.5       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2020-10768    :   5.5       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2020-10767    :   5.5       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2020-10766    :   5.5       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2020-10720    :   5.5       :   STAT/PACK      :   Exploit (Github: 404notf0und_CVE-Flow (G))
	kernel              :   4.14.105    :  	CVE-2019-9857     :   5.5       :   STAT/PACK      :   Exploit (Github: hiboma_hiboma (G))
	kernel              :   4.14.105    :  	CVE-2019-7222     :   5.5       :   STAT/PACK      :   Exploit (PSS: 151712/KVM-kvm_inject_page_fault-Uninitialized-Memory-Leak.html (P) / Github: torvalds_linux_commits_master_arch_x86_kvm (G))
	kernel              :   4.14.105    :  	CVE-2019-5489     :   5.5       :   STAT/PACK      :   Exploit (Github: 0xT11_CVE-POC (G) developer3000S_PoC-in-GitHub (G) hectorgie_PoC-in-GitHub (G) mmxsrup_CVE-2019-5489 (G) nomi-sec_PoC-in-GitHub (G))
	kernel              :   4.14.105    :  	CVE-2019-20812    :   5.5       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2019-20811    :   5.5       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2019-20810    :   5.5       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2019-20422 (V):   5.5       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2019-20096    :   5.5       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2019-20095    :   5.5       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2019-20054    :   5.5       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2019-19922    :   5.5       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2019-19767    :   5.5       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2019-19462    :   5.5       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2019-19338    :   5.5       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2019-19227    :   5.5       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2019-19077    :   5.5       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2019-19055 (V):   5.5       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2019-19051    :   5.5       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2019-19047    :   5.5       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2019-19043    :   5.5       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2019-19039    :   5.5       :   STAT/PACK      :   Exploit (Github: bobfuzzer_CVE_tree_master_CVE-2019-19039 (G))
	kernel              :   4.14.105    :  	CVE-2019-19037    :   5.5       :   STAT/PACK      :   Exploit (Github: bobfuzzer_CVE_tree_master_CVE-2019-19037 (G))
	kernel              :   4.14.105    :  	CVE-2019-19036    :   5.5       :   STAT/PACK      :   Exploit (Github: DelspoN_CVE (G) bobfuzzer_CVE_tree_master_CVE-2019-19036 (G))
	kernel              :   4.14.105    :  	CVE-2019-18885    :   5.5       :   STAT/PACK      :   Exploit (Github: 0xT11_CVE-POC (G) bobfuzzer_CVE-2019-18885 (G) developer3000S_PoC-in-GitHub (G) hectorgie_PoC-in-GitHub (G))
	kernel              :   4.14.105    :  	CVE-2019-18811    :   5.5       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2019-18808    :   5.5       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2019-18806    :   5.5       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2019-18786    :   5.5       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2019-15924    :   5.5       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2019-15923    :   5.5       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2019-15922    :   5.5       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2019-15118    :   5.5       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2019-14763    :   5.5       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2019-13648    :   5.5       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2019-12984    :   5.5       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2019-12819 (V):   5.5       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2019-12455    :   5.5       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2019-12382    :   5.5       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2019-12381 (V):   5.5       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2019-12380    :   5.5       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2019-12379    :   5.5       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2019-12378 (V):   5.5       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2019-11833    :   5.5       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2019-10207    :   5.5       :   STAT/PACK      :   Exploit (Github: 0xT11_CVE-POC (G) alphaSeclab_sec-daily-2019 (G) butterflyhack_CVE-2019-10207 (G) developer3000S_PoC-in-GitHub (G) hectorgie_PoC-in-GitHub (G))
	kernel              :   4.14.105    :  	CVE-2018-8087     :   5.5       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2018-8043     :   5.5       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2018-7757     :   5.5       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2018-7755     :   5.5       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2018-7754     :   5.5       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2018-7740     :   5.5       :   STAT/PACK      :   Exploit (Github: blurbdust_blurbdust.github.io (G))
	kernel              :   4.14.105    :  	CVE-2018-7273     :   5.5       :   STAT/PACK      :   Exploit (EDB ID: 44325 / PSS: 146863/Linux-Kernel-show_floppy-KASLR-Address-Leak.html (P) / Github: bcoles_kasld (G) lnick2023_nicenice (G) qazbnm456_awesome-cve-poc (G) xbl3_awesome-cve-poc_qazbnm456 (G))
	kernel              :   4.14.105    :  	CVE-2018-6554     :   5.5       :   STAT/PACK      :   Exploit (Github: hiboma_hiboma (G) kdn111_linux-kernel-exploitation (G) khanhdn111_linux-kernel-exploitation (G) khanhdz-06_linux-kernel-exploitation (G) khanhdz191_linux-kernel-exploitation (G) khanhhdz_linux-kernel-exploitation (G) khanhhdz06_linux-kernel-exploitation (G) khanhnd123_linux-kernel-exploitation (G) xairy_linux-kernel-exploitation (G))
	kernel              :   4.14.105    :  	CVE-2018-21008    :   5.5       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2018-20511    :   5.5       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2018-19407    :   5.5       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2018-19406    :   5.5       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2018-18710    :   5.5       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2018-18690    :   5.5       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2018-18397    :   5.5       :   STAT/PACK      :   Exploit (PSS: 150748/Linux-userfaultfd-tmpfs-File-Permission-Bypass.html (P))
	kernel              :   4.14.105    :  	CVE-2018-17972    :   5.5       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2018-15594    :   5.5       :   STAT/PACK      :   Exploit (Github: elivepatch_livepatch-overlay (G))
	kernel              :   4.14.105    :  	CVE-2018-14656    :   5.5       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2018-14617    :   5.5       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2018-14616    :   5.5       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2018-14615    :   5.5       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2018-14614    :   5.5       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2018-14613    :   5.5       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2018-14612    :   5.5       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2018-14611    :   5.5       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2018-14610    :   5.5       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2018-14609    :   5.5       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2018-13100    :   5.5       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2018-13098    :   5.5       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2018-13097    :   5.5       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2018-13095    :   5.5       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2018-13094    :   5.5       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2018-13093    :   5.5       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2018-12896    :   5.5       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2018-11508    :   5.5       :   STAT/PACK      :   Exploit (EDB ID: 46208 / PSS: 151241/Linux-Kernel-4.13-compat_get_timex-Kernel-Pointer-Leak.html (P) / Github: bcoles_kasld (G))
	kernel              :   4.14.105    :  	CVE-2018-1130     :   5.5       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2018-1118     :   5.5       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2018-1095     :   5.5       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2018-1094     :   5.5       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2018-10940    :   5.5       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2018-1093     :   5.5       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2018-1092     :   5.5       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2018-10881    :   5.5       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2018-10880    :   5.5       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2018-10323    :   5.5       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2018-10322    :   5.5       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2018-10074    :   5.5       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2018-10021    :   5.5       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2017-18232    :   5.5       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2017-18216    :   5.5       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2016-10723    :   5.5       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2020-26147    :   5.4       :   STAT/PACK      :   Exploit (Github: kali973_fragAttacks (G) vanhoefm_fragattacks (G))
	kernel              :   4.14.105    :  	CVE-2023-28866    :   5.3       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2022-3594     :   5.3       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2020-12888    :   5.3       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2020-12826    :   5.3       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2020-10942    :   5.3       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2019-18282 (V):   5.3       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2018-1120     :   5.3       :   STAT/PACK      :   Exploit (EDB ID: 44806 / PSS: 147806/Procps-ng-Audit-Report.html (P))
	kernel              :   4.14.105    :  	CVE-2018-1000204  :   5.3       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2020-36558    :   5.1       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2020-36557    :   5.1       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2020-28974    :   5         :   STAT/PACK      :   Exploit (Github: ZIllR0_Routers (G))
	kernel              :   4.14.105    :  	CVE-2018-12904    :   4.9       :   STAT/PACK      :   Exploit (EDB ID: 44944)
	kernel              :   4.14.105    :  	CVE-2023-3439     :   4.7       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2023-33288    :   4.7       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2023-26545    :   4.7       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2023-1990     :   4.7       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2023-1859     :   4.7       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2023-1582     :   4.7       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2023-1382     :   4.7       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2023-0590 (V) :   4.7       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2023-0468     :   4.7       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2023-0458     :   4.7       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2022-45887    :   4.7       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2022-41850    :   4.7       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2022-40307    :   4.7       :   STAT/PACK      :   Exploit (Github: SettRaziel_bsi_cert_bot (G))
	kernel              :   4.14.105    :  	CVE-2022-39188    :   4.7       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2022-33744    :   4.7       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2022-3303     :   4.7       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2022-1205     :   4.7       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2021-3753     :   4.7       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2021-33624 (V):   4.7       :   STAT/PACK      :   Exploit (Github: Kakashiiiiy_CVE-2021-33624 (G) WhooAmii_POC_to_review (G) benschlueter_CVE-2021-33624 (G) nomi-sec_PoC-in-GitHub (G) soosmile_POC (G))
	kernel              :   4.14.105    :  	CVE-2021-29265    :   4.7       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2021-28964    :   4.7       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2021-20321    :   4.7       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2020-29372    :   4.7       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2020-27675    :   4.7       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2020-27170 (V):   4.7       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2020-12114 (V):   4.7       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2019-19965    :   4.7       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2019-19083    :   4.7       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2019-19082    :   4.7       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2019-19066    :   4.7       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2019-19065    :   4.7       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2019-19062    :   4.7       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2019-19059    :   4.7       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2019-19058    :   4.7       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2019-19056    :   4.7       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2019-19054    :   4.7       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2019-18660    :   4.7       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2019-16994    :   4.7       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2019-15921    :   4.7       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2019-15807    :   4.7       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2019-15292    :   4.7       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2018-7995     :   4.7       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2018-19854    :   4.7       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2018-1065     :   4.7       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2017-18224    :   4.7       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2023-37453    :   4.6       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2023-25012    :   4.6       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2022-25258    :   4.6       :   STAT/PACK      :   Exploit (Github: WhooAmii_POC_to_review (G) manas3c_CVE-POC (G) nomi-sec_PoC-in-GitHub (G) soosmile_POC (G) szymonh_d-os-descriptor (G) szymonh_szymonh (G))
	kernel              :   4.14.105    :  	CVE-2021-43976    :   4.6       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2019-19966    :   4.6       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2019-19947    :   4.6       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2019-19536    :   4.6       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2019-19535    :   4.6       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2019-19530    :   4.6       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2019-19526    :   4.6       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2019-19525    :   4.6       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2019-19524    :   4.6       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2019-19523    :   4.6       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2019-19068    :   4.6       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2019-19063    :   4.6       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2019-18809    :   4.6       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2019-15291    :   4.6       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2019-15223    :   4.6       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2019-15222    :   4.6       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2019-15221    :   4.6       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2019-15220    :   4.6       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2019-15219    :   4.6       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2019-15218    :   4.6       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2019-15217    :   4.6       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2019-15216    :   4.6       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2019-15215    :   4.6       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2019-15213    :   4.6       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2019-15212    :   4.6       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2019-15211    :   4.6       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2019-15098    :   4.6       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2018-19985    :   4.6       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2020-35508    :   4.5       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2023-3212     :   4.4       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2023-2019     :   4.4       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2022-0494 (V) :   4.4       :   STAT/PACK      :   Exploit (Github: sam8k_Dynamic-and-Static-Analysis-of-SOUPs (G))
	kernel              :   4.14.105    :  	CVE-2022-0168     :   4.4       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2021-4159     :   4.4       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2021-4032     :   4.4       :   STAT/PACK      :   Exploit (Github: EstamelGG_CVE-2021-4034-NoGCC (G))
	kernel              :   4.14.105    :  	CVE-2021-4002     :   4.4       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2021-3635     :   4.4       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2021-27363    :   4.4       :   STAT/PACK      :   Exploit (Github: aaronxie55_Presentation2_Markdown (G) c4pt000_kernel-5.11.6-expSEHDsec-HAXM-cgroup-virtio-nvidia-amd-kaliwifi (G) kdn111_linux-kernel-exploitation (G) khanhdn111_linux-kernel-exploitation (G) khanhdz-06_linux-kernel-exploitation (G) khanhdz191_linux-kernel-exploitation (G) khanhhdz_linux-kernel-exploitation (G) khanhhdz06_linux-kernel-exploitation (G) khanhnd123_linux-kernel-exploitation (G) xairy_linux-kernel-exploitation (G))
	kernel              :   4.14.105    :  	CVE-2021-20317    :   4.4       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2021-20177    :   4.4       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2020-29660 (V):   4.4       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2020-25639    :   4.4       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2020-16120    :   4.4       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2020-15437    :   4.4       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2020-11494    :   4.4       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2020-10732    :   4.4       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2019-3701     :   4.4       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2019-20806    :   4.4       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2019-19072    :   4.4       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2019-19067    :   4.4       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2019-19045    :   4.4       :   STAT/PACK      :   Exploit (Github: torvalds_linux_commit_c8c2a057fdc7de1cd16f4baa51425b932a42eb39 (G))
	kernel              :   4.14.105    :  	CVE-2019-15666    :   4.4       :   STAT/PACK      :   Exploit (linux-exploit-suggester / Github: Al1ex_LinuxEelvation (G) De4dCr0w_Linux-kernel-EoP-exp (G) JlSakuya_Linux-Privilege-Escalation-Exploits (G) bsauce_kernel-exploit-factory (G) bsauce_kernel-security-learning (G) go-bi_go-bi-soft (G) siddicky_yotjf (G))
	kernel              :   4.14.105    :  	CVE-2019-15031    :   4.4       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2019-15030    :   4.4       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2022-0812     :   4.3       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2020-11609    :   4.3       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2020-11608    :   4.3       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2019-15920    :   4.3       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2010-5321     :   4.3       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2022-41849    :   4.2       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2022-41848    :   4.2       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2020-26558    :   4.2       :   STAT/PACK      :   Exploit (Github: JeffroMF_awesome-bluetooth-security321 (G) engn33r_awesome-bluetooth-security (G))
	kernel              :   4.14.105    :  	CVE-2020-14416    :   4.2       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2019-19537    :   4.2       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2021-4001     :   4.1       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2020-25656    :   4.1       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2020-25284    :   4.1       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2020-12652    :   4.1       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2019-16089    :   4.1       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2019-12614    :   4.1       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2019-19073    :   4         :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2020-16166 (V):   3.7       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2020-29374 (V):   3.6       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2021-45486 (V):   3.5       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2020-24588    :   3.5       :   STAT/PACK      :   Exploit (Github: kali973_fragAttacks (G) vanhoefm_fragattacks (G))
	kernel              :   4.14.105    :  	CVE-2020-24586    :   3.5       :   STAT/PACK      :   Exploit (Github: kali973_fragAttacks (G) vanhoefm_fragattacks (G))
	kernel              :   4.14.105    :  	CVE-2020-35501    :   3.4       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2023-1513     :   3.3       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2022-33981    :   3.3       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2022-32296    :   3.3       :   STAT/PACK      :   Exploit (Github: 0xkol_rfc6056-device-tracker (G))
	kernel              :   4.14.105    :  	CVE-2022-24448    :   3.3       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2021-38209 (V):   3.3       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2021-38205    :   3.3       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2021-3655     :   3.3       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2021-20239    :   3.3       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2020-29371    :   3.3       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2019-19057    :   3.3       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2019-17056    :   3.3       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2019-17055    :   3.3       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2019-17054    :   3.3       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2019-17053    :   3.3       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2019-17052    :   3.3       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2019-15919    :   3.3       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2019-11884    :   3.3       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2018-20855    :   3.3       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2018-13053 (V):   3.3       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2015-2877     :   3.3       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2020-24587    :   2.6       :   STAT/PACK      :   Exploit (Github: kali973_fragAttacks (G) vanhoefm_fragattacks (G))
	kernel              :   4.14.105    :  	CVE-2022-3521     :   2.5       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2019-11191    :   2.5       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2019-19534    :   2.4       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2019-19533    :   2.4       :   STAT/PACK      :   No exploit available
	kernel              :   4.14.105    :  	CVE-2021-3923     :   2.3       :   STAT/PACK      :   No exploit available

[+] Found 837 CVEs (49 verified) and 156 exploits (including POC's) in kernel with version 4.14.105 (source STAT/PACK).

[*] Vulnerability details for memtester / version 4.1.3 / source STAT/UEMU/PACK:

[+] Found NO CVEs and NO exploits (including POC's) in memtester with version 4.1.3 (source STAT/UEMU/PACK).

[*] Vulnerability details for memtester / version 4.1.3-1 / source PACK:

[+] Found NO CVEs and NO exploits (including POC's) in memtester with version 4.1.3-1 (source PACK).

[*] Vulnerability details for monit-nossl / version 5.25.2-2 / source PACK:

[+] Found NO CVEs and NO exploits (including POC's) in monit-nossl with version 5.25.2-2 (source PACK).

[*] Vulnerability details for netifd / version 2019-01-31-5cd7215a-1 / source PACK:

[+] Found NO CVEs and NO exploits (including POC's) in netifd with version 2019-01-31-5cd7215a-1 (source PACK).

[*] Vulnerability details for mqtt-service / version 1.0-1 / source PACK:

[+] Found NO CVEs and NO exploits (including POC's) in mqtt-service with version 1.0-1 (source PACK).

[*] Vulnerability details for mtd / version 24 / source PACK:

[+] Found NO CVEs and NO exploits (including POC's) in mtd with version 24 (source PACK).

[*] Vulnerability details for nginx / version 1.15.8-1 / source PACK:

[+] Found NO CVEs and NO exploits (including POC's) in nginx with version 1.15.8-1 (source PACK).

[*] Vulnerability details for odhcp6c / version 2019-01-11-d2e247d8-16 / source PACK:

[+] Found NO CVEs and NO exploits (including POC's) in odhcp6c with version 2019-01-11-d2e247d8-16 (source PACK).

[*] Vulnerability details for odhcpd-ipv6only / version 2019-02-27-16c5b6c9-3 / source PACK:

[+] Found NO CVEs and NO exploits (including POC's) in odhcpd-ipv6only with version 2019-02-27-16c5b6c9-3 (source PACK).

[*] Vulnerability details for openssh-sftp-server / version 7.9p1-5 / source PACK:

[+] Found NO CVEs and NO exploits (including POC's) in openssh-sftp-server with version 7.9p1-5 (source PACK).

[*] Vulnerability details for openwrt-keyring / version 2018-05-18-103a32e9-1 / source PACK:

[+] Found NO CVEs and NO exploits (including POC's) in openwrt-keyring with version 2018-05-18-103a32e9-1 (source PACK).

[*] Vulnerability details for opkg / version 2019-01-31-d4ba162b-1 / source PACK:

[+] Found NO CVEs and NO exploits (including POC's) in opkg with version 2019-01-31-d4ba162b-1 (source PACK).

[*] Vulnerability details for php7-cgi / version 7.2.16-1 / source PACK:

[+] Found NO CVEs and NO exploits (including POC's) in php7-cgi with version 7.2.16-1 (source PACK).

[*] Vulnerability details for php7-cli / version 7.2.16-1 / source PACK:

[+] Found NO CVEs and NO exploits (including POC's) in php7-cli with version 7.2.16-1 (source PACK).

[*] Vulnerability details for php7-fpm / version 7.2.16-1 / source PACK:

[+] Found NO CVEs and NO exploits (including POC's) in php7-fpm with version 7.2.16-1 (source PACK).

[*] Vulnerability details for php7-mod-json / version 7.2.16-1 / source PACK:

[+] Found NO CVEs and NO exploits (including POC's) in php7-mod-json with version 7.2.16-1 (source PACK).

[*] Vulnerability details for php7-mod-mbstring / version 7.2.16-1 / source PACK:

[+] Found NO CVEs and NO exploits (including POC's) in php7-mod-mbstring with version 7.2.16-1 (source PACK).

[*] Vulnerability details for php7-mod-openssl / version 7.2.16-1 / source PACK:

[+] Found NO CVEs and NO exploits (including POC's) in php7-mod-openssl with version 7.2.16-1 (source PACK).

[*] Vulnerability details for openssl / version 1.1.1b / source STAT/UEMU:

	openssl             :   1.1.1b      :  	CVE-2022-2068     :   9.8       :   STAT/UEMU      :   Exploit (Github: backloop-biz_CVE_checks (G) jntass_TASSL-1.1.1 (G) mawinkler_c1-cs-scan-result (G) tianocore-docs_ThirdPartySecurityAdvisories (G))
	openssl             :   1.1.1b      :  	CVE-2022-1292     :   9.8       :   STAT/UEMU      :   Exploit (Snyk: SNYK-UNMANAGED-OPENSSL-2807816 (S) / Github: WhooAmii_POC_to_review (G) alcaparra_CVE-2022-1292 (G) backloop-biz_CVE_checks (G) fdl66_openssl-1.0.2u-fix-cve (G) greek0x0_CVE-2022-1292 (G) jntass_TASSL-1.1.1 (G) li8u99_CVE-2022-1292 (G) manas3c_CVE-POC (G) mawinkler_c1-cs-scan-result (G) nidhi7598_openssl-OpenSSL_1_1_1g_AOSP_10_r33_CVE-2022-1292 (G) nomi-sec_PoC-in-GitHub (G) rama291041610_CVE-2022-1292 (G) tianocore-docs_ThirdPartySecurityAdvisories (G) trhacknon_CVE-2022-1292 (G) und3sc0n0c1d0_CVE-2022-1292 (G))
	openssl             :   1.1.1b      :  	CVE-2021-3711     :   9.8       :   STAT/UEMU      :   Exploit (Github: Frannc0_test2 (G) NeXTLinux_griffon (G) anchore_grype (G) aymankhder_scanner-for-container (G) isgo-golgo13_gokit-gorillakit-enginesvc (G) jntass_TASSL-1.1.1 (G) jntass_TASSL-1.1.1k (G) leonov-av_scanvus (G) metapull_attackfinder (G) mmartins000_sinker (G) tianocore-docs_ThirdPartySecurityAdvisories (G))
	openssl             :   1.1.1b      :  	CVE-2023-2650     :   7.5       :   STAT/UEMU      :   Exploit (Github: hshivhare67_OpenSSL_1.1.1g_CVE-2023-2650 (G) nomi-sec_PoC-in-GitHub (G))
	openssl             :   1.1.1b      :  	CVE-2023-0464     :   7.5       :   STAT/UEMU      :   Exploit (Github: 1g-v_DevSec_Docker_lab (G) Trinadh465_Openssl_1.1.1g_CVE-2023-0464 (G) cloudogu_ces-build-lib (G) nomi-sec_PoC-in-GitHub (G) ortelius_ms-textfile-crud (G))
	openssl             :   1.1.1b      :  	CVE-2023-0215     :   7.5       :   STAT/UEMU      :   Exploit (Github: Tuttu7_Yum-command (G) bluesentinelsec_landing-zone (G) nidhi7598_OPENSSL_1.0.2_G2.5_CVE-2023-0215 (G) nidhi7598_OPENSSL_1.1.1g_G3_CVE-2023-0215 (G) nomi-sec_PoC-in-GitHub (G) rootameen_vulpine (G))
	openssl             :   1.1.1b      :  	CVE-2022-4450     :   7.5       :   STAT/UEMU      :   Exploit (Github: Tuttu7_Yum-command (G) bluesentinelsec_landing-zone (G) nidhi7598_OPENSSL_1.1.1g_G3_CVE-2022-4450 (G) nomi-sec_PoC-in-GitHub (G) peng-hui_CarpetFuzz (G) rootameen_vulpine (G) waugustus_CarpetFuzz (G) waugustus_waugustus (G))
	openssl             :   1.1.1b      :  	CVE-2022-0778     :   7.5       :   STAT/UEMU      :   Exploit (Snyk: SNYK-UNMANAGED-OPENSSL-2426984 (S) / PSS: 167344/OpenSSL-1.0.2-1.1.1-3.0-BN_mod_sqrt-Infinite-Loop.html (P) / Github: 0xUhaw_CVE-2022-0778 (G) BobTheShoplifter_CVE-2022-0778-POC (G) CVEDB_awesome-cve-repo (G) CVEDB_top (G) EnableSecurity_awesome-rtc-hacking (G) JERRY123S_all-poc (G) Mr-xn_Penetration_Testing_POC (G) Mrlucas5550100_PoC-CVE-2022-0778- (G) SnailDev_github-hot-hub (G) WhooAmii_POC_to_review (G) actions-marketplace-validations_neuvector_scan-action (G) bashofmann_neuvector-image-scan-action (G) cyberanand1337x_bug-bounty-2022 (G) drago-96_CVE-2022-0778 (G) fdl66_openssl-1.0.2u-fix-cve (G) gatecheckdev_gatecheck (G) halon_changelog (G) hktalent_TOP (G) isgo-golgo13_gokit-gorillakit-enginesvc (G) jkakavas_CVE-2022-0778-POC (G) jmartinezl_jmartinezl (G) jntass_TASSL-1.1.1 (G) lonnyzhang423_github-hot-hub (G) manas3c_CVE-POC (G) neuvector_scan-action (G) nomi-sec_PoC-in-GitHub (G) soosmile_POC (G) spaquet_docker-alpine-mailcatcher (G) tianocore-docs_ThirdPartySecurityAdvisories (G) weeka10_-hktalent-TOP (G) wllm-rbnt_asn1template (G) xuetusummer_Penetration_Testing_POC (G) yywing_cve-2022-0778 (G))
	openssl             :   1.1.1b      :  	CVE-2021-23840    :   7.5       :   STAT/UEMU      :   Exploit (Github: falk-werner_cve-check (G) fdl66_openssl-1.0.2u-fix-cve (G) fredrkl_trivy-demo (G) isgo-golgo13_gokit-gorillakit-enginesvc (G) jntass_TASSL-1.1.1k (G) thecyberbaby_Trivy-by-AquaSecurity (G) thecyberbaby_Trivy-by-aquaSecurity (G) vinamra28_tekton-image-scan-trivy (G))
	openssl             :   1.1.1b      :  	CVE-2023-0286     :   7.4       :   STAT/UEMU      :   Exploit (Github: Tuttu7_Yum-command (G) dejanb_guac-rs (G) nidhi7598_OPENSSL_1.1.11g_G3_CVE-2023-0286 (G) nidhi7598_OPENSSL_1.1.1g_G3_CVE-2023-0286 (G) nomi-sec_PoC-in-GitHub (G) xkcd-2347_trust-api (G))
	openssl             :   1.1.1b      :  	CVE-2021-3712     :   7.4       :   STAT/UEMU      :   Exploit (Github: Frannc0_test2 (G) NeXTLinux_griffon (G) anchore_grype (G) aymankhder_scanner-for-container (G) fdl66_openssl-1.0.2u-fix-cve (G) giantswarm_starboard-exporter (G) isgo-golgo13_gokit-gorillakit-enginesvc (G) jntass_TASSL-1.1.1 (G) leonov-av_scanvus (G) lucky-sideburn_secpod_wrap (G) metapull_attackfinder (G) tianocore-docs_ThirdPartySecurityAdvisories (G))
	openssl             :   1.1.1b      :  	CVE-2019-1543     :   7.4       :   STAT/UEMU      :   Exploit (Github: ANTONYOH_midterm_trivy (G) KorayAgaya_TrivyWeb (G) McLaouth_trivi (G) Mohzeela_external-secret (G) aquasecurity_trivy (G) candrapw_trivy (G) cloudogu_ces-build-lib (G) fhirfactory_pegacorn-scanner-trivy (G) fredrkl_trivy-demo (G) georgearce24_aquasecurity-trivy (G) immydestiny_trivy-file (G) jntass_TASSL-1.1.1k (G) justPray_1122 (G) kaisenlinux_trivy (G) krishna-commits_trivy (G) krishna-commits_trivy-test (G) mrodden_vyger (G) pottava_trivy-restapi (G) rafavinnce_trivy_0.27.1 (G) ronomon_crypto-async (G) siddharthraopotukuchi_trivy (G) simiyo_trivy (G) t31m0_Vulnerability-Scanner-for-Containers (G) thecyberbaby_Trivy-by-AquaSecurity (G) thecyberbaby_Trivy-by-aquaSecurity (G) umahari_security (G))
	openssl             :   1.1.1b      :  	CVE-2022-4304     :   5.9       :   STAT/UEMU      :   Exploit (Github: Trinadh465_Openssl-1.1.1g_CVE-2022-4304 (G) Tuttu7_Yum-command (G) nomi-sec_PoC-in-GitHub (G))
	openssl             :   1.1.1b      :  	CVE-2021-4160     :   5.9       :   STAT/UEMU      :   Exploit (Github: actions-marketplace-validations_neuvector_scan-action (G) andrewd-sysdig_nodejs-helloworld (G) bashofmann_neuvector-image-scan-action (G) fdl66_openssl-1.0.2u-fix-cve (G) neuvector_scan-action (G) tianocore-docs_ThirdPartySecurityAdvisories (G))
	openssl             :   1.1.1b      :  	CVE-2021-3449     :   5.9       :   STAT/UEMU      :   Exploit (Github: AliceMongodin_NSAPool-PenTest (G) EdgeSecurityTeam_Vulnerability (G) FeFi7_attacking_embedded_linux (G) SF4bin_SEEKER_dataset (G) WhooAmii_POC_to_review (G) anquanscan_sec-tools (G) arindam0310018_04-Apr-2022-DevOps__Scan-Images-In-ACR-Using-Trivy (G) falk-werner_cve-check (G) fredrkl_trivy-demo (G) gitchangye_cve (G) isgo-golgo13_gokit-gorillakit-enginesvc (G) jntass_TASSL-1.1.1k (G) manas3c_CVE-POC (G) nomi-sec_PoC-in-GitHub (G) rnbochsr_yr_of_the_jellyfish (G) scriptzteam_glFTPd-v2.11ab-STABLE (G) soosmile_POC (G) taielab_awesome-hacking-lists (G) terorie_cve-2021-3449 (G) thecyberbaby_Trivy-by-AquaSecurity (G) thecyberbaby_Trivy-by-aquaSecurity (G) tianocore-docs_ThirdPartySecurityAdvisories (G) tzwlhack_Vulnerability (G) vinamra28_tekton-image-scan-trivy (G) yonhan3_openssl-cve (G))
	openssl             :   1.1.1b      :  	CVE-2021-23841    :   5.9       :   STAT/UEMU      :   Exploit (Github: Satheesh575555_Openssl_1_1_0_CVE-2021-23841 (G) Trinadh465_external_boringssl_openssl_1.1.0g_CVE-2021-23841 (G) WhooAmii_POC_to_review (G) arindam0310018_04-Apr-2022-DevOps__Scan-Images-In-ACR-Using-Trivy (G) falk-werner_cve-check (G) fdl66_openssl-1.0.2u-fix-cve (G) fredrkl_trivy-demo (G) isgo-golgo13_gokit-gorillakit-enginesvc (G) jntass_TASSL-1.1.1k (G) manas3c_CVE-POC (G) nomi-sec_PoC-in-GitHub (G) thecyberbaby_Trivy-by-AquaSecurity (G) thecyberbaby_Trivy-by-aquaSecurity (G) vinamra28_tekton-image-scan-trivy (G))
	openssl             :   1.1.1b      :  	CVE-2020-1971     :   5.9       :   STAT/UEMU      :   Exploit (Github: MBHudson_CVE-2020-1971 (G) Metztli_debian-openssl-1.1.1i (G) arindam0310018_04-Apr-2022-DevOps__Scan-Images-In-ACR-Using-Trivy (G) developer-guy_image-scanning-using-trivy-as-go-library (G) developer3000S_PoC-in-GitHub (G) fdl66_openssl-1.0.2u-fix-cve (G) fredrkl_trivy-demo (G) hectorgie_PoC-in-GitHub (G) jntass_TASSL-1.1.1k (G) nomi-sec_PoC-in-GitHub (G) scott-leung_tools (G) soosmile_POC (G) stevechanieee_-5-OpenSSL_Versioning (G) thecyberbaby_Trivy-by-AquaSecurity (G) thecyberbaby_Trivy-by-aquaSecurity (G) vinamra28_tekton-image-scan-trivy (G))
	openssl             :   1.1.1b      :  	CVE-2023-0466     :   5.3       :   STAT/UEMU      :   Exploit (Github: bluesentinelsec_landing-zone (G))
	openssl             :   1.1.1b      :  	CVE-2023-0465     :   5.3       :   STAT/UEMU      :   No exploit available
	openssl             :   1.1.1b      :  	CVE-2022-2097     :   5.3       :   STAT/UEMU      :   Exploit (Github: PeterThomasAwen_OpenSSLUpgrade1.1.1q-Ubuntu (G) WhooAmii_POC_to_review (G) cdupuis_image-api (G) isgo-golgo13_gokit-gorillakit-enginesvc (G) jntass_TASSL-1.1.1 (G) manas3c_CVE-POC (G) nomi-sec_PoC-in-GitHub (G) tianocore-docs_ThirdPartySecurityAdvisories (G))
	openssl             :   1.1.1b      :  	CVE-2019-1551     :   5.3       :   STAT/UEMU      :   Exploit (Github: Mohzeela_external-secret (G) arindam0310018_04-Apr-2022-DevOps__Scan-Images-In-ACR-Using-Trivy (G) fredrkl_trivy-demo (G) garethr_snykout (G) mrodden_vyger (G) siddharthraopotukuchi_trivy (G) t31m0_Vulnerability-Scanner-for-Containers (G) thecyberbaby_Trivy-by-AquaSecurity (G) thecyberbaby_Trivy-by-aquaSecurity (G) umahari_security (G) vinamra28_tekton-image-scan-trivy (G))
	openssl             :   1.1.1b      :  	CVE-2019-1549     :   5.3       :   STAT/UEMU      :   Exploit (Github: Mohzeela_external-secret (G) arindam0310018_04-Apr-2022-DevOps__Scan-Images-In-ACR-Using-Trivy (G) djschleen_ash (G) fredrkl_trivy-demo (G) jntass_TASSL-1.1.1k (G) mrodden_vyger (G) siddharthraopotukuchi_trivy (G) simiyo_trivy (G) t31m0_Vulnerability-Scanner-for-Containers (G) thecyberbaby_Trivy-by-AquaSecurity (G) thecyberbaby_Trivy-by-aquaSecurity (G) umahari_security (G) vinamra28_tekton-image-scan-trivy (G))
	openssl             :   1.1.1b      :  	CVE-2019-1547     :   4.7       :   STAT/UEMU      :   Exploit (Github: Mohzeela_external-secret (G) arindam0310018_04-Apr-2022-DevOps__Scan-Images-In-ACR-Using-Trivy (G) djschleen_ash (G) fredrkl_trivy-demo (G) jntass_TASSL-1.1.1k (G) mrodden_vyger (G) siddharthraopotukuchi_trivy (G) simiyo_trivy (G) t31m0_Vulnerability-Scanner-for-Containers (G) thecyberbaby_Trivy-by-AquaSecurity (G) thecyberbaby_Trivy-by-aquaSecurity (G) umahari_security (G) vinamra28_tekton-image-scan-trivy (G))
	openssl             :   1.1.1b      :  	CVE-2019-1563     :   3.7       :   STAT/UEMU      :   Exploit (Github: Mohzeela_external-secret (G) arindam0310018_04-Apr-2022-DevOps__Scan-Images-In-ACR-Using-Trivy (G) djschleen_ash (G) fredrkl_trivy-demo (G) jntass_TASSL-1.1.1k (G) mrodden_vyger (G) siddharthraopotukuchi_trivy (G) simiyo_trivy (G) t31m0_Vulnerability-Scanner-for-Containers (G) thecyberbaby_Trivy-by-AquaSecurity (G) thecyberbaby_Trivy-by-aquaSecurity (G) umahari_security (G) vinamra28_tekton-image-scan-trivy (G))
	openssl             :   1.1.1b      :  	CVE-2019-1552     :   3.3       :   STAT/UEMU      :   Exploit (Github: imhunterand_hackerone-publicy-disclosed (G) javirodriguezzz_Shodan-Browser (G) jntass_TASSL-1.1.1k (G))

[+] Found 25 CVEs and 24 exploits (including POC's) in openssl with version 1.1.1b (source STAT/UEMU).

[*] Vulnerability details for php7-mod-pcntl / version 7.2.16-1 / source PACK:

[+] Found NO CVEs and NO exploits (including POC's) in php7-mod-pcntl with version 7.2.16-1 (source PACK).

[*] Vulnerability details for php7-mod-pdo-sqlite / version 7.2.16-1 / source PACK:

[+] Found NO CVEs and NO exploits (including POC's) in php7-mod-pdo-sqlite with version 7.2.16-1 (source PACK).

[*] Vulnerability details for php7-mod-pdo / version 7.2.16-1 / source PACK:

[+] Found NO CVEs and NO exploits (including POC's) in php7-mod-pdo with version 7.2.16-1 (source PACK).

[*] Vulnerability details for php7-mod-session / version 7.2.16-1 / source PACK:

[+] Found NO CVEs and NO exploits (including POC's) in php7-mod-session with version 7.2.16-1 (source PACK).

[*] Vulnerability details for php7-mod-sockets / version 7.2.16-1 / source PACK:

[+] Found NO CVEs and NO exploits (including POC's) in php7-mod-sockets with version 7.2.16-1 (source PACK).

[*] Vulnerability details for php7-mod-zip / version 7.2.16-1 / source PACK:

[+] Found NO CVEs and NO exploits (including POC's) in php7-mod-zip with version 7.2.16-1 (source PACK).

[*] Vulnerability details for php7 / version 7.2.16-1 / source PACK:

[+] Found NO CVEs and NO exploits (including POC's) in php7 with version 7.2.16-1 (source PACK).

[+] WARNING: Vulnerability CVE-2019-11043 is a known exploited vulnerability.
[*] Vulnerability details for point-to-point_protocol / version 2.4.7 / source UEMU:

	point-to-point_proto:   2.4.7       :  	CVE-2020-8597     :   9.8       :   UEMU           :   Exploit (PSS: 156662/pppd-2.4.8-Buffer-Overflow.html (P) 156802/pppd-2.4.8-Buffer-Overflow.html (P) / Github: 0xT11_CVE-POC (G) CnHack3r_Penetration_PoC (G) Dilan-Diaz_Point-to-Point-Protocol-Daemon-RCE-Vulnerability-CVE-2020-8597- (G) JLLeitschuh_bulk-security-pr-generator (G) Juanezm_openwrt-redmi-ac2100 (G) Mr-xn_Penetration_Testing_POC (G) WinMin_CVE-2020-8597 (G) WinMin_Protocol-Vul (G) YIXINSHUWU_Penetration_Testing_POC (G) developer3000S_PoC-in-GitHub (G) hasee2018_Penetration_Testing_POC (G) hectorgie_PoC-in-GitHub (G) huike007_penetration_poc (G) huike007_poc (G) lakwsh_CVE-2020-8597 (G) marcinguy_CVE-2020-8597 (G) nomi-sec_PoC-in-GitHub (G) password520_Penetration_PoC (G) soosmile_POC (G) syb999_pppd-cve (G) winterwolf32_CVE-S---Penetration_Testing_POC- (G) xuetusummer_Penetration_Testing_POC (G) yedada-wei_- (G) yedada-wei_gongkaishouji (G))

[+] Found 1 CVEs and 1 exploits (including POC's) in point-to-point_protocol with version 2.4.7 (source UEMU).

[*] Vulnerability details for ppp-mod-pppoe / version 2.4.7.git-2018-06-23-1 / source PACK:

[+] Found NO CVEs and NO exploits (including POC's) in ppp-mod-pppoe with version 2.4.7.git-2018-06-23-1 (source PACK).

[*] Vulnerability details for ppp / version 2.4.7.git-2018-06-23-1 / source PACK:

[+] Found NO CVEs and NO exploits (including POC's) in ppp with version 2.4.7.git-2018-06-23-1 (source PACK).

[*] Vulnerability details for procd / version 2019-03-11-d876d1ca-1 / source PACK:

[+] Found NO CVEs and NO exploits (including POC's) in procd with version 2019-03-11-d876d1ca-1 (source PACK).

[*] Vulnerability details for rpcd / version 2018-11-28-3aa81d0d-1 / source PACK:

[+] Found NO CVEs and NO exploits (including POC's) in rpcd with version 2018-11-28-3aa81d0d-1 (source PACK).

[*] Vulnerability details for php / version 7.2.16 / source STAT:

	php                 :   7.2.16      :  	CVE-2022-37454    :   9.8       :   STAT           :   Exploit (Github: GitHubForSnap_matrix-commander-gael (G) rveglahn-r7_TEST-snyk-sha3-py-vuln (G))
	php                 :   7.2.16      :  	CVE-2019-13224    :   9.8       :   STAT           :   Exploit (Github: ForAllSecure_VulnerabilitiesLab (G) balabit-deps_balabit-os-8-libonig (G) balabit-deps_balabit-os-9-libonig (G) deepin-community_libonig (G) kkos_oniguruma (G) onivim_esy-oniguruma (G) winlibs_oniguruma (G))
	php                 :   7.2.16      :  	CVE-2019-11043    :   9.8       :   STAT           :   Exploit (EDB ID: 48182 / MSF: php_fpm_rce (R) / PSS: 154974/PHP-FPM-Remote-Code-Execution.html (R) / Github: 0th3rs-Security-Team_CVE-2019-11043 (G) 0xT11_CVE-POC (G) 20142995_pocsuite (G) 20142995_pocsuite3 (G) ARPSyndicate_kenzer-templates (G) AleWong_PHP-FPM-Remote-Code-Execution-Vulnerability-CVE-2019-11043- (G) B1gd0g_CVE-2019-11043 (G) CVEDB_awesome-cve-repo (G) CVEDB_top (G) CnHack3r_Penetration_PoC (G) Elsfa7-110_kenzer-templates (G) HxDDD_CVE-PoC (G) InesMartins31_iot-cves (G) JERRY123S_all-poc (G) LubinLew_WEB-CVE (G) MRdoulestar_CVE-2019-11043 (G) Mr-xn_Penetration_Testing_POC (G) SexyBeast233_SecBooks (G) Threekiii_Vulhub-Reproduce (G) YIXINSHUWU_Penetration_Testing_POC (G) aaron3238_phpfpmexploit (G) ajread4_nessus_crosswalk (G) akamajoris_CVE-2019-11043-Docker (G) alokaranasinghe_cve-2019-11043 (G) alphaSeclab_sec-daily-2019 (G) apachecn-archive_Middleware-Vulnerability-detection (G) b0o_starred (G) babebbu_TNI-CWC-GGEZ-Hosting (G) bollwarm_tech-news (G) corifeo_CVE-2019-11043 (G) cout970_PublicStorage (G) cyberanand1337x_bug-bounty-2022 (G) developer3000S_PoC-in-GitHub (G) fairyming_CVE-2019-11043 (G) febryandana_nginx-php-fpm (G) gaahrdner_starred (G) hasee2018_Penetration_Testing_POC (G) hectorgie_PoC-in-GitHub (G) hktalent_TOP (G) hugefiver_mystars (G) huike007_penetration_poc (G) huike007_poc (G) huowen_CVE-2019-11043 (G) ianxtianxt_CVE-2019-11043 (G) ilikemunchingonwillys_kkk (G) imhunterand_hackerone-publicy-disclosed (G) izj007_wechat (G) jas502n_CVE-2019-11043 (G) jas9reet_CVE-2019-11043 (G) jdecool_stars-feed (G) jiangsir404_POC-S (G) johnkilene_CUDB (G) jptr218_php_hack (G) k8gege_CVE-2019-11043 (G) kriskhub_CVE-2019-11043 (G) lindemer_CVE-2019-11043 (G) linuxserver_docker-nextcloud (G) lnick2023_nicenice (G) lovechinacoco_https-github.com-mai-lang-chai-Middleware-Vulnerability-detection (G) ltfafei_my_POC (G) lucianonooijen_stargazed (G) m0ver_drupal-installation-issues (G) moniik_CVE-2019-11043_env (G) motikan2010_blog.motikan2010.com (G) neex_phuip-fpizdam (G) password520_Penetration_PoC (G) qazbnm456_awesome-cve-poc (G) rmtec_modeswitcher (G) shadow-horse_cve-2019-11043 (G) supercid_awesome-starred (G) superfish9_pt (G) tdtc7_qps (G) theMiddleBlue_CVE-2019-11043 (G) tinker-li_CVE-2019-11043 (G) tjkess_byol (G) trhacknon_phuip-fpizdam (G) ugur-ercan_exploit-collection (G) weeka10_-hktalent-TOP (G) whalehub_awesome-stars (G) whoadmin_pocs (G) winterwolf32_CVE-S---Penetration_Testing_POC- (G) xbl3_awesome-cve-poc_qazbnm456 (G) xuetusummer_Penetration_Testing_POC (G) yedada-wei_- (G) yedada-wei_gongkaishouji (G) ypereirareis_docker-CVE-2019-11043 (G) zhengjim_loophole (G) (X))
	php                 :   7.2.16      :  	CVE-2017-8923     :   9.8       :   STAT           :   No exploit available
	php                 :   7.2.16      :  	CVE-2020-7061     :   9.1       :   STAT           :   No exploit available
	php                 :   7.2.16      :  	CVE-2020-7060     :   9.1       :   STAT           :   No exploit available
	php                 :   7.2.16      :  	CVE-2020-7059     :   9.1       :   STAT           :   No exploit available
	php                 :   7.2.16      :  	CVE-2019-11040    :   9.1       :   STAT           :   No exploit available
	php                 :   7.2.16      :  	CVE-2019-11039    :   9.1       :   STAT           :   No exploit available
	php                 :   7.2.16      :  	CVE-2019-11036    :   9.1       :   STAT           :   No exploit available
	php                 :   7.2.16      :  	CVE-2019-11035    :   9.1       :   STAT           :   No exploit available
	php                 :   7.2.16      :  	CVE-2019-11034    :   9.1       :   STAT           :   Exploit (Github: vincd_search-cve (G))
	php                 :   7.2.16      :  	CVE-2020-7067     :   7.5       :   STAT           :   Exploit (Github: 0xbigshaq_php7-internals (G) imhunterand_hackerone-publicy-disclosed (G) vincd_search-cve (G))
	php                 :   7.2.16      :  	CVE-2020-7062     :   7.5       :   STAT           :   No exploit available
	php                 :   7.2.16      :  	CVE-2019-11044    :   7.5       :   STAT           :   No exploit available
	php                 :   7.2.16      :  	CVE-2019-11042    :   7.1       :   STAT           :   No exploit available
	php                 :   7.2.16      :  	CVE-2019-11041    :   7.1       :   STAT           :   No exploit available
	php                 :   7.2.16      :  	CVE-2022-31629    :   6.5       :   STAT           :   Exploit (Github: WhooAmii_POC_to_review (G) manas3c_CVE-POC (G) nomi-sec_PoC-in-GitHub (G) silnex_CVE-2022-31629-poc (G))
	php                 :   7.2.16      :  	CVE-2020-7069     :   6.5       :   STAT           :   No exploit available
	php                 :   7.2.16      :  	CVE-2019-11050    :   6.5       :   STAT           :   No exploit available
	php                 :   7.2.16      :  	CVE-2019-11047    :   6.5       :   STAT           :   No exploit available
	php                 :   7.2.16      :  	CVE-2019-11045    :   5.9       :   STAT           :   No exploit available
	php                 :   7.2.16      :  	CVE-2022-31628    :   5.5       :   STAT           :   Exploit (Github: mdsnins_mdsnins (G))
	php                 :   7.2.16      :  	CVE-2020-7064     :   5.4       :   STAT           :   No exploit available
	php                 :   7.2.16      :  	CVE-2020-7070     :   5.3       :   STAT           :   No exploit available
	php                 :   7.2.16      :  	CVE-2020-7063     :   5.3       :   STAT           :   No exploit available
	php                 :   7.2.16      :  	CVE-2019-11048    :   5.3       :   STAT           :   No exploit available
	php                 :   7.2.16      :  	CVE-2019-11046    :   5.3       :   STAT           :   Exploit (Github: siemens_fluffi (G))
	php                 :   7.2.16      :  	CVE-2019-11038    :   5.3       :   STAT           :   Exploit (Github: arindam0310018_04-Apr-2022-DevOps__Scan-Images-In-ACR-Using-Trivy (G))
	php                 :   7.2.16      :  	CVE-2020-7066     :   4.3       :   STAT           :   Exploit (Github: 0xbigshaq_php7-internals (G))
	php                 :   7.2.16      :  	CVE-2020-7068     :   3.6       :   STAT           :   Exploit (Github: 404notf0und_CVE-Flow (G))

[+] Found 31 CVEs and 11 exploits (including POC's) in php with version 7.2.16 (source STAT).

[*] Vulnerability details for screen / version 4.6.2-1 / source PACK:

[*] Vulnerability details for samba36-server / version 3.6.25-14 / source PACK:
[+] Found NO CVEs and NO exploits (including POC's) in screen with version 4.6.2-1 (source PACK).
[*] Vulnerability details for screen / version 4.06.02 / source UEMU:



[+] Found NO CVEs and NO exploits (including POC's) in samba36-server with version 3.6.25-14 (source PACK).

[+] Found NO CVEs and NO exploits (including POC's) in screen with version 4.06.02 (source UEMU).

[*] Vulnerability details for strace / version 4.26 / source UEMU/PACK:

[+] Found NO CVEs and NO exploits (including POC's) in strace with version 4.26 (source UEMU/PACK).

[*] Vulnerability details for strace / version 4.26-1 / source PACK:

[+] Found NO CVEs and NO exploits (including POC's) in strace with version 4.26-1 (source PACK).

[*] Vulnerability details for sudo / version 1.8.26-1 / source PACK:
[*] Vulnerability details for swconfig / version 12 / source PACK:


[+] Found NO CVEs and NO exploits (including POC's) in sudo with version 1.8.26-1 (source PACK).

[+] Found NO CVEs and NO exploits (including POC's) in swconfig with version 12 (source PACK).

[*] Vulnerability details for terminfo / version 6.1-4 / source PACK:

[*] Vulnerability details for tar / version 1.32-1 / source PACK:

[+] Found NO CVEs and NO exploits (including POC's) in terminfo with version 6.1-4 (source PACK).

[+] Found NO CVEs and NO exploits (including POC's) in tar with version 1.32-1 (source PACK).

[+] WARNING: Vulnerability CVE-2021-3156 is a known exploited vulnerability.
[*] Vulnerability details for tls_tunnel / version 1.0-1 / source PACK:

[+] Found NO CVEs and NO exploits (including POC's) in tls_tunnel with version 1.0-1 (source PACK).

[*] Vulnerability details for ubox / version 2018-12-18-876c7f5b-1 / source PACK:

[+] Found NO CVEs and NO exploits (including POC's) in ubox with version 2018-12-18-876c7f5b-1 (source PACK).

[*] Vulnerability details for ubus / version 2018-10-06-221ce7e7-1 / source PACK:

[+] Found NO CVEs and NO exploits (including POC's) in ubus with version 2018-10-06-221ce7e7-1 (source PACK).

[*] Vulnerability details for uci / version 2018-08-11-4c8b4d6e-2 / source PACK:

[+] Found NO CVEs and NO exploits (including POC's) in uci with version 2018-08-11-4c8b4d6e-2 (source PACK).

[*] Vulnerability details for ubusd / version 2018-10-06-221ce7e7-1 / source PACK:
[*] Vulnerability details for sudo / version 1.8.26 / source UEMU/PACK:


	sudo                :   1.8.26      :  	CVE-2019-14287    :   8.8       :   UEMU/PACK      :   Exploit (EDB ID: 47502 / Github: 0xT11_CVE-POC (G) 1337kid_Exploits (G) 5l1v3r1_cve-2019-14287sudoexp (G) AfvanMoopen_tryhackme- (G) Alex-Stinga_TryHackMe (G) CMNatic_Dockerized-CVE-2019-14287 (G) CMNatic_UoG-CTF (G) CashWilliams_CVE-2019-14287-demo (G) CyberSec-Monkey_Zero2H4x0r (G) DewmiApsara_CVE-2019-14287 (G) DularaAnushka_Linux-Privilege-Escalation-using-Sudo-Rights (G) FauxFaux_sudo-cve-2019-14287 (G) Getshell_LinuxTQ (G) Hasintha-98_Sudo-Vulnerability-Exploit-CVE-2019-14287 (G) HussyCool_CVE-2019-14287-IT18030372- (G) InesMartins31_iot-cves (G) JSchauert_Penetration-Testing-2 (G) JSchauert_Project-2-Offensive-Security-CTF (G) Janette88_cve-2019-14287sudoexp (G) M108Falcon_Sudo-CVE-2019-14287 (G) RoqueNight_Linux-Privilege-Escalation-Basics (G) SachinthaDeSilva-cmd_Exploit-CVE-2019-14287 (G) SexyBeast233_SecBooks (G) ShianTrish_sudo-Security-Bypass-vulnerability-CVE-2019-14287 (G) Sindadziy_cve-2019-14287 (G) Sindayifu_CVE-2019-14287-CVE-2014-6271 (G) Sithma_SNP (G) TCM-Course-Resources_Linux-Privilege-Escalation-Resources (G) Tharana_Exploiting-a-Linux-kernel-vulnerability (G) Tharana_vulnerability-exploitation (G) a-nonymou-s_Agent-Sudo (G) aWtlcm9h_Memo (G) agariy_MyFirstWebShell (G) alphaSeclab_sec-daily-2019 (G) axax002_sudo-vulnerability-CVE-2019-14287 (G) bianfusia_CTF-writeup (G) bloodzer0_PoC (G) brootware_awesome-cyber-security-university (G) brootware_cyber-security-university (G) catsecorg_CatSec-TryHackMe-WriteUps (G) cxzczxzc_sudo-exploit-mitre-attack-poc (G) developer3000S_PoC-in-GitHub (G) dhniroshan_offensive_hacking (G) edsonjt81_CVE-2019-14287- (G) ejlevin99_Sudo-Security-Bypass-Vulnerability (G) emtuls_Awesome-Cyber-Security-List (G) geeksniper_Linux-privilege-escalation (G) geleiaa_ceve-s (G) go-bi_go-bi-soft (G) gurkylee_Linux-Privilege-Escalation-Basics (G) gurneesh_CVE-2019-14287-write-up (G) hectorgie_PoC-in-GitHub (G) huang919_cve-2019-14287-PPT (G) janod313_-CVE-2019-14287-SUDO-bypass-vulnerability (G) jordansinclair1990_TryHackMeAgentSudo (G) k4u5h41_CVE-2019-14287 (G) mai-lang-chai_System-Vulnerability (G) makoto56_penetration-suite-toolkit (G) malangalothbrok_linux-bypass (G) malangalothbrok_sudo-linux-bypass (G) mussar0x4D5352_rekall-penetration-test (G) n0w4n_CVE-2019-14287 (G) notnue_Linux-Privilege-Escalation (G) ra1nb0rn_search_vulns (G) retr0-13_Linux-Privilege-Escalation-Basics (G) shallvhack_Sudo-Security-Bypass-CVE-2019-14287 (G) shashihacks_OSCP (G) shashihacks_OSWE (G) shrishtydayal2304_100-days-of-code (G) shyambhanushali_AttackDefendExercise (G) sonu7519_linux-priv-Esc (G) stefanman125_CyberSci-pizzashop (G) testermas_tryhackme (G) thinuri99_Sudo-Security-Bypass-Vulnerability-CVE-2019-14287- (G) tranquac_Linux-Privilege-Escalation (G) usamaelshazly_Linux-Privilege-Escalation (G) wenyu1999_sudo- (G) wiiwu959_Pentest-Record (G) xyongcn_exploit (G) yaguine_agent_sudo (G))
	sudo                :   1.8.26      :  	CVE-2023-22809    :   7.8       :   UEMU/PACK      :   Exploit (EDB ID: 51217 / MSF: sudoedit_bypass_priv_esc (L) / PSS: 171644/sudo-1.9.12p1-Privilege-Escalation.html (L) / Github: CKevens_CVE-2023-22809-sudo-POC (G) CVEDB_awesome-cve-repo (G) CVEDB_top (G) Chan9Yan9_CVE-2023-22809 (G) KayCHENvip_vulnerability-poc (G) M4fiaB0y_CVE-2023-22809 (G) Threekiii_Awesome-POC (G) Threekiii_CVE (G) Zeyad-Azima_Remedy4me (G) asepsaepdin_CVE-2021-1732 (G) asepsaepdin_CVE-2023-22809 (G) beruangsalju_LocalPrivelegeEscalation (G) beruangsalju_LocalPrivilegeEscalation (G) hello4r1end_patch_CVE-2023-22809 (G) hktalent_TOP (G) manas3c_CVE-POC (G) n3m1dotsys_CVE-2023-22809-sudoedit-privesc (G) n3m1dotsys_n3m1dotsys (G) nomi-sec_PoC-in-GitHub (G) pashayogi_CVE-2023-22809 (G) stefan11111_rdoedit (G))
	sudo                :   1.8.26      :  	CVE-2021-3156     :   7.8       :   UEMU/PACK      :   Exploit (EDB ID: 49521 / MSF: sudo_baron_samedit (L) / Snyk: SNYK-UNMANAGED-SUDO-2368628 (S) / PSS: 161270/Sudo-1.9.5p1-Buffer-Overflow-Privilege-Escalation.html (P) 161230/Sudo-Buffer-Overflow-Privilege-Escalation.html (P) 161160/Sudo-Heap-Based-Buffer-Overflow.html (P) / Github: 0x4ndy_clif (G) 0x7183_CVE-2021-3156 (G) 0xdevil_CVE-2021-3156 (G) 0xsakthi_my-pentest-notes (G) 1N53C_CVE-2021-3156-PoC (G) 30579096_vCenterVulns (G) ARGOeu-Metrics_secmon-probes (G) ARGOeu_secmon-probes (G) AbdullahRizwan101_Baron-Samedit (G) Al1ex_LinuxEelvation (G) Ashish-dawani_CVE-2021-3156-Patch (G) BLACKHAT-SSG_MindMaps2 (G) BearCat4_CVE-2021-3156 (G) Bubleh21_CVE-2021-3156 (G) CVEDB_awesome-cve-repo (G) CVEDB_top (G) ClassBluer_Exploit_Tools (G) CptGibbon_CVE-2021-3156 (G) CrackerCat_cve-2021-3157 (G) CyberCommands_CVE-2021-3156 (G) CyberCommands_exploit-sudoedit (G) DanielAzulayy_CTF-2021 (G) DarkFunct_CVE_Exploits (G) Drakfunc_CVE_Exploits (G) EdgeSecurityTeam_Vulnerability (G) EvilAnne_2021-Read-article (G) Exodusro_CVE-2021-3156 (G) Floodnut_paper_docs_study (G) Floodnut_papers_documents_Analysis (G) Gutem_scans-exploits (G) HadessCS_Awesome-Privilege-Escalation (G) HynekPetrak_HynekPetrak (G) JERRY123S_all-poc (G) JMontRod_Pruebecita (G) JlSakuya_Linux-Privilege-Escalation-Exploits (G) KayCHENvip_vulnerability-poc (G) Kiprey_Skr_Learning (G) LiveOverflow_pwnedit (G) Ly0nt4r_OSCP (G) Meowmycks_OSCPprep-Cute (G) Meowmycks_OSCPprep-Sar (G) Meowmycks_OSCPprep-hackme1 (G) Mhackiori_CVE-2021-3156 (G) Miraitowa70_POC-Notes (G) Morton-L_BoltWrt (G) Mr-xn_Penetration_Testing_POC (G) NeQuissimus_nixos-vuln (G) Nokialinux_CVE-2021-3156 (G) Offensive-Penetration-Security_OPSEC-Hall-of-fame (G) OrangeGzY_security-research-learning (G) PhuketIsland_CVE-2021-3156-centos7 (G) PurpleOzone_PE_CVE-CVE-2021-3156 (G) Q4n_CVE-2021-3156 (G) RodricBr_CVE-2021-3156 (G) Ruviixx_proyecto-ps (G) Rvn0xsy_CVE-2021-3156-plus (G) SPXcz_IC1_projekt (G) SantiagoSerrao_ScannerCVE-2021-3156 (G) Self-Study-Committee_Skr_Learning (G) SexyBeast233_SecBooks (G) Spektrainfiniti_MP (G) TheFlash2k_CVE-2021-3156 (G) TheSerialiZator_CTF-2021 (G) Threekiii_Awesome-POC (G) Timirepo_CVE_Exploits (G) Toufupi_CVE_Collection (G) Trivialcorgi_Proyecto-Prueba-PPS (G) WhooAmii_POC_to_review (G) Y3A_CVE-2021-3156 (G) aasphixie_aasphixie.github.io (G) abedra_securing_security_software (G) ajtech-hue_CVE-2021-3156-Mitigation-ShellScript-Build (G) amanszpapaya_MacPer (G) anquanscan_sec-tools (G) apachecn-archive_Middleware-Vulnerability-detection (G) apogiatzis_docker-CVE-2021-3156 (G) arvindshima_CVE-2021-3156 (G) axelmierczuk_privesc (G) baka9moe_CVE-2021-3156-Exp (G) baka9moe_CVE-2021-3156-TestReport (G) barebackbandit_CVE-2021-3156 (G) bc29ea3c101054baa1429ffc2edba4ae_sigma_detection_rules (G) binw2018_CVE-2021-3156-SCRIPT (G) blackberry_Falco-bypasses (G) blasty_CVE-2021-3156 (G) bsauce_kernel-exploit-factory (G) bsauce_kernel-security-learning (G) capturingcats_CVE-2021-3156 (G) chenaotian_CVE-2021-3156 (G) cyberanand1337x_bug-bounty-2022 (G) cybercrazetech_Employee-walkthrough (G) d3c3ptic0n_CVE-2021-3156 (G) developer3000S_PoC-in-GitHub (G) dinhbaouit_CVE-2021-3156 (G) donghyunlee00_CVE-2021-3156 (G) dyne_sud (G) e-hakson_OSCP (G) elbee-cyber_CVE-2021-3156-PATCHER (G) eljosep_OSCP-Guide (G) fei9747_LinuxEelvation (G) felixfu59_shocker-attack (G) foyjog_shocker-attack (G) freeFV_CVE-2021-3156 (G) freitzzz_tpas-binary-exploitation (G) gamblingmaster2020_vCenterExp (G) gmldbd94_cve-2021-3156 (G) go-bi_go-bi-soft (G) goEnum_goEnum (G) goEnumAdmin_goEnum (G) greg-workspace_my_sudo_heap_overflow_exploit (G) grng3r_rs_exploits (G) hac425xxx_heap-exploitation-in-real-world (G) halissha_CVE-2021-3156 (G) harsh-bothra_learn365 (G) hilbix_suid (G) hktalent_TOP (G) huike007_penetration_poc (G) jm33-m0_CVE-2021-3156 (G) joshmcorreia_SDSU_Cyber_Security_Red_Team (G) joydo_CVE-Writeups (G) kal1gh0st_CVE-2021-3156 (G) kaosagnt_ansible-everyday (G) ker2x_DearDiary (G) kernelzeroday_CVE-2021-3156-Baron-Samedit (G) kevinnivekkevin_3204_coursework_1 (G) kldksd_server (G) kotikjaroslav_sigma_detection_rules (G) liqimore_ECE9609-Introduction-to-Hacking (G) lmol_CVE-2021-3156 (G) lockedbyte_CVE-Exploits (G) lockedbyte_lockedbyte (G) lockedbyte_slides (G) lognoz_puppet-freebsd-workstation (G) loong576_ansible-production-practice-6 (G) lovechinacoco_https-github.com-mai-lang-chai-Middleware-Vulnerability-detection (G) ltfafei_my_POC (G) makoto56_penetration-suite-toolkit (G) manas3c_CVE-POC (G) mbcrump_CVE-2021-3156 (G) meowhua15_CVE-2021-3156 (G) mitinarseny_hse_facl (G) mr-r3b00t_CVE-2021-3156 (G) mstxq17_SecurityArticleLogger (G) murchie85_twitterCyberMonitor (G) musergi_CVE-2021-3156 (G) mutur4_CVE-2021-3156 (G) neolin-ms_LinuxDocLinks (G) nexcess_sudo_cve-2021-3156 (G) nitishbadole_oscp-note-3 (G) njahrckstr_exploits- (G) nobodyatall648_CVE-2021-3156 (G) nomi-sec_PoC-in-GitHub (G) nu11secur1ty_CVE-mitre (G) nu11secur1ty_CVE-nu11secur1ty (G) oneoy_CVE-2021-3156 (G) oneoy_exploits1 (G) oriolOrnaque_TFG-Binary-exploitation (G) password520_CVE-2021-3156 (G) pathakabhi24_Awesome-C (G) pen4uin_awesome-vulnerability-research (G) pen4uin_vulnerability-research (G) pen4uin_vulnerability-research-list (G) perlun_sudo-1.8.3p1-patched (G) ph4ntonn_CVE-2021-3156 (G) pmihsan_Sudo-HeapBased-Buffer-Overflow (G) popyue_HackTheBox (G) puckiestyle_CVE-2021-3156 (G) pvnovarese_2022-02-enterprise-demo (G) pvnovarese_2022-04-enterprise-demo (G) pvnovarese_2022-04-suse-demo (G) pvnovarese_2022-06-enterprise-demo (G) pvnovarese_2022-08-enterprise-demo (G) pvnovarese_2022-09-enterprise-demo (G) pvnovarese_2023-01-enterprise-demo (G) pvnovarese_2023-02-demo (G) q77190858_CVE-2021-3156 (G) qxxxb_ctf_challenges (G) r0eXpeR_pentest (G) r3k4t_how-to-solve-sudo-heap-based-bufferoverflow-vulnerability (G) r4j0x00_exploits (G) redhawkeye_sudo-exploit (G) ret2basic_SudoScience (G) reverse-ex_CVE-2021-3156 (G) rfago_tpas-binary-exploitation (G) sandesvitor_simple-ansible-lab (G) saucer-man_exploit (G) sereok3_buffer-overflow-writeups (G) sharkmoos_Baron-Samedit (G) siddicky_yotjf (G) skilian-enssat_datura-ctf (G) soosmile_POC (G) stong_CVE-2021-3156 (G) stressboi_TA-Samedit (G) taielab_awesome-hacking-lists (G) tainguyenbp_linux-cve (G) teamtopkarl_CVE-2021-3156 (G) thisguyshouldworkforus_ansible (G) tunjing789_Employee-walkthrough (G) tzwlhack_Vulnerability (G) uhub_awesome-c (G) unauth401_CVE-2021-3156 (G) usdogu_awesome-stars (G) voidlsd_CVE-2021-3156 (G) weeka10_-hktalent-TOP (G) weto91_GitHub_Search_CVE (G) wiiwu959_Pentest-Record (G) winterwolf32_CVE-S---Penetration_Testing_POC- (G) worawit_CVE-2021-3156 (G) wsmaxcy_Cat-Pictures-2-Writeup (G) xtaran_sshudo (G) xuetusummer_Penetration_Testing_POC (G) yaunsky_cve-2021-3156 (G) yifengyou_sudo-1.8.29 (G) ymrsmns_CVE-2021-3156 (G) ypl6_heaplens (G) (X))
	sudo                :   1.8.26      :  	CVE-2021-23240    :   7.8       :   UEMU/PACK      :   No exploit available
	sudo                :   1.8.26      :  	CVE-2022-43995    :   7.1       :   UEMU/PACK      :   No exploit available
	sudo                :   1.8.26      :  	CVE-2019-18684    :   7         :   UEMU/PACK      :   No exploit available
	sudo                :   1.8.26      :  	CVE-2023-28487    :   5.3       :   UEMU/PACK      :   No exploit available
	sudo                :   1.8.26      :  	CVE-2023-28486    :   5.3       :   UEMU/PACK      :   No exploit available
	sudo                :   1.8.26      :  	CVE-2021-23239    :   2.5       :   UEMU/PACK      :   No exploit available

[+] Found NO CVEs and NO exploits (including POC's) in ubusd with version 2018-10-06-221ce7e7-1 (source PACK).

[+] Found 9 CVEs and 3 exploits (including POC's) in sudo with version 1.8.26 (source UEMU/PACK).

[*] Vulnerability details for uclibcxx / version 0.2.4-3 / source PACK:

[+] Found NO CVEs and NO exploits (including POC's) in uclibcxx with version 0.2.4-3 (source PACK).

[*] Vulnerability details for uclient-fetch / version 2018-11-24-3ba74ebc-1 / source PACK:

[+] Found NO CVEs and NO exploits (including POC's) in uclient-fetch with version 2018-11-24-3ba74ebc-1 (source PACK).

[*] Vulnerability details for wireless-regdb / version 2017-10-20-4343d359 / source PACK:

[*] Vulnerability details for udhcp / version 1.30.1 / source STAT:
[+] Found NO CVEs and NO exploits (including POC's) in wireless-regdb with version 2017-10-20-4343d359 (source PACK).


[+] Found NO CVEs and NO exploits (including POC's) in udhcp with version 1.30.1 (source STAT).

[*] Vulnerability details for unzip / version 6.0-8 / source PACK:
[*] Vulnerability details for usign / version 2015-07-04-ef641914-1 / source PACK:


[+] Found NO CVEs and NO exploits (including POC's) in unzip with version 6.0-8 (source PACK).

[+] Found NO CVEs and NO exploits (including POC's) in usign with version 2015-07-04-ef641914-1 (source PACK).

[*] Vulnerability details for wireless-tools / version 29-6 / source PACK:

[+] Found NO CVEs and NO exploits (including POC's) in wireless-tools with version 29-6 (source PACK).

[*] Vulnerability details for wpa-supplicant / version 2018-12-02-c2c6c01b-2 / source PACK:

[*] Vulnerability details for xz-utils / version 5.2.4 / source STAT/UEMU/PACK:
[+] Found NO CVEs and NO exploits (including POC's) in wpa-supplicant with version 2018-12-02-c2c6c01b-2 (source PACK).


[+] Found NO CVEs and NO exploits (including POC's) in xz-utils with version 5.2.4 (source STAT/UEMU/PACK).

[*] Vulnerability details for xz-utils / version 5.2.4-2 / source PACK:

[+] Found NO CVEs and NO exploits (including POC's) in xz-utils with version 5.2.4-2 (source PACK).

[*] Vulnerability details for engine / version 3.2.0 / source STAT/UEMU:

[+] Found NO CVEs and NO exploits (including POC's) in engine with version 3.2.0 (source STAT/UEMU).

[*] Vulnerability details for xz / version 5.2.4-2 / source PACK:

[+] Found NO CVEs and NO exploits (including POC's) in xz with version 5.2.4-2 (source PACK).

[*] Vulnerability details for zip / version 3.0-4 / source PACK:

[+] Found NO CVEs and NO exploits (including POC's) in zip with version 3.0-4 (source PACK).

[*] Vulnerability details for zlib / version 1.2.11-2 / source PACK:

[+] Found NO CVEs and NO exploits (including POC's) in zlib with version 1.2.11-2 (source PACK).

[*] Vulnerability details for zoneinfo-africa / version 2018i-1 / source PACK:

[+] Found NO CVEs and NO exploits (including POC's) in zoneinfo-africa with version 2018i-1 (source PACK).

[*] Vulnerability details for zlib / version 1.2.11 / source STAT/PACK:

	zlib                :   1.2.11      :  	CVE-2022-37434    :   9.8       :   STAT/PACK      :   Exploit (Github: WhooAmii_POC_to_review (G) isgo-golgo13_gokit-gorillakit-enginesvc (G) manas3c_CVE-POC (G) maxim12z_ECommerce (G) nidhi7598_external_zlib-1.2.11_AOSP_10_r33_CVE-2022-37434 (G) nidhi7598_external_zlib-1.2.7_CVE-2022-37434 (G) nomi-sec_PoC-in-GitHub (G) xen0bit_CVE-2022-37434_poc (G))
	zlib                :   1.2.11      :  	CVE-2018-25032    :   7.5       :   STAT/PACK      :   Exploit (Github: ZipArchive_ZipArchive (G) chainguard-dev_zlib-patch-demo (G) gatecheckdev_gatecheck (G) isgo-golgo13_gokit-gorillakit-enginesvc (G) mario206_UnityReleaseNotes-latest (G) yeforriak_snyk-to-cve (G))

[+] Found 2 CVEs and 2 exploits (including POC's) in zlib with version 1.2.11 (source STAT/PACK).

[*] Vulnerability details for zoneinfo-asia / version 2018i-1 / source PACK:

[*] Vulnerability details for zoneinfo-atlantic / version 2018i-1 / source PACK:
[+] Found NO CVEs and NO exploits (including POC's) in zoneinfo-asia with version 2018i-1 (source PACK).


[+] Found NO CVEs and NO exploits (including POC's) in zoneinfo-atlantic with version 2018i-1 (source PACK).

[*] Vulnerability details for zoneinfo-australia-nz / version 2018i-1 / source PACK:

[+] Found NO CVEs and NO exploits (including POC's) in zoneinfo-australia-nz with version 2018i-1 (source PACK).

[*] Vulnerability details for zoneinfo-core / version 2018i-1 / source PACK:

[+] Found NO CVEs and NO exploits (including POC's) in zoneinfo-core with version 2018i-1 (source PACK).

[*] Vulnerability details for zoneinfo-india / version 2018i-1 / source PACK:

[+] Found NO CVEs and NO exploits (including POC's) in zoneinfo-india with version 2018i-1 (source PACK).

[*] Vulnerability details for zoneinfo-europe / version 2018i-1 / source PACK:

[+] Found NO CVEs and NO exploits (including POC's) in zoneinfo-europe with version 2018i-1 (source PACK).

[*] Vulnerability details for zoneinfo-northamerica / version 2018i-1 / source PACK:

[*] Vulnerability details for zoneinfo-pacific / version 2018i-1 / source PACK:
[+] Found NO CVEs and NO exploits (including POC's) in zoneinfo-northamerica with version 2018i-1 (source PACK).


[+] Found NO CVEs and NO exploits (including POC's) in zoneinfo-pacific with version 2018i-1 (source PACK).

[*] Vulnerability details for zoneinfo-poles / version 2018i-1 / source PACK:

[+] Found NO CVEs and NO exploits (including POC's) in zoneinfo-poles with version 2018i-1 (source PACK).

[*] Vulnerability details for zoneinfo-simple / version 2018i-1 / source PACK:

[+] Found NO CVEs and NO exploits (including POC's) in zoneinfo-simple with version 2018i-1 (source PACK).

[*] Vulnerability details for zoneinfo-southamerica / version 2018i-1 / source PACK:

[+] Found NO CVEs and NO exploits (including POC's) in zoneinfo-southamerica with version 2018i-1 (source PACK).


==> Minimal report of exploits and CVE's.


[*] CVE log file generated.

[*] CVE details for gnu glibc 2.27:

CVE-2022-23219,CVE-2022-23218,CVE-2019-9169,CVE-2018-11236,CVE-2017-18269,CVE-2021-35942,CVE-2020-6096,CVE-2021-3999,CVE-2019-6488,CVE-2018-11237,CVE-2021-38604,CVE-2021-3326,CVE-2019-9192,CVE-2018-20796,CVE-2018-19591,CVE-2009-5155,CVE-2020-1752,CVE-2020-1751,CVE-2019-25013,CVE-2015-8985,CVE-2020-27618,CVE-2020-10029,CVE-2019-7309,CVE-2016-10739

[*] CVE details for kernel 4.14.105 :

CVE-2015-7312,CVE-2021-3773,CVE-2019-18814,CVE-2019-18805,CVE-2019-17133,CVE-2019-16746,CVE-2019-15505,CVE-2019-14901,CVE-2019-14897,CVE-2019-14896,CVE-2019-14895,CVE-2019-10126,CVE-2019-15926,CVE-2022-42896,CVE-2022-27223,CVE-2022-2196,CVE-2022-0435,CVE-2021-3656,CVE-2021-3653,CVE-2021-28660,CVE-2020-29569,CVE-2019-3846,CVE-2019-17666,CVE-2019-14821,CVE-2019-10220,CVE-2019-9500,CVE-2022-1012,CVE-2019-19770,CVE-2023-32254,CVE-2023-32250,CVE-2020-28374,CVE-2019-11815,CVE-2018-20836,CVE-2021-4157,CVE-2023-35788,CVE-2023-3390,CVE-2023-3269,CVE-2023-32233,CVE-2023-31436,CVE-2023-3117,CVE-2023-3111,CVE-2023-3090,CVE-2023-28464,CVE-2023-26242,CVE-2023-23559,CVE-2023-23003,CVE-2023-22995,CVE-2023-2124,CVE-2023-2008,CVE-2023-2007,CVE-2023-1829,CVE-2023-1670,CVE-2023-1281,CVE-2023-1118,CVE-2023-0461,CVE-2023-0266,CVE-2023-0240,CVE-2023-0030,CVE-2022-48425,CVE-2022-48423,CVE-2022-47519,CVE-2022-47518,CVE-2022-45934,CVE-2022-4378,CVE-2022-4095,CVE-2022-39189,CVE-2022-36123,CVE-2022-3565,CVE-2022-3545,CVE-2022-34918,CVE-2022-3424,CVE-2022-32981,CVE-2022-3239,CVE-2022-32250,CVE-2022-30594,CVE-2022-29968,CVE-2022-2978,CVE-2022-2977,CVE-2022-29581,CVE-2022-28390,CVE-2022-27666,CVE-2022-26490,CVE-2022-25265,CVE-2022-24958,CVE-2022-1652,CVE-2022-1419,CVE-2022-1011,CVE-2022-0516,CVE-2022-0492,CVE-2022-0330,CVE-2021-45469,CVE-2021-42252,CVE-2021-42008,CVE-2021-4197,CVE-2021-41864,CVE-2021-4037,CVE-2021-3847,CVE-2021-38300,CVE-2021-38166,CVE-2021-38160,CVE-2021-3760,CVE-2021-37576,CVE-2021-3715,CVE-2021-3612,CVE-2021-3483,CVE-2021-3444,CVE-2021-33909,CVE-2021-3347,CVE-2021-33034,CVE-2021-33033,CVE-2021-29154,CVE-2021-28952,CVE-2021-27365,CVE-2021-26930,CVE-2021-23134,CVE-2021-22555,CVE-2021-20268,CVE-2020-7053,CVE-2020-36385,CVE-2020-36313,CVE-2020-29661,CVE-2020-27786,CVE-2020-25671,CVE-2020-25670,CVE-2020-25669,CVE-2020-25220,CVE-2020-14386,CVE-2020-14381,CVE-2020-14356,CVE-2020-14351,CVE-2020-13974,CVE-2020-12657,CVE-2020-12653,CVE-2020-11725,CVE-2020-10757,CVE-2019-7221,CVE-2019-25045,CVE-2019-19816,CVE-2019-19543,CVE-2019-19252,CVE-2019-19241,CVE-2019-15925,CVE-2019-15918,CVE-2019-15117,CVE-2019-14835,CVE-2019-14816,CVE-2019-14815,CVE-2019-14814,CVE-2019-13272,CVE-2019-12456,CVE-2019-12454,CVE-2019-11487,CVE-2019-0145,CVE-2018-8822,CVE-2018-6555,CVE-2018-25020,CVE-2018-20976,CVE-2018-20856,CVE-2018-20854,CVE-2018-20669,CVE-2018-19824,CVE-2018-18281,CVE-2018-15471,CVE-2018-14734,CVE-2018-12233,CVE-2018-10879,CVE-2018-10878,CVE-2018-10853,CVE-2016-2854,CVE-2016-2853,CVE-2015-0571,CVE-2015-0570,CVE-2015-0569,CVE-2019-3900,CVE-2018-1000026,CVE-2023-1390,CVE-2022-43945,CVE-2022-36946,CVE-2022-1199,CVE-2021-45485,CVE-2021-38207,CVE-2021-38202,CVE-2021-38201,CVE-2020-25645,CVE-2019-8980,CVE-2019-19078,CVE-2019-19075,CVE-2019-19074,CVE-2019-19071,CVE-2019-19064,CVE-2019-19061,CVE-2019-19060,CVE-2019-19052,CVE-2019-19049,CVE-2019-18807,CVE-2019-17075,CVE-2019-16995,CVE-2019-16921,CVE-2019-16714,CVE-2019-16413,CVE-2019-15916,CVE-2019-15538,CVE-2019-15099,CVE-2019-12818,CVE-2019-12615,CVE-2019-11810,CVE-2019-11479,CVE-2019-11478,CVE-2019-11477,CVE-2019-10639,CVE-2018-6412,CVE-2018-5391,CVE-2018-5390,CVE-2018-16871,CVE-2017-1000410,CVE-2021-20322,CVE-2020-25705,CVE-2017-1000407,CVE-2020-25643,CVE-2023-3268,CVE-2023-3141,CVE-2023-1838,CVE-2023-1380,CVE-2022-48502,CVE-2022-47520,CVE-2022-41858,CVE-2022-33742,CVE-2022-33741,CVE-2022-33740,CVE-2022-3202,CVE-2022-26365,CVE-2022-1973,CVE-2022-1671,CVE-2022-1651,CVE-2022-1353,CVE-2022-0850,CVE-2021-4204,CVE-2021-4090,CVE-2021-3752,CVE-2021-3739,CVE-2021-3506,CVE-2021-3501,CVE-2021-32078,CVE-2021-27364,CVE-2020-9383,CVE-2020-8648,CVE-2020-36386,CVE-2020-24394,CVE-2020-12654,CVE-2020-11668,CVE-2018-18021,CVE-2023-35829,CVE-2023-35828,CVE-2023-35827,CVE-2023-35826,CVE-2023-35824,CVE-2023-35823,CVE-2023-28466,CVE-2023-2006,CVE-2023-1989,CVE-2023-1872,CVE-2022-45919,CVE-2022-45886,CVE-2022-45885,CVE-2022-45884,CVE-2022-41222,CVE-2022-3649,CVE-2022-3635,CVE-2022-3028,CVE-2022-2961,CVE-2022-29582,CVE-2022-28796,CVE-2022-1734,CVE-2022-1048,CVE-2021-44733,CVE-2021-4202,CVE-2021-4083,CVE-2021-40490,CVE-2021-3640,CVE-2021-3609,CVE-2021-3348,CVE-2021-32399,CVE-2021-23133,CVE-2020-29370,CVE-2020-29369,CVE-2020-29368,CVE-2020-25212,CVE-2019-18683,CVE-2019-15917,CVE-2019-13233,CVE-2019-12817,CVE-2019-11811,CVE-2019-11599,CVE-2019-11486,CVE-2023-2002,CVE-2023-1079,CVE-2022-1789,CVE-2021-4203,CVE-2021-38204,CVE-2021-33656,CVE-2019-19532,CVE-2019-19531,CVE-2019-19527,CVE-2019-14283,CVE-2019-13631,CVE-2018-20169,CVE-2023-32269,CVE-2023-3159,CVE-2023-28772,CVE-2023-2513,CVE-2023-2194,CVE-2022-43750,CVE-2022-2991,CVE-2022-2503,CVE-2021-43975,CVE-2021-42739,CVE-2021-42327,CVE-2021-3411,CVE-2021-33655,CVE-2021-31916,CVE-2021-28972,CVE-2021-20292,CVE-2020-36694,CVE-2020-36158,CVE-2020-35499,CVE-2020-27777,CVE-2020-15780,CVE-2020-15436,CVE-2020-12770,CVE-2020-12659,CVE-2020-12465,CVE-2020-12464,CVE-2019-20908,CVE-2019-20636,CVE-2019-19769,CVE-2019-15090,CVE-2022-1015,CVE-2020-14331,CVE-2023-30456,CVE-2022-3643,CVE-2021-38199,CVE-2021-3772,CVE-2021-3178,CVE-2021-28715,CVE-2021-28714,CVE-2021-28688,CVE-2021-28038,CVE-2020-29373,CVE-2020-26541,CVE-2020-13143,CVE-2019-5108,CVE-2019-3460,CVE-2019-3459,CVE-2019-19046,CVE-2019-17351,CVE-2019-10638,CVE-2018-15572,CVE-2023-33203,CVE-2023-30772,CVE-2022-45888,CVE-2022-44034,CVE-2022-44033,CVE-2022-44032,CVE-2021-37159,CVE-2021-3573,CVE-2020-25285,CVE-2020-10690,CVE-2019-15214,CVE-2023-1855,CVE-2023-1611,CVE-2019-19529,CVE-2018-12633,CVE-2021-30002,CVE-2019-14284,CVE-2022-39842,CVE-2022-1508,CVE-2020-8647,CVE-2019-19602,CVE-2019-19528,CVE-2019-19332,CVE-2018-16658,CVE-2020-27171,CVE-2020-25211,CVE-2020-11565,CVE-2020-8649,CVE-2020-36516,CVE-2020-28097,CVE-2020-10711,CVE-2019-19081,CVE-2019-19080,CVE-2019-19076,CVE-2018-12232,CVE-2018-11412,CVE-2018-1108,CVE-2020-28915,CVE-2023-23039,CVE-2023-1206,CVE-2022-3533,CVE-2023-1998,CVE-2020-14390,CVE-2019-7308,CVE-2019-15902,CVE-2023-37454,CVE-2023-34256,CVE-2023-3359,CVE-2023-3358,CVE-2023-3357,CVE-2023-3355,CVE-2023-3220,CVE-2023-3161,CVE-2023-3022,CVE-2023-2985,CVE-2023-28328,CVE-2023-28327,CVE-2023-23455,CVE-2023-23454,CVE-2023-23006,CVE-2023-23005,CVE-2023-23004,CVE-2023-23002,CVE-2023-23001,CVE-2023-23000,CVE-2023-22999,CVE-2023-22998,CVE-2023-22997,CVE-2023-22996,CVE-2023-2177,CVE-2023-2166,CVE-2023-2162,CVE-2023-1249,CVE-2023-1195,CVE-2023-1095,CVE-2023-0615,CVE-2023-0469,CVE-2023-0459,CVE-2023-0394,CVE-2022-47929,CVE-2022-4662,CVE-2022-45869,CVE-2022-42703,CVE-2022-42329,CVE-2022-42328,CVE-2022-4127,CVE-2022-41218,CVE-2022-40768,CVE-2022-40476,CVE-2022-39190,CVE-2022-3707,CVE-2022-36879,CVE-2022-36280,CVE-2022-3606,CVE-2022-3595,CVE-2022-3586,CVE-2022-3544,CVE-2022-3543,CVE-2022-34495,CVE-2022-34494,CVE-2022-3344,CVE-2022-3115,CVE-2022-3114,CVE-2022-3113,CVE-2022-3112,CVE-2022-3111,CVE-2022-3110,CVE-2022-3108,CVE-2022-3107,CVE-2022-3106,CVE-2022-3105,CVE-2022-3104,CVE-2022-3078,CVE-2022-3077,CVE-2022-2905,CVE-2022-2873,CVE-2022-28389,CVE-2022-28388,CVE-2022-28356,CVE-2022-27950,CVE-2022-2785,CVE-2022-26966,CVE-2022-26878,CVE-2022-25375,CVE-2022-24959,CVE-2022-2380,CVE-2022-2318,CVE-2022-2153,CVE-2022-2078,CVE-2022-1852,CVE-2022-1263,CVE-2022-1204,CVE-2022-1198,CVE-2022-1195,CVE-2022-1016,CVE-2022-0854,CVE-2022-0617,CVE-2022-0487,CVE-2022-0480,CVE-2022-0433,CVE-2022-0382,CVE-2022-0322,CVE-2022-0264,CVE-2022-0171,CVE-2021-46283,CVE-2021-45868,CVE-2021-45480,CVE-2021-45402,CVE-2021-45095,CVE-2021-44879,CVE-2021-43389,CVE-2021-4155,CVE-2021-4150,CVE-2021-4149,CVE-2021-4148,CVE-2021-4135,CVE-2021-4095,CVE-2021-4023,CVE-2021-38208,CVE-2021-38206,CVE-2021-38203,CVE-2021-38200,CVE-2021-38198,CVE-2021-3764,CVE-2021-3744,CVE-2021-3736,CVE-2021-3732,CVE-2021-3679,CVE-2021-3659,CVE-2021-3564,CVE-2021-35477,CVE-2021-34693,CVE-2021-34556,CVE-2021-3428,CVE-2021-31829,CVE-2021-30178,CVE-2021-29650,CVE-2021-29649,CVE-2021-29648,CVE-2021-29647,CVE-2021-29646,CVE-2021-29264,CVE-2021-29155,CVE-2021-28971,CVE-2021-28951,CVE-2021-28950,CVE-2021-26932,CVE-2021-26931,CVE-2021-20320,CVE-2021-20219,CVE-2020-8992,CVE-2020-36691,CVE-2020-36322,CVE-2020-36312,CVE-2020-36311,CVE-2020-36310,CVE-2020-28941,CVE-2020-27830,CVE-2020-27784,CVE-2020-27673,CVE-2020-27194,CVE-2020-27152,CVE-2020-26088,CVE-2020-25704,CVE-2020-25673,CVE-2020-25641,CVE-2020-15393,CVE-2020-14385,CVE-2020-14314,CVE-2020-12771,CVE-2020-12769,CVE-2020-12768,CVE-2020-12656,CVE-2020-12655,CVE-2020-11669,CVE-2020-10781,CVE-2020-10774,CVE-2020-10768,CVE-2020-10767,CVE-2020-10766,CVE-2020-10720,CVE-2019-9857,CVE-2019-7222,CVE-2019-5489,CVE-2019-20812,CVE-2019-20811,CVE-2019-20810,CVE-2019-20422,CVE-2019-20096,CVE-2019-20095,CVE-2019-20054,CVE-2019-19922,CVE-2019-19767,CVE-2019-19462,CVE-2019-19338,CVE-2019-19227,CVE-2019-19077,CVE-2019-19055,CVE-2019-19051,CVE-2019-19047,CVE-2019-19043,CVE-2019-19039,CVE-2019-19037,CVE-2019-19036,CVE-2019-18885,CVE-2019-18811,CVE-2019-18808,CVE-2019-18806,CVE-2019-18786,CVE-2019-15924,CVE-2019-15923,CVE-2019-15922,CVE-2019-15118,CVE-2019-14763,CVE-2019-13648,CVE-2019-12984,CVE-2019-12819,CVE-2019-12455,CVE-2019-12382,CVE-2019-12381,CVE-2019-12380,CVE-2019-12379,CVE-2019-12378,CVE-2019-11833,CVE-2019-10207,CVE-2018-8087,CVE-2018-8043,CVE-2018-7757,CVE-2018-7755,CVE-2018-7754,CVE-2018-7740,CVE-2018-7273,CVE-2018-6554,CVE-2018-21008,CVE-2018-20511,CVE-2018-19407,CVE-2018-19406,CVE-2018-18710,CVE-2018-18690,CVE-2018-18397,CVE-2018-17972,CVE-2018-15594,CVE-2018-14656,CVE-2018-14617,CVE-2018-14616,CVE-2018-14615,CVE-2018-14614,CVE-2018-14613,CVE-2018-14612,CVE-2018-14611,CVE-2018-14610,CVE-2018-14609,CVE-2018-13100,CVE-2018-13098,CVE-2018-13097,CVE-2018-13095,CVE-2018-13094,CVE-2018-13093,CVE-2018-12896,CVE-2018-11508,CVE-2018-1130,CVE-2018-1118,CVE-2018-1095,CVE-2018-1094,CVE-2018-10940,CVE-2018-1093,CVE-2018-1092,CVE-2018-10881,CVE-2018-10880,CVE-2018-10323,CVE-2018-10322,CVE-2018-10074,CVE-2018-10021,CVE-2017-18232,CVE-2017-18216,CVE-2016-10723,CVE-2020-26147,CVE-2023-28866,CVE-2022-3594,CVE-2020-12888,CVE-2020-12826,CVE-2020-10942,CVE-2019-18282,CVE-2018-1120,CVE-2018-1000204,CVE-2020-36558,CVE-2020-36557,CVE-2020-28974,CVE-2018-12904,CVE-2023-3439,CVE-2023-33288,CVE-2023-26545,CVE-2023-1990,CVE-2023-1859,CVE-2023-1582,CVE-2023-1382,CVE-2023-0590,CVE-2023-0468,CVE-2023-0458,CVE-2022-45887,CVE-2022-41850,CVE-2022-40307,CVE-2022-39188,CVE-2022-33744,CVE-2022-3303,CVE-2022-1205,CVE-2021-3753,CVE-2021-33624,CVE-2021-29265,CVE-2021-28964,CVE-2021-20321,CVE-2020-29372,CVE-2020-27675,CVE-2020-27170,CVE-2020-12114,CVE-2019-19965,CVE-2019-19083,CVE-2019-19082,CVE-2019-19066,CVE-2019-19065,CVE-2019-19062,CVE-2019-19059,CVE-2019-19058,CVE-2019-19056,CVE-2019-19054,CVE-2019-18660,CVE-2019-16994,CVE-2019-15921,CVE-2019-15807,CVE-2019-15292,CVE-2018-7995,CVE-2018-19854,CVE-2018-1065,CVE-2017-18224,CVE-2023-37453,CVE-2023-25012,CVE-2022-25258,CVE-2021-43976,CVE-2019-19966,CVE-2019-19947,CVE-2019-19536,CVE-2019-19535,CVE-2019-19530,CVE-2019-19526,CVE-2019-19525,CVE-2019-19524,CVE-2019-19523,CVE-2019-19068,CVE-2019-19063,CVE-2019-18809,CVE-2019-15291,CVE-2019-15223,CVE-2019-15222,CVE-2019-15221,CVE-2019-15220,CVE-2019-15219,CVE-2019-15218,CVE-2019-15217,CVE-2019-15216,CVE-2019-15215,CVE-2019-15213,CVE-2019-15212,CVE-2019-15211,CVE-2019-15098,CVE-2018-19985,CVE-2020-35508,CVE-2023-3212,CVE-2023-2019,CVE-2022-0494,CVE-2022-0168,CVE-2021-4159,CVE-2021-4032,CVE-2021-4002,CVE-2021-3635,CVE-2021-27363,CVE-2021-20317,CVE-2021-20177,CVE-2020-29660,CVE-2020-25639,CVE-2020-16120,CVE-2020-15437,CVE-2020-11494,CVE-2020-10732,CVE-2019-3701,CVE-2019-20806,CVE-2019-19072,CVE-2019-19067,CVE-2019-19045,CVE-2019-15666,CVE-2019-15031,CVE-2019-15030,CVE-2022-0812,CVE-2020-11609,CVE-2020-11608,CVE-2019-15920,CVE-2010-5321,CVE-2022-41849,CVE-2022-41848,CVE-2020-26558,CVE-2020-14416,CVE-2019-19537,CVE-2021-4001,CVE-2020-25656,CVE-2020-25284,CVE-2020-12652,CVE-2019-16089,CVE-2019-12614,CVE-2019-19073,CVE-2020-16166,CVE-2020-29374,CVE-2021-45486,CVE-2020-24588,CVE-2020-24586,CVE-2020-35501,CVE-2023-1513,CVE-2022-33981,CVE-2022-32296,CVE-2022-24448,CVE-2021-38209,CVE-2021-38205,CVE-2021-3655,CVE-2021-20239,CVE-2020-29371,CVE-2019-19057,CVE-2019-17056,CVE-2019-17055,CVE-2019-17054,CVE-2019-17053,CVE-2019-17052,CVE-2019-15919,CVE-2019-11884,CVE-2018-20855,CVE-2018-13053,CVE-2015-2877,CVE-2020-24587,CVE-2022-3521,CVE-2019-11191,CVE-2019-19534,CVE-2019-19533,CVE-2021-3923

[*] CVE details for bzip2 1.0.6:

CVE-2019-12900,CVE-2016-3189

[*] CVE details for libcurl 7.64.0:

CVE-2019-5436,CVE-2020-8286,CVE-2020-8285,CVE-2020-8231,CVE-2023-27536,CVE-2023-27535,CVE-2023-27538,CVE-2021-22876,CVE-2021-22924,CVE-2021-22890

[*] CVE details for point-to-point protocol 2.4.7:

CVE-2020-8597

[*] CVE details for openssl 1.1.1b:

CVE-2022-2068,CVE-2022-1292,CVE-2021-3711,CVE-2023-2650,CVE-2023-0464,CVE-2023-0215,CVE-2022-4450,CVE-2022-0778,CVE-2021-23840,CVE-2023-0286,CVE-2021-3712,CVE-2019-1543,CVE-2022-4304,CVE-2021-4160,CVE-2021-3449,CVE-2021-23841,CVE-2020-1971,CVE-2023-0466,CVE-2023-0465,CVE-2022-2097,CVE-2019-1551,CVE-2019-1549,CVE-2019-1547,CVE-2019-1563,CVE-2019-1552

[*] CVE details for zlib 1.2.11:

CVE-2022-37434,CVE-2018-25032

[*] CVE details for dropbear ssh 2017.75:

CVE-2020-36254,CVE-2021-36369,CVE-2019-12953,CVE-2018-15599

[*] CVE details for sudo 1.8.26:

CVE-2019-14287,CVE-2023-22809,CVE-2021-3156,CVE-2021-23240,CVE-2022-43995,CVE-2019-18684,CVE-2023-28487,CVE-2023-28486,CVE-2021-23239

[*] CVE details for lua 5.1.5:

CVE-2014-5461

[*] CVE details for busybox 1.30.1:

CVE-2022-28391,CVE-2018-1000500,CVE-2021-42386,CVE-2021-42385,CVE-2021-42384,CVE-2021-42382,CVE-2021-42381,CVE-2021-42380,CVE-2021-42379,CVE-2021-42378,CVE-2021-42376,CVE-2021-42374

[*] CVE details for gnu tar 1.32:

CVE-2022-48303,CVE-2021-20193

[*] CVE details for dnsmasq 2.80:

CVE-2020-25682,CVE-2020-25681,CVE-2023-28450,CVE-2022-0934,CVE-2020-25687,CVE-2020-25683,CVE-2021-3448,CVE-2020-25686,CVE-2020-25685,CVE-2020-25684,CVE-2019-14834

[*] CVE details for gdb 8.2.1:

CVE-2019-1010180

[*] CVE details for php 7.2.16:

CVE-2022-37454,CVE-2019-13224,CVE-2019-11043,CVE-2017-8923,CVE-2020-7061,CVE-2020-7060,CVE-2020-7059,CVE-2019-11040,CVE-2019-11039,CVE-2019-11036,CVE-2019-11035,CVE-2019-11034,CVE-2020-7067,CVE-2020-7062,CVE-2019-11044,CVE-2019-11042,CVE-2019-11041,CVE-2022-31629,CVE-2020-7069,CVE-2019-11050,CVE-2019-11047,CVE-2019-11045,CVE-2022-31628,CVE-2020-7064,CVE-2020-7070,CVE-2020-7063,CVE-2019-11048,CVE-2019-11046,CVE-2019-11038,CVE-2020-7066,CVE-2020-7068


[*] Minimal exploit summary file generated.

	zlib                :   1.2.11      :  	CVE-2022-37434    :   9.8       :   STAT/PACK      :   Exploit (Github: WhooAmii_POC_to_review (G) isgo-golgo13_gokit-gorillakit-enginesvc (G) manas3c_CVE-POC (G) maxim12z_ECommerce (G) nidhi7598_external_zlib-1.2.11_AOSP_10_r33_CVE-2022-37434 (G) nidhi7598_external_zlib-1.2.7_CVE-2022-37434 (G) nomi-sec_PoC-in-GitHub (G) xen0bit_CVE-2022-37434_poc (G))
	point-to-point_proto:   2.4.7       :  	CVE-2020-8597     :   9.8       :   UEMU           :   Exploit (PSS: 156662/pppd-2.4.8-Buffer-Overflow.html (P) 156802/pppd-2.4.8-Buffer-Overflow.html (P) / Github: 0xT11_CVE-POC (G) CnHack3r_Penetration_PoC (G) Dilan-Diaz_Point-to-Point-Protocol-Daemon-RCE-Vulnerability-CVE-2020-8597- (G) JLLeitschuh_bulk-security-pr-generator (G) Juanezm_openwrt-redmi-ac2100 (G) Mr-xn_Penetration_Testing_POC (G) WinMin_CVE-2020-8597 (G) WinMin_Protocol-Vul (G) YIXINSHUWU_Penetration_Testing_POC (G) developer3000S_PoC-in-GitHub (G) hasee2018_Penetration_Testing_POC (G) hectorgie_PoC-in-GitHub (G) huike007_penetration_poc (G) huike007_poc (G) lakwsh_CVE-2020-8597 (G) marcinguy_CVE-2020-8597 (G) nomi-sec_PoC-in-GitHub (G) password520_Penetration_PoC (G) soosmile_POC (G) syb999_pppd-cve (G) winterwolf32_CVE-S---Penetration_Testing_POC- (G) xuetusummer_Penetration_Testing_POC (G) yedada-wei_- (G) yedada-wei_gongkaishouji (G))
	php                 :   7.2.16      :  	CVE-2022-37454    :   9.8       :   STAT           :   Exploit (Github: GitHubForSnap_matrix-commander-gael (G) rveglahn-r7_TEST-snyk-sha3-py-vuln (G))
	php                 :   7.2.16      :  	CVE-2019-13224    :   9.8       :   STAT           :   Exploit (Github: ForAllSecure_VulnerabilitiesLab (G) balabit-deps_balabit-os-8-libonig (G) balabit-deps_balabit-os-9-libonig (G) deepin-community_libonig (G) kkos_oniguruma (G) onivim_esy-oniguruma (G) winlibs_oniguruma (G))
	php                 :   7.2.16      :  	CVE-2019-11043    :   9.8       :   STAT           :   Exploit (EDB ID: 48182 / MSF: php_fpm_rce (R) / PSS: 154974/PHP-FPM-Remote-Code-Execution.html (R) / Github: 0th3rs-Security-Team_CVE-2019-11043 (G) 0xT11_CVE-POC (G) 20142995_pocsuite (G) 20142995_pocsuite3 (G) ARPSyndicate_kenzer-templates (G) AleWong_PHP-FPM-Remote-Code-Execution-Vulnerability-CVE-2019-11043- (G) B1gd0g_CVE-2019-11043 (G) CVEDB_awesome-cve-repo (G) CVEDB_top (G) CnHack3r_Penetration_PoC (G) Elsfa7-110_kenzer-templates (G) HxDDD_CVE-PoC (G) InesMartins31_iot-cves (G) JERRY123S_all-poc (G) LubinLew_WEB-CVE (G) MRdoulestar_CVE-2019-11043 (G) Mr-xn_Penetration_Testing_POC (G) SexyBeast233_SecBooks (G) Threekiii_Vulhub-Reproduce (G) YIXINSHUWU_Penetration_Testing_POC (G) aaron3238_phpfpmexploit (G) ajread4_nessus_crosswalk (G) akamajoris_CVE-2019-11043-Docker (G) alokaranasinghe_cve-2019-11043 (G) alphaSeclab_sec-daily-2019 (G) apachecn-archive_Middleware-Vulnerability-detection (G) b0o_starred (G) babebbu_TNI-CWC-GGEZ-Hosting (G) bollwarm_tech-news (G) corifeo_CVE-2019-11043 (G) cout970_PublicStorage (G) cyberanand1337x_bug-bounty-2022 (G) developer3000S_PoC-in-GitHub (G) fairyming_CVE-2019-11043 (G) febryandana_nginx-php-fpm (G) gaahrdner_starred (G) hasee2018_Penetration_Testing_POC (G) hectorgie_PoC-in-GitHub (G) hktalent_TOP (G) hugefiver_mystars (G) huike007_penetration_poc (G) huike007_poc (G) huowen_CVE-2019-11043 (G) ianxtianxt_CVE-2019-11043 (G) ilikemunchingonwillys_kkk (G) imhunterand_hackerone-publicy-disclosed (G) izj007_wechat (G) jas502n_CVE-2019-11043 (G) jas9reet_CVE-2019-11043 (G) jdecool_stars-feed (G) jiangsir404_POC-S (G) johnkilene_CUDB (G) jptr218_php_hack (G) k8gege_CVE-2019-11043 (G) kriskhub_CVE-2019-11043 (G) lindemer_CVE-2019-11043 (G) linuxserver_docker-nextcloud (G) lnick2023_nicenice (G) lovechinacoco_https-github.com-mai-lang-chai-Middleware-Vulnerability-detection (G) ltfafei_my_POC (G) lucianonooijen_stargazed (G) m0ver_drupal-installation-issues (G) moniik_CVE-2019-11043_env (G) motikan2010_blog.motikan2010.com (G) neex_phuip-fpizdam (G) password520_Penetration_PoC (G) qazbnm456_awesome-cve-poc (G) rmtec_modeswitcher (G) shadow-horse_cve-2019-11043 (G) supercid_awesome-starred (G) superfish9_pt (G) tdtc7_qps (G) theMiddleBlue_CVE-2019-11043 (G) tinker-li_CVE-2019-11043 (G) tjkess_byol (G) trhacknon_phuip-fpizdam (G) ugur-ercan_exploit-collection (G) weeka10_-hktalent-TOP (G) whalehub_awesome-stars (G) whoadmin_pocs (G) winterwolf32_CVE-S---Penetration_Testing_POC- (G) xbl3_awesome-cve-poc_qazbnm456 (G) xuetusummer_Penetration_Testing_POC (G) yedada-wei_- (G) yedada-wei_gongkaishouji (G) ypereirareis_docker-CVE-2019-11043 (G) zhengjim_loophole (G) (X))
	openssl             :   1.1.1b      :  	CVE-2022-2068     :   9.8       :   STAT/UEMU      :   Exploit (Github: backloop-biz_CVE_checks (G) jntass_TASSL-1.1.1 (G) mawinkler_c1-cs-scan-result (G) tianocore-docs_ThirdPartySecurityAdvisories (G))
	openssl             :   1.1.1b      :  	CVE-2022-1292     :   9.8       :   STAT/UEMU      :   Exploit (Snyk: SNYK-UNMANAGED-OPENSSL-2807816 (S) / Github: WhooAmii_POC_to_review (G) alcaparra_CVE-2022-1292 (G) backloop-biz_CVE_checks (G) fdl66_openssl-1.0.2u-fix-cve (G) greek0x0_CVE-2022-1292 (G) jntass_TASSL-1.1.1 (G) li8u99_CVE-2022-1292 (G) manas3c_CVE-POC (G) mawinkler_c1-cs-scan-result (G) nidhi7598_openssl-OpenSSL_1_1_1g_AOSP_10_r33_CVE-2022-1292 (G) nomi-sec_PoC-in-GitHub (G) rama291041610_CVE-2022-1292 (G) tianocore-docs_ThirdPartySecurityAdvisories (G) trhacknon_CVE-2022-1292 (G) und3sc0n0c1d0_CVE-2022-1292 (G))
	openssl             :   1.1.1b      :  	CVE-2021-3711     :   9.8       :   STAT/UEMU      :   Exploit (Github: Frannc0_test2 (G) NeXTLinux_griffon (G) anchore_grype (G) aymankhder_scanner-for-container (G) isgo-golgo13_gokit-gorillakit-enginesvc (G) jntass_TASSL-1.1.1 (G) jntass_TASSL-1.1.1k (G) leonov-av_scanvus (G) metapull_attackfinder (G) mmartins000_sinker (G) tianocore-docs_ThirdPartySecurityAdvisories (G))
	glibc               :   2.27        :  	CVE-2019-9169     :   9.8       :   STAT           :   Exploit (Github: flyrev_security-scan-ci-presentation (G))
	glibc               :   2.27        :  	CVE-2018-11236    :   9.8       :   STAT           :   Exploit (Github: 0xT11_CVE-POC (G) evilmiracle_CVE-2018-11236 (G) flyrev_security-scan-ci-presentation (G) simonsdave_clair-cicd (G))
	glibc               :   2.27        :  	CVE-2017-18269    :   9.8       :   STAT           :   Exploit (Github: fingolfin_memmove-bug (G) flyrev_security-scan-ci-presentation (G))
	bzip2               :   1.0.6       :  	CVE-2019-12900    :   9.8       :   UEMU/PACK      :   Exploit (Github: bubbleguuum_zypperdiff (G) fredrkl_trivy-demo (G))
	php                 :   7.2.16      :  	CVE-2019-11034    :   9.1       :   STAT           :   Exploit (Github: vincd_search-cve (G))
	glibc               :   2.27        :  	CVE-2021-35942    :   9.1       :   STAT           :   Exploit (Github: WynSon_CVE-2021-35042 (G) Zh0ngS0n1337_CVE-2021-35042 (G) dispera_giant-squid (G) madchap_opa-tests (G) n3utr1n00_CVE-2021-35042 (G) nedenwalker_spring-boot-app-using-gradle (G) nedenwalker_spring-boot-app-with-log4j-vuln (G) ruzickap_cks-notes (G) thegeeklab_audit-exporter (G))
	sudo                :   1.8.26      :  	CVE-2019-14287    :   8.8       :   UEMU/PACK      :   Exploit (EDB ID: 47502 / Github: 0xT11_CVE-POC (G) 1337kid_Exploits (G) 5l1v3r1_cve-2019-14287sudoexp (G) AfvanMoopen_tryhackme- (G) Alex-Stinga_TryHackMe (G) CMNatic_Dockerized-CVE-2019-14287 (G) CMNatic_UoG-CTF (G) CashWilliams_CVE-2019-14287-demo (G) CyberSec-Monkey_Zero2H4x0r (G) DewmiApsara_CVE-2019-14287 (G) DularaAnushka_Linux-Privilege-Escalation-using-Sudo-Rights (G) FauxFaux_sudo-cve-2019-14287 (G) Getshell_LinuxTQ (G) Hasintha-98_Sudo-Vulnerability-Exploit-CVE-2019-14287 (G) HussyCool_CVE-2019-14287-IT18030372- (G) InesMartins31_iot-cves (G) JSchauert_Penetration-Testing-2 (G) JSchauert_Project-2-Offensive-Security-CTF (G) Janette88_cve-2019-14287sudoexp (G) M108Falcon_Sudo-CVE-2019-14287 (G) RoqueNight_Linux-Privilege-Escalation-Basics (G) SachinthaDeSilva-cmd_Exploit-CVE-2019-14287 (G) SexyBeast233_SecBooks (G) ShianTrish_sudo-Security-Bypass-vulnerability-CVE-2019-14287 (G) Sindadziy_cve-2019-14287 (G) Sindayifu_CVE-2019-14287-CVE-2014-6271 (G) Sithma_SNP (G) TCM-Course-Resources_Linux-Privilege-Escalation-Resources (G) Tharana_Exploiting-a-Linux-kernel-vulnerability (G) Tharana_vulnerability-exploitation (G) a-nonymou-s_Agent-Sudo (G) aWtlcm9h_Memo (G) agariy_MyFirstWebShell (G) alphaSeclab_sec-daily-2019 (G) axax002_sudo-vulnerability-CVE-2019-14287 (G) bianfusia_CTF-writeup (G) bloodzer0_PoC (G) brootware_awesome-cyber-security-university (G) brootware_cyber-security-university (G) catsecorg_CatSec-TryHackMe-WriteUps (G) cxzczxzc_sudo-exploit-mitre-attack-poc (G) developer3000S_PoC-in-GitHub (G) dhniroshan_offensive_hacking (G) edsonjt81_CVE-2019-14287- (G) ejlevin99_Sudo-Security-Bypass-Vulnerability (G) emtuls_Awesome-Cyber-Security-List (G) geeksniper_Linux-privilege-escalation (G) geleiaa_ceve-s (G) go-bi_go-bi-soft (G) gurkylee_Linux-Privilege-Escalation-Basics (G) gurneesh_CVE-2019-14287-write-up (G) hectorgie_PoC-in-GitHub (G) huang919_cve-2019-14287-PPT (G) janod313_-CVE-2019-14287-SUDO-bypass-vulnerability (G) jordansinclair1990_TryHackMeAgentSudo (G) k4u5h41_CVE-2019-14287 (G) mai-lang-chai_System-Vulnerability (G) makoto56_penetration-suite-toolkit (G) malangalothbrok_linux-bypass (G) malangalothbrok_sudo-linux-bypass (G) mussar0x4D5352_rekall-penetration-test (G) n0w4n_CVE-2019-14287 (G) notnue_Linux-Privilege-Escalation (G) ra1nb0rn_search_vulns (G) retr0-13_Linux-Privilege-Escalation-Basics (G) shallvhack_Sudo-Security-Bypass-CVE-2019-14287 (G) shashihacks_OSCP (G) shashihacks_OSWE (G) shrishtydayal2304_100-days-of-code (G) shyambhanushali_AttackDefendExercise (G) sonu7519_linux-priv-Esc (G) stefanman125_CyberSci-pizzashop (G) testermas_tryhackme (G) thinuri99_Sudo-Security-Bypass-Vulnerability-CVE-2019-14287- (G) tranquac_Linux-Privilege-Escalation (G) usamaelshazly_Linux-Privilege-Escalation (G) wenyu1999_sudo- (G) wiiwu959_Pentest-Record (G) xyongcn_exploit (G) yaguine_agent_sudo (G))
	kernel              :   4.14.105    :  	CVE-2022-42896    :   8.8       :   STAT/PACK      :   Exploit (Github: Satheesh575555_linux-4.19.72_CVE-2022-42896 (G) Trinadh465_linux-4.19.72_CVE-2022-42896 (G) hshivhare67_kernel_v4.19.72_CVE-2022-42896_new (G) hshivhare67_kernel_v4.19.72_CVE-2022-42896_old (G) kdn111_linux-kernel-exploitation (G) khanhdn111_linux-kernel-exploitation (G) khanhdz-06_linux-kernel-exploitation (G) khanhdz191_linux-kernel-exploitation (G) khanhhdz_linux-kernel-exploitation (G) khanhhdz06_linux-kernel-exploitation (G) khanhnd123_linux-kernel-exploitation (G) nidhi7598_linux-4.1.15_CVE-2022-42896 (G) nomi-sec_PoC-in-GitHub (G) xairy_linux-kernel-exploitation (G))
	kernel              :   4.14.105    :  	CVE-2022-0435     :   8.8       :   STAT/PACK      :   Exploit (Github: kdn111_linux-kernel-exploitation (G) khanhdn111_linux-kernel-exploitation (G) khanhdz-06_linux-kernel-exploitation (G) khanhdz191_linux-kernel-exploitation (G) khanhhdz_linux-kernel-exploitation (G) khanhhdz06_linux-kernel-exploitation (G) khanhnd123_linux-kernel-exploitation (G) manas3c_CVE-POC (G) nomi-sec_PoC-in-GitHub (G) wlswotmd_CVE-2022-0435 (G) xairy_linux-kernel-exploitation (G))
	kernel              :   4.14.105    :  	CVE-2021-3656     :   8.8       :   STAT/PACK      :   Exploit (Github: nomi-sec_PoC-in-GitHub (G) rami08448_CVE-2021-3656-Demo (G))
	kernel              :   4.14.105    :  	CVE-2021-3653     :   8.8       :   STAT/PACK      :   Exploit (Github: rami08448_CVE-2021-3656-Demo (G))
	kernel              :   4.14.105    :  	CVE-2019-17666    :   8.8       :   STAT/PACK      :   Exploit (Github: alphaSeclab_sec-daily-2019 (G))
	busybox             :   1.30.1      :  	CVE-2022-28391    :   8.8       :   STAT/PACK      :   Exploit (Github: KazKobara_dockerfile_fswiki_local (G) grggls_crypto-devops-test (G) isgo-golgo13_gokit-gorillakit-enginesvc (G))
	kernel              :   4.14.105    :  	CVE-2019-9500     :   8.3       :   STAT/PACK      :   Exploit (Github: 0xT11_CVE-POC (G) developer3000S_PoC-in-GitHub (G) hectorgie_PoC-in-GitHub (G) kdn111_linux-kernel-exploitation (G) khanhdn111_linux-kernel-exploitation (G) khanhdz-06_linux-kernel-exploitation (G) khanhdz191_linux-kernel-exploitation (G) khanhhdz_linux-kernel-exploitation (G) khanhhdz06_linux-kernel-exploitation (G) khanhnd123_linux-kernel-exploitation (G) lnick2023_nicenice (G) qazbnm456_awesome-cve-poc (G) xairy_linux-kernel-exploitation (G) xbl3_awesome-cve-poc_qazbnm456 (G))
	kernel              :   4.14.105    :  	CVE-2022-1012 (V) :   8.2       :   STAT/PACK      :   Exploit (Github: manas3c_CVE-POC (G) nomi-sec_PoC-in-GitHub (G))
	kernel              :   4.14.105    :  	CVE-2019-19770 (V):   8.2       :   STAT/PACK      :   Exploit (Github: mcgrof_break-blktrace (G))
	kernel              :   4.14.105    :  	CVE-2019-11815    :   8.1       :   STAT/PACK      :   Exploit (Github: Sec20-Paper310_Paper310 (G) alphaSeclab_sec-daily-2019 (G))
	glibc               :   2.27        :  	CVE-2020-6096     :   8.1       :   STAT           :   Exploit (Github: Frannc0_test2 (G) KashaMalaga_cve2020-6096 (G) NeXTLinux_griffon (G) anchore_grype (G) aymankhder_scanner-for-container (G) dispera_giant-squid (G) domyrtille_interview_project (G) epequeno_devops-demo (G) garethr_snykout (G) kumarmadhu123_cve_web_scrapper (G) metapull_attackfinder (G) nedenwalker_spring-boot-app-using-gradle (G) nedenwalker_spring-boot-app-with-log4j-vuln (G) onzack_trivy-multiscanner (G) ruzickap_container-build (G) thegeeklab_audit-exporter (G))
	dropbear_ssh        :   2017.75     :  	CVE-2020-36254    :   8.1       :   UEMU           :   Exploit (Github: Morton-L_BoltWrt (G))
	dnsmasq             :   2.80        :  	CVE-2020-25682    :   8.1       :   UEMU/PACK      :   Exploit (Github: AZ-X_pique (G) DNTYO_F5_Vulnerability (G) kaosagnt_ansible-everyday (G) klcheung99_CSCM28CW2 (G))
	dnsmasq             :   2.80        :  	CVE-2020-25681    :   8.1       :   UEMU/PACK      :   Exploit (Github: AZ-X_pique (G) DNTYO_F5_Vulnerability (G) kaosagnt_ansible-everyday (G) klcheung99_CSCM28CW2 (G))
	busybox             :   1.30.1      :  	CVE-2018-1000500  :   8.1       :   STAT/PACK      :   Exploit (Github: alphaSeclab_sec-daily-2020 (G))
	sudo                :   1.8.26      :  	CVE-2023-22809    :   7.8       :   UEMU/PACK      :   Exploit (EDB ID: 51217 / MSF: sudoedit_bypass_priv_esc (L) / PSS: 171644/sudo-1.9.12p1-Privilege-Escalation.html (L) / Github: CKevens_CVE-2023-22809-sudo-POC (G) CVEDB_awesome-cve-repo (G) CVEDB_top (G) Chan9Yan9_CVE-2023-22809 (G) KayCHENvip_vulnerability-poc (G) M4fiaB0y_CVE-2023-22809 (G) Threekiii_Awesome-POC (G) Threekiii_CVE (G) Zeyad-Azima_Remedy4me (G) asepsaepdin_CVE-2021-1732 (G) asepsaepdin_CVE-2023-22809 (G) beruangsalju_LocalPrivelegeEscalation (G) beruangsalju_LocalPrivilegeEscalation (G) hello4r1end_patch_CVE-2023-22809 (G) hktalent_TOP (G) manas3c_CVE-POC (G) n3m1dotsys_CVE-2023-22809-sudoedit-privesc (G) n3m1dotsys_n3m1dotsys (G) nomi-sec_PoC-in-GitHub (G) pashayogi_CVE-2023-22809 (G) stefan11111_rdoedit (G))
	sudo                :   1.8.26      :  	CVE-2021-3156     :   7.8       :   UEMU/PACK      :   Exploit (EDB ID: 49521 / MSF: sudo_baron_samedit (L) / Snyk: SNYK-UNMANAGED-SUDO-2368628 (S) / PSS: 161270/Sudo-1.9.5p1-Buffer-Overflow-Privilege-Escalation.html (P) 161230/Sudo-Buffer-Overflow-Privilege-Escalation.html (P) 161160/Sudo-Heap-Based-Buffer-Overflow.html (P) / Github: 0x4ndy_clif (G) 0x7183_CVE-2021-3156 (G) 0xdevil_CVE-2021-3156 (G) 0xsakthi_my-pentest-notes (G) 1N53C_CVE-2021-3156-PoC (G) 30579096_vCenterVulns (G) ARGOeu-Metrics_secmon-probes (G) ARGOeu_secmon-probes (G) AbdullahRizwan101_Baron-Samedit (G) Al1ex_LinuxEelvation (G) Ashish-dawani_CVE-2021-3156-Patch (G) BLACKHAT-SSG_MindMaps2 (G) BearCat4_CVE-2021-3156 (G) Bubleh21_CVE-2021-3156 (G) CVEDB_awesome-cve-repo (G) CVEDB_top (G) ClassBluer_Exploit_Tools (G) CptGibbon_CVE-2021-3156 (G) CrackerCat_cve-2021-3157 (G) CyberCommands_CVE-2021-3156 (G) CyberCommands_exploit-sudoedit (G) DanielAzulayy_CTF-2021 (G) DarkFunct_CVE_Exploits (G) Drakfunc_CVE_Exploits (G) EdgeSecurityTeam_Vulnerability (G) EvilAnne_2021-Read-article (G) Exodusro_CVE-2021-3156 (G) Floodnut_paper_docs_study (G) Floodnut_papers_documents_Analysis (G) Gutem_scans-exploits (G) HadessCS_Awesome-Privilege-Escalation (G) HynekPetrak_HynekPetrak (G) JERRY123S_all-poc (G) JMontRod_Pruebecita (G) JlSakuya_Linux-Privilege-Escalation-Exploits (G) KayCHENvip_vulnerability-poc (G) Kiprey_Skr_Learning (G) LiveOverflow_pwnedit (G) Ly0nt4r_OSCP (G) Meowmycks_OSCPprep-Cute (G) Meowmycks_OSCPprep-Sar (G) Meowmycks_OSCPprep-hackme1 (G) Mhackiori_CVE-2021-3156 (G) Miraitowa70_POC-Notes (G) Morton-L_BoltWrt (G) Mr-xn_Penetration_Testing_POC (G) NeQuissimus_nixos-vuln (G) Nokialinux_CVE-2021-3156 (G) Offensive-Penetration-Security_OPSEC-Hall-of-fame (G) OrangeGzY_security-research-learning (G) PhuketIsland_CVE-2021-3156-centos7 (G) PurpleOzone_PE_CVE-CVE-2021-3156 (G) Q4n_CVE-2021-3156 (G) RodricBr_CVE-2021-3156 (G) Ruviixx_proyecto-ps (G) Rvn0xsy_CVE-2021-3156-plus (G) SPXcz_IC1_projekt (G) SantiagoSerrao_ScannerCVE-2021-3156 (G) Self-Study-Committee_Skr_Learning (G) SexyBeast233_SecBooks (G) Spektrainfiniti_MP (G) TheFlash2k_CVE-2021-3156 (G) TheSerialiZator_CTF-2021 (G) Threekiii_Awesome-POC (G) Timirepo_CVE_Exploits (G) Toufupi_CVE_Collection (G) Trivialcorgi_Proyecto-Prueba-PPS (G) WhooAmii_POC_to_review (G) Y3A_CVE-2021-3156 (G) aasphixie_aasphixie.github.io (G) abedra_securing_security_software (G) ajtech-hue_CVE-2021-3156-Mitigation-ShellScript-Build (G) amanszpapaya_MacPer (G) anquanscan_sec-tools (G) apachecn-archive_Middleware-Vulnerability-detection (G) apogiatzis_docker-CVE-2021-3156 (G) arvindshima_CVE-2021-3156 (G) axelmierczuk_privesc (G) baka9moe_CVE-2021-3156-Exp (G) baka9moe_CVE-2021-3156-TestReport (G) barebackbandit_CVE-2021-3156 (G) bc29ea3c101054baa1429ffc2edba4ae_sigma_detection_rules (G) binw2018_CVE-2021-3156-SCRIPT (G) blackberry_Falco-bypasses (G) blasty_CVE-2021-3156 (G) bsauce_kernel-exploit-factory (G) bsauce_kernel-security-learning (G) capturingcats_CVE-2021-3156 (G) chenaotian_CVE-2021-3156 (G) cyberanand1337x_bug-bounty-2022 (G) cybercrazetech_Employee-walkthrough (G) d3c3ptic0n_CVE-2021-3156 (G) developer3000S_PoC-in-GitHub (G) dinhbaouit_CVE-2021-3156 (G) donghyunlee00_CVE-2021-3156 (G) dyne_sud (G) e-hakson_OSCP (G) elbee-cyber_CVE-2021-3156-PATCHER (G) eljosep_OSCP-Guide (G) fei9747_LinuxEelvation (G) felixfu59_shocker-attack (G) foyjog_shocker-attack (G) freeFV_CVE-2021-3156 (G) freitzzz_tpas-binary-exploitation (G) gamblingmaster2020_vCenterExp (G) gmldbd94_cve-2021-3156 (G) go-bi_go-bi-soft (G) goEnum_goEnum (G) goEnumAdmin_goEnum (G) greg-workspace_my_sudo_heap_overflow_exploit (G) grng3r_rs_exploits (G) hac425xxx_heap-exploitation-in-real-world (G) halissha_CVE-2021-3156 (G) harsh-bothra_learn365 (G) hilbix_suid (G) hktalent_TOP (G) huike007_penetration_poc (G) jm33-m0_CVE-2021-3156 (G) joshmcorreia_SDSU_Cyber_Security_Red_Team (G) joydo_CVE-Writeups (G) kal1gh0st_CVE-2021-3156 (G) kaosagnt_ansible-everyday (G) ker2x_DearDiary (G) kernelzeroday_CVE-2021-3156-Baron-Samedit (G) kevinnivekkevin_3204_coursework_1 (G) kldksd_server (G) kotikjaroslav_sigma_detection_rules (G) liqimore_ECE9609-Introduction-to-Hacking (G) lmol_CVE-2021-3156 (G) lockedbyte_CVE-Exploits (G) lockedbyte_lockedbyte (G) lockedbyte_slides (G) lognoz_puppet-freebsd-workstation (G) loong576_ansible-production-practice-6 (G) lovechinacoco_https-github.com-mai-lang-chai-Middleware-Vulnerability-detection (G) ltfafei_my_POC (G) makoto56_penetration-suite-toolkit (G) manas3c_CVE-POC (G) mbcrump_CVE-2021-3156 (G) meowhua15_CVE-2021-3156 (G) mitinarseny_hse_facl (G) mr-r3b00t_CVE-2021-3156 (G) mstxq17_SecurityArticleLogger (G) murchie85_twitterCyberMonitor (G) musergi_CVE-2021-3156 (G) mutur4_CVE-2021-3156 (G) neolin-ms_LinuxDocLinks (G) nexcess_sudo_cve-2021-3156 (G) nitishbadole_oscp-note-3 (G) njahrckstr_exploits- (G) nobodyatall648_CVE-2021-3156 (G) nomi-sec_PoC-in-GitHub (G) nu11secur1ty_CVE-mitre (G) nu11secur1ty_CVE-nu11secur1ty (G) oneoy_CVE-2021-3156 (G) oneoy_exploits1 (G) oriolOrnaque_TFG-Binary-exploitation (G) password520_CVE-2021-3156 (G) pathakabhi24_Awesome-C (G) pen4uin_awesome-vulnerability-research (G) pen4uin_vulnerability-research (G) pen4uin_vulnerability-research-list (G) perlun_sudo-1.8.3p1-patched (G) ph4ntonn_CVE-2021-3156 (G) pmihsan_Sudo-HeapBased-Buffer-Overflow (G) popyue_HackTheBox (G) puckiestyle_CVE-2021-3156 (G) pvnovarese_2022-02-enterprise-demo (G) pvnovarese_2022-04-enterprise-demo (G) pvnovarese_2022-04-suse-demo (G) pvnovarese_2022-06-enterprise-demo (G) pvnovarese_2022-08-enterprise-demo (G) pvnovarese_2022-09-enterprise-demo (G) pvnovarese_2023-01-enterprise-demo (G) pvnovarese_2023-02-demo (G) q77190858_CVE-2021-3156 (G) qxxxb_ctf_challenges (G) r0eXpeR_pentest (G) r3k4t_how-to-solve-sudo-heap-based-bufferoverflow-vulnerability (G) r4j0x00_exploits (G) redhawkeye_sudo-exploit (G) ret2basic_SudoScience (G) reverse-ex_CVE-2021-3156 (G) rfago_tpas-binary-exploitation (G) sandesvitor_simple-ansible-lab (G) saucer-man_exploit (G) sereok3_buffer-overflow-writeups (G) sharkmoos_Baron-Samedit (G) siddicky_yotjf (G) skilian-enssat_datura-ctf (G) soosmile_POC (G) stong_CVE-2021-3156 (G) stressboi_TA-Samedit (G) taielab_awesome-hacking-lists (G) tainguyenbp_linux-cve (G) teamtopkarl_CVE-2021-3156 (G) thisguyshouldworkforus_ansible (G) tunjing789_Employee-walkthrough (G) tzwlhack_Vulnerability (G) uhub_awesome-c (G) unauth401_CVE-2021-3156 (G) usdogu_awesome-stars (G) voidlsd_CVE-2021-3156 (G) weeka10_-hktalent-TOP (G) weto91_GitHub_Search_CVE (G) wiiwu959_Pentest-Record (G) winterwolf32_CVE-S---Penetration_Testing_POC- (G) worawit_CVE-2021-3156 (G) wsmaxcy_Cat-Pictures-2-Writeup (G) xtaran_sshudo (G) xuetusummer_Penetration_Testing_POC (G) yaunsky_cve-2021-3156 (G) yifengyou_sudo-1.8.29 (G) ymrsmns_CVE-2021-3156 (G) ypl6_heaplens (G) (X))
	kernel              :   4.14.105    :  	CVE-2023-3269     :   7.8       :   STAT/PACK      :   Exploit (Github: LumaKernel_awesome-stars (G) aneasystone_github-trending (G) izj007_wechat (G) kherrick_hacker-news (G) kun-g_Scraping-Github-trending (G) lrh2000_StackRot (G) nomi-sec_PoC-in-GitHub (G))
	kernel              :   4.14.105    :  	CVE-2023-32233    :   7.8       :   STAT/PACK      :   Exploit (Github: CVEDB_awesome-cve-repo (G) CVEDB_top (G) Liuk3r_CVE-2023-32233 (G) Mr-xn_Penetration_Testing_POC (G) PIDAN-HEIDASHUAI_CVE-2023-32233 (G) Threekiii_CVE (G) hktalent_TOP (G) nomi-sec_PoC-in-GitHub (G) oferchen_POC-CVE-2023-32233 (G) xairy_linux-kernel-exploitation (G) xyxj1024_xyxj1024.github.io (G))
	kernel              :   4.14.105    :  	CVE-2023-23559    :   7.8       :   STAT/PACK      :   Exploit (Github: szymonh_szymonh (G))
	kernel              :   4.14.105    :  	CVE-2023-2008     :   7.8       :   STAT/PACK      :   Exploit (Github: Mr-xn_Penetration_Testing_POC (G) bluefrostsecurity_CVE-2023-2008 (G) em1ga3l_cve-msrc-extractor (G) nomi-sec_PoC-in-GitHub (G) xairy_linux-kernel-exploitation (G))
	kernel              :   4.14.105    :  	CVE-2023-1829     :   7.8       :   STAT/PACK      :   Exploit (Github: Threekiii_CVE (G) star-sg_CVE (G) xairy_linux-kernel-exploitation (G))
	kernel              :   4.14.105    :  	CVE-2023-0461     :   7.8       :   STAT/PACK      :   Exploit (Github: hheeyywweellccoommee_linux-4.19.72_CVE-2023-0461-ycnbd (G) hshivhare67_kernel_v4.19.72_CVE-2023-0461 (G) nidhi7598_linux-4.19.72_CVE-2023-0461 (G) nomi-sec_PoC-in-GitHub (G))
	kernel              :   4.14.105    :  	CVE-2022-45934    :   7.8       :   STAT/PACK      :   Exploit (Github: Satheesh575555_linux-4.1.15_CVE-2022-45934 (G) Trinadh465_linux-4.1.15_CVE-2022-45934 (G) Trinadh465_linux-4.19.72_CVE-2022-45934 (G) manas3c_CVE-POC (G) nidhi7598_linux-3.0.35_CVE-2022-45934 (G) nomi-sec_PoC-in-GitHub (G))
	kernel              :   4.14.105    :  	CVE-2022-36123    :   7.8       :   STAT/PACK      :   Exploit (Github: sickcodes_security_blob_master_advisories_SICK-2022-128.md (G))
	kernel              :   4.14.105    :  	CVE-2022-34918    :   7.8       :   STAT/PACK      :   Exploit (MSF: netfilter_nft_set_elem_init_privesc (L) / Github: JlSakuya_Linux-Privilege-Escalation-Exploits (G) Ly0nt4r_OSCP (G) Mr-xn_Penetration_Testing_POC (G) Sechack06_CVE-2022-34918 (G) Snoopy-Sec_Localroot-ALL-CVE (G) WhooAmii_POC_to_review (G) bsauce_kernel-exploit-factory (G) bsauce_kernel-security-learning (G) e-hakson_OSCP (G) eljosep_OSCP-Guide (G) felixfu59_kernel-hack (G) kdn111_linux-kernel-exploitation (G) khanhdn111_linux-kernel-exploitation (G) khanhdz-06_linux-kernel-exploitation (G) khanhdz191_linux-kernel-exploitation (G) khanhhdz_linux-kernel-exploitation (G) khanhhdz06_linux-kernel-exploitation (G) khanhnd123_linux-kernel-exploitation (G) lanleft_CVE2023-1829 (G) linulinu_CVE-2022-34918 (G) manas3c_CVE-POC (G) merlinepedra_CVE-2022-34918-LPE-PoC (G) merlinepedra25_CVE-2022-34918-LPE-PoC (G) nitishbadole_oscp-note-3 (G) nomi-sec_PoC-in-GitHub (G) purplewall1206_ERA-eBPF-assisted-Randomize-Allocator (G) randorisec_CVE-2022-34918-LPE-PoC (G) taielab_awesome-hacking-lists (G) tr3ss_gofetch (G) trhacknon_CVE-2022-34918-LPE-PoC (G) veritas501_CVE-2022-34918 (G) xairy_linux-kernel-exploitation (G) xuetusummer_Penetration_Testing_POC (G))
	kernel              :   4.14.105    :  	CVE-2022-32250    :   7.8       :   STAT/PACK      :   Exploit (linux-exploit-suggester / Github: JlSakuya_Linux-Privilege-Escalation-Exploits (G) Mr-xn_Penetration_Testing_POC (G) Snoopy-Sec_Localroot-ALL-CVE (G) WhooAmii_POC_to_review (G) bsauce_kernel-exploit-factory (G) bsauce_kernel-security-learning (G) felixfu59_kernel-hack (G) kdn111_linux-kernel-exploitation (G) khanhdn111_linux-kernel-exploitation (G) khanhdz-06_linux-kernel-exploitation (G) khanhdz191_linux-kernel-exploitation (G) khanhhdz_linux-kernel-exploitation (G) khanhhdz06_linux-kernel-exploitation (G) khanhnd123_linux-kernel-exploitation (G) manas3c_CVE-POC (G) nomi-sec_PoC-in-GitHub (G) theori-io_CVE-2022-32250-exploit (G) xairy_linux-kernel-exploitation (G) xuetusummer_Penetration_Testing_POC (G) ysanatomic_CVE-2022-32250-LPE (G))
	kernel              :   4.14.105    :  	CVE-2022-30594    :   7.8       :   STAT/PACK      :   Exploit (PSS: 170362/Linux-PT_SUSPEND_SECCOMP-Permission-Bypass-Ptracer-Death-Race.html (P) / Github: WhooAmii_POC_to_review (G) manas3c_CVE-POC (G) nidhi7598_linux-4.19.72_CVE-2022-30594 (G) nomi-sec_PoC-in-GitHub (G))
	kernel              :   4.14.105    :  	CVE-2022-29968    :   7.8       :   STAT/PACK      :   Exploit (Snyk: SNYK-UNMANAGED-TORVALDSLINUX-3006622 (S) / Github: Mr-xn_Penetration_Testing_POC (G) WhooAmii_POC_to_review (G) jprx_CVE-2022-29968 (G) manas3c_CVE-POC (G) nomi-sec_PoC-in-GitHub (G) xuetusummer_Penetration_Testing_POC (G))
	kernel              :   4.14.105    :  	CVE-2022-29581    :   7.8       :   STAT/PACK      :   Exploit (Github: Nidhi77777_linux-4.19.72_CVE-2022-29581 (G) WhooAmii_POC_to_review (G) manas3c_CVE-POC (G) nidhi7598_linux-4.19.72_CVE-2022-29581 (G) nidhihcl_linux-4.19.72_CVE-2022-29581 (G) nomi-sec_PoC-in-GitHub (G))
	kernel              :   4.14.105    :  	CVE-2022-27666    :   7.8       :   STAT/PACK      :   Exploit (Github: Albocoder_cve-2022-27666-exploits (G) CVEDB_awesome-cve-repo (G) CVEDB_top (G) Ch4nc3n_PublicExploitation (G) JERRY123S_all-poc (G) JlSakuya_Linux-Privilege-Escalation-Exploits (G) Metarget_metarget (G) Mr-xn_Penetration_Testing_POC (G) WhooAmii_POC_to_review (G) bsauce_kernel-exploit-factory (G) bsauce_kernel-security-learning (G) cyberanand1337x_bug-bounty-2022 (G) hktalent_TOP (G) j4k0m_really-good-cybersec (G) kdn111_linux-kernel-exploitation (G) khanhdn111_linux-kernel-exploitation (G) khanhdz-06_linux-kernel-exploitation (G) khanhdz191_linux-kernel-exploitation (G) khanhhdz_linux-kernel-exploitation (G) khanhhdz06_linux-kernel-exploitation (G) khanhnd123_linux-kernel-exploitation (G) manas3c_CVE-POC (G) nomi-sec_PoC-in-GitHub (G) plummm_CVE-2022-27666 (G) weeka10_-hktalent-TOP (G) xairy_linux-kernel-exploitation (G) xuetusummer_Penetration_Testing_POC (G))
	kernel              :   4.14.105    :  	CVE-2022-25265    :   7.8       :   STAT/PACK      :   Exploit (Github: nomi-sec_PoC-in-GitHub (G) x0reaxeax_exec-prot-bypass (G))
	kernel              :   4.14.105    :  	CVE-2022-1011     :   7.8       :   STAT/PACK      :   Exploit (PSS: 166772/Linux-FUSE-Use-After-Free.html (P) / Github: PazDak_feathers-macos-detections (G) nomi-sec_PoC-in-GitHub (G) xkaneiki_CVE-2022-1011 (G))
	kernel              :   4.14.105    :  	CVE-2022-0492     :   7.8       :   STAT/PACK      :   Exploit (Github: JadenQ_Cloud-Computing-Security-ProjectPage (G) LeoPer02_IDS-Dataset (G) Metarget_metarget (G) PaloAltoNetworks_can-ctr-escape-cve-2022-0492 (G) SPuerBRead_shovel (G) SgtMate_container_escape_showcase (G) SofianeHamlaoui_CVE-2022-0492-Checker (G) T1erno_CVE-2022-0492-Docker-Breakout-Checker-and-PoC (G) Trinadh465_device_renesas_kernel_AOSP10_r33_CVE-2022-0492 (G) WhooAmii_POC_to_review (G) adavarski_HomeLab-Proxmox-k8s-DevSecOps-playground (G) adavarski_HomeLab-k8s-DevSecOps-playground (G) bashofmann_hacking-kubernetes (G) bigpick_cve-reading-list (G) cdk-team_CDK (G) chenaotian_CVE-2022-0492 (G) hardenedvault_ved (G) kvesta_vesta (G) manas3c_CVE-POC (G) marksowell_my-stars (G) marksowell_starred (G) marksowell_stars (G) nomi-sec_PoC-in-GitHub (G) puckiestyle_CVE-2022-0492 (G) sam8k_Dynamic-and-Static-Analysis-of-SOUPs (G) soosmile_POC (G) ssst0n3_ssst0n3 (G) teamssix_container-escape-check (G) ttauveron_cheatsheet (G) yoeelingBin_CVE-2022-0492-Container-Escape (G))
	kernel              :   4.14.105    :  	CVE-2021-42008    :   7.8       :   STAT/PACK      :   Exploit (Github: 0xdevil_CVE-2021-42008 (G) Al1ex_LinuxEelvation (G) BachoSeven_stellestelline (G) JlSakuya_Linux-Privilege-Escalation-Exploits (G) WhooAmii_POC_to_review (G) bcoles_kasld (G) bsauce_kernel-exploit-factory (G) bsauce_kernel-security-learning (G) hardenedvault_ved (G) kdn111_linux-kernel-exploitation (G) khanhdn111_linux-kernel-exploitation (G) khanhdz-06_linux-kernel-exploitation (G) khanhdz191_linux-kernel-exploitation (G) khanhhdz_linux-kernel-exploitation (G) khanhhdz06_linux-kernel-exploitation (G) khanhnd123_linux-kernel-exploitation (G) nomi-sec_PoC-in-GitHub (G) numanturle_CVE-2021-42008 (G) soosmile_POC (G) xairy_linux-kernel-exploitation (G))
	kernel              :   4.14.105    :  	CVE-2021-3715     :   7.8       :   STAT/PACK      :   Exploit (Github: Markakd_CVE-2022-2588 (G) Markakd_GREBE (G) Markakd_kernel_exploit (G) VoidCybersec_thatone (G) bsauce_kernel-exploit-factory (G) dom4570_CVE-2022-2588 (G) kdn111_linux-kernel-exploitation (G) khanhdn111_linux-kernel-exploitation (G) khanhdz-06_linux-kernel-exploitation (G) khanhdz191_linux-kernel-exploitation (G) khanhhdz_linux-kernel-exploitation (G) khanhhdz06_linux-kernel-exploitation (G) khanhnd123_linux-kernel-exploitation (G) xairy_linux-kernel-exploitation (G))
	kernel              :   4.14.105    :  	CVE-2021-3612     :   7.8       :   STAT/PACK      :   Exploit (Github: actions-marketplace-validations_doshyt_cve-monitor (G))
	kernel              :   4.14.105    :  	CVE-2021-3444     :   7.8       :   STAT/PACK      :   Exploit (Github: Wi1L-Y_News (G))
	kernel              :   4.14.105    :  	CVE-2021-33909 (V):   7.8       :   STAT/PACK      :   Exploit (PSS: 163621/Sequoia-A-Deep-Root-In-Linuxs-Filesystem-Layer.html (L) / Github: ChoKyuWon_exploit_articles (G) ChrisTheCoolHut_CVE-2021-33909 (G) H0j3n_EzpzCheatSheet (G) Liang2580_CVE-2021-33909 (G) Mr-xn_Penetration_Testing_POC (G) baerwolf_cve-2021-33909 (G) bbinfosec43_CVE-2021-33909 (G) gitezri_LinuxVulnerabilities (G) hac425xxx_heap-exploitation-in-real-world (G) hardenedvault_ved (G) huike007_penetration_poc (G) joydo_CVE-Writeups (G) kaosagnt_ansible-everyday (G) kdn111_linux-kernel-exploitation (G) khanhdn111_linux-kernel-exploitation (G) khanhdz-06_linux-kernel-exploitation (G) khanhdz191_linux-kernel-exploitation (G) khanhhdz_linux-kernel-exploitation (G) khanhhdz06_linux-kernel-exploitation (G) khanhnd123_linux-kernel-exploitation (G) knewbury01_codeql-workshop-integer-conversion (G) makoto56_penetration-suite-toolkit (G) nomi-sec_PoC-in-GitHub (G) sfowl_deep-directory (G) winterwolf32_CVE-S---Penetration_Testing_POC- (G) xairy_linux-kernel-exploitation (G) xuetusummer_Penetration_Testing_POC (G))
	kernel              :   4.14.105    :  	CVE-2021-3347     :   7.8       :   STAT/PACK      :   Exploit (Github: WhooAmii_POC_to_review (G) manas3c_CVE-POC (G) nanopathi_linux-4.19.72_CVE-2021-3347 (G) nomi-sec_PoC-in-GitHub (G))
	kernel              :   4.14.105    :  	CVE-2021-33034    :   7.8       :   STAT/PACK      :   Exploit (Github: Trinadh465_device_renesas_kernel_AOSP10_r33_CVE-2021-33034 (G) WhooAmii_POC_to_review (G) nomi-sec_PoC-in-GitHub (G))
	kernel              :   4.14.105    :  	CVE-2021-27365    :   7.8       :   STAT/PACK      :   Exploit (linux-exploit-suggester / Github: JlSakuya_Linux-Privilege-Escalation-Exploits (G) aaronxie55_Presentation2_Markdown (G) c4pt000_kernel-5.11.6-expSEHDsec-HAXM-cgroup-virtio-nvidia-amd-kaliwifi (G) eeenvik1_scripts_for_YouTrack (G) gipi_cve-cemetery (G) kdn111_linux-kernel-exploitation (G) khanhdn111_linux-kernel-exploitation (G) khanhdz-06_linux-kernel-exploitation (G) khanhdz191_linux-kernel-exploitation (G) khanhhdz_linux-kernel-exploitation (G) khanhhdz06_linux-kernel-exploitation (G) khanhnd123_linux-kernel-exploitation (G) xairy_linux-kernel-exploitation (G))
	kernel              :   4.14.105    :  	CVE-2021-23134    :   7.8       :   STAT/PACK      :   Exploit (Github: kdn111_linux-kernel-exploitation (G) khanhdn111_linux-kernel-exploitation (G) khanhdz-06_linux-kernel-exploitation (G) khanhdz191_linux-kernel-exploitation (G) khanhhdz_linux-kernel-exploitation (G) khanhhdz06_linux-kernel-exploitation (G) khanhnd123_linux-kernel-exploitation (G) xairy_linux-kernel-exploitation (G))
	kernel              :   4.14.105    :  	CVE-2021-22555    :   7.8       :   STAT/PACK      :   Exploit (linux-exploit-suggester / EDB ID: 50135 / MSF: netfilter_xtables_heap_oob_write_priv_esc (L) / PSS: 163528/Linux-Kernel-Netfilter-Heap-Out-Of-Bounds-Write.html (D) / Github: Al1ex_LinuxEelvation (G) AndreevSemen_CVE-2022-0995 (G) AvavaAYA_ctf-writeup-collection (G) B0nfee_CVE-2022-0995 (G) Bonfee_CVE-2022-0995 (G) Ch4nc3n_PublicExploitation (G) ChoKyuWon_exploit_articles (G) JlSakuya_Linux-Privilege-Escalation-Exploits (G) JoneyJunior_cve-2021-22555 (G) Metarget_awesome-cloud-native-security (G) Metarget_metarget (G) Mr-xn_Penetration_Testing_POC (G) PIG-007_kernelAll (G) Snoopy-Sec_Localroot-ALL-CVE (G) WhooAmii_POC_to_review (G) YunDingLab_struct_sanitizer (G) adavarski_HomeLab-Proxmox-k8s-DevSecOps-playground (G) adavarski_HomeLab-k8s-DevSecOps-playground (G) arttnba3_D3CTF2023_d3kcache (G) atesemre_awesome-cloud-native-security (G) bcoles_kasld (G) bcoles_kernel-exploits (G) bsauce_kernel-exploit-factory (G) bsauce_kernel-security-learning (G) cgwalters_container-cve-2021-22555 (G) cpuu_LinuxKernelCVE (G) ctrsploit_ctrsploit (G) daletoniris_CVE-2021-22555-esc-priv (G) google_security-research (G) google_security-research_security_advisories_GHSA-xxx5-8mvq-3528 (G) hac425xxx_heap-exploitation-in-real-world (G) hacking-kubernetes_hacking-kubernetes.info (G) hardenedvault_ved (G) huike007_penetration_poc (G) j4k0m_really-good-cybersec (G) joydo_CVE-Writeups (G) kdn111_linux-kernel-exploitation (G) khanhdn111_linux-kernel-exploitation (G) khanhdz-06_linux-kernel-exploitation (G) khanhdz191_linux-kernel-exploitation (G) khanhhdz_linux-kernel-exploitation (G) khanhhdz06_linux-kernel-exploitation (G) khanhnd123_linux-kernel-exploitation (G) makoto56_penetration-suite-toolkit (G) manas3c_CVE-POC (G) masjohncook_netsec-project (G) nomi-sec_PoC-in-GitHub (G) reni2study_Cloud-Native-Security2 (G) ssst0n3_ctrsploit_archived (G) teamssix_container-escape-check (G) veritas501_CVE-2021-22555-PipeVersion (G) veritas501_pipe-primitive (G) winterwolf32_CVE-S---Penetration_Testing_POC- (G) xairy_linux-kernel-exploitation (G) xuetusummer_Penetration_Testing_POC (G) xyjl-ly_CVE-2021-22555-Exploit (G))
	kernel              :   4.14.105    :  	CVE-2021-20268    :   7.8       :   STAT/PACK      :   Exploit (Github: dylandreimerink_gobpfld (G))
	kernel              :   4.14.105    :  	CVE-2020-29661 (V):   7.8       :   STAT/PACK      :   Exploit (PSS: 160681/Linux-TIOCSPGRP-Broken-Locking.html (P))
	kernel              :   4.14.105    :  	CVE-2020-27786    :   7.8       :   STAT/PACK      :   Exploit (Github: c0ld21_ndays (G) kdn111_linux-kernel-exploitation (G) khanhdn111_linux-kernel-exploitation (G) khanhdz-06_linux-kernel-exploitation (G) khanhdz191_linux-kernel-exploitation (G) khanhhdz_linux-kernel-exploitation (G) khanhhdz06_linux-kernel-exploitation (G) khanhnd123_linux-kernel-exploitation (G) kiks7_CVE-2020-27786-Kernel-Exploit (G) xairy_linux-kernel-exploitation (G))
	kernel              :   4.14.105    :  	CVE-2020-25220    :   7.8       :   STAT/PACK      :   Exploit (Github: 404notf0und_CVE-Flow (G) alphaSeclab_sec-daily-2020 (G) kdn111_linux-kernel-exploitation (G) khanhdn111_linux-kernel-exploitation (G) khanhdz-06_linux-kernel-exploitation (G) khanhdz191_linux-kernel-exploitation (G) khanhhdz_linux-kernel-exploitation (G) khanhhdz06_linux-kernel-exploitation (G) khanhnd123_linux-kernel-exploitation (G) xairy_linux-kernel-exploitation (G))
	kernel              :   4.14.105    :  	CVE-2020-14386    :   7.8       :   STAT/PACK      :   Exploit (Github: 0xT11_CVE-POC (G) DNTYO_F5_Vulnerability (G) Metarget_awesome-cloud-native-security (G) Metarget_metarget (G) atesemre_awesome-cloud-native-security (G) brant-ruan_awesome-container-escape (G) cgwalters_cve-2020-14386 (G) developer3000S_PoC-in-GitHub (G) hacking-kubernetes_hacking-kubernetes.info (G) hectorgie_PoC-in-GitHub (G) kdn111_linux-kernel-exploitation (G) khanhdn111_linux-kernel-exploitation (G) khanhdz-06_linux-kernel-exploitation (G) khanhdz191_linux-kernel-exploitation (G) khanhhdz_linux-kernel-exploitation (G) khanhhdz06_linux-kernel-exploitation (G) khanhnd123_linux-kernel-exploitation (G) kruztw_CVE (G) neargle_my-re0-k8s-security (G) nomi-sec_PoC-in-GitHub (G) orgTestCodacy11KRepos110MB_repo-3574-my-re0-k8s-security (G) reni2study_Cloud-Native-Security2 (G) sderosiaux_every-single-day-i-tldr (G) soosmile_POC (G) source-xu_docker-vuls (G) taielab_awesome-hacking-lists (G) teamssix_container-escape-check (G) xairy_linux-kernel-exploitation (G))
	kernel              :   4.14.105    :  	CVE-2020-14381    :   7.8       :   STAT/PACK      :   Exploit (Github: kdn111_linux-kernel-exploitation (G) khanhdn111_linux-kernel-exploitation (G) khanhdz-06_linux-kernel-exploitation (G) khanhdz191_linux-kernel-exploitation (G) khanhhdz_linux-kernel-exploitation (G) khanhhdz06_linux-kernel-exploitation (G) khanhnd123_linux-kernel-exploitation (G) nanopathi_linux-4.19.72_CVE-2020-14381 (G) nomi-sec_PoC-in-GitHub (G) xairy_linux-kernel-exploitation (G))
	kernel              :   4.14.105    :  	CVE-2020-14356    :   7.8       :   STAT/PACK      :   Exploit (Github: 404notf0und_CVE-Flow (G) ShaikUsaf_linux-4.19.72_CVE-2020-14356 (G) alphaSeclab_sec-daily-2020 (G) kdn111_linux-kernel-exploitation (G) khanhdn111_linux-kernel-exploitation (G) khanhdz-06_linux-kernel-exploitation (G) khanhdz191_linux-kernel-exploitation (G) khanhhdz_linux-kernel-exploitation (G) khanhhdz06_linux-kernel-exploitation (G) khanhnd123_linux-kernel-exploitation (G) xairy_linux-kernel-exploitation (G))
	kernel              :   4.14.105    :  	CVE-2020-10757    :   7.8       :   STAT/PACK      :   Exploit (Github: ShaikUsaf_linux-4.19.72_CVE-2020-10757 (G) nomi-sec_PoC-in-GitHub (G))
	kernel              :   4.14.105    :  	CVE-2019-7221     :   7.8       :   STAT/PACK      :   Exploit (PSS: 151713/KVM-VMX-Preemption-Timer-Use-After-Free.html (P) / Github: torvalds_linux_commits_master_arch_x86_kvm (G))
	kernel              :   4.14.105    :  	CVE-2019-19816    :   7.8       :   STAT/PACK      :   Exploit (Github: bobfuzzer_CVE_tree_master_CVE-2019-19816 (G))
	kernel              :   4.14.105    :  	CVE-2019-19241    :   7.8       :   STAT/PACK      :   Exploit (EDB ID: 47779 / PSS: 155669/Linux-sendmsg-Privilege-Escalation.html (P))
	kernel              :   4.14.105    :  	CVE-2019-14835    :   7.8       :   STAT/PACK      :   Exploit (Github: alphaSeclab_sec-daily-2019 (G) kaosagnt_ansible-everyday (G))
	kernel              :   4.14.105    :  	CVE-2019-13272 (V):   7.8       :   STAT/PACK      :   Exploit (linux-exploit-suggester / EDB ID: 47133 / MSF: ptrace_traceme_pkexec_helper (L) / PSS: 165051/Linux-Kernel-5.1.x-PTRACE_TRACEME-pkexec-Local-Privilege-Escalation.html (L) 153663/Linux-PTRACE_TRACEME-Broken-Permission-Object-Lifetime-Handling.html (P) 156929/Linux-PTRACE_TRACEME-Local-Root.html (L) / Github: 0xMrNiko_Awesome-Red-Teaming (G) 0xT11_CVE-POC (G) Al1ex_LinuxEelvation (G) Amar224_Pentest-Tools (G) AnonVulc_Pentest-Tools (G) CVEDB_awesome-cve-repo (G) CVEDB_top (G) CnHack3r_Penetration_PoC (G) Cyc1eC_CVE-2019-13272 (G) De4dCr0w_Linux-kernel-EoP-exp (G) Getshell_LinuxTQ (G) GgKendall_secureCodingDemo (G) H0j3n_EzpzCheatSheet (G) H1CH444MREB0RN_PenTest-free-tools (G) HaleyWei_POC-available (G) Huandtx_CVE-2019-13272 (G) JERRY123S_all-poc (G) JlSakuya_Linux-Privilege-Escalation-Exploits (G) Mehedi-Babu_pentest_tools_repo (G) Mr-xn_Penetration_Testing_POC (G) ONQLin_OS-CourseDesign (G) Offensive-Penetration-Security_OPSEC-Hall-of-fame (G) RashmikaEkanayake_Privilege-Escalation-CVE-2019-13272- (G) S3cur3Th1sSh1t_Pentest-Tools (G) SexyBeast233_SecBooks (G) Snoopy-Sec_Localroot-ALL-CVE (G) Tharana_Exploiting-a-Linux-kernel-vulnerability (G) Tharana_vulnerability-exploitation (G) Waseem27-art_ART-TOOLKIT (G) YIXINSHUWU_Penetration_Testing_POC (G) YellowVeN0m_Pentesters-toolbox (G) alphaSeclab_sec-daily-2019 (G) anoaghost_Localroot_Compile (G) babyshen_CVE-2019-13272 (G) bcoles_kernel-exploits (G) bigbigliang-malwarebenchmark_cve-2019-13272 (G) cedelasen_htb-laboratory (G) chorankates_Irked (G) cyberanand1337x_bug-bounty-2022 (G) datntsec_CVE-2019-13272 (G) developer3000S_PoC-in-GitHub (G) fei9747_LinuxEelvation (G) fengjixuchui_RedTeamer (G) go-bi_go-bi-soft (G) hack-parthsharma_Pentest-Tools (G) hasee2018_Penetration_Testing_POC (G) hectorgie_PoC-in-GitHub (G) hktalent_TOP (G) huike007_penetration_poc (G) huike007_poc (G) icecliffs_Linux-For-Root (G) jana30116_CVE-2019-13272-Local-Privilege-Escalation (G) jared1981_More-Pentest-Tools (G) jas502n_CVE-2019-13272 (G) jiayy_android_vuln_poc-exp (G) karlhat_Ksplice-demo (G) lnick2023_nicenice (G) merlinepedra_Pentest-Tools (G) merlinepedra25_Pentest-Tools (G) merlinepedra25_Pentest-Tools-1 (G) n3t1nv4d3_kernel-exploits (G) nitishbadole_Pentest_Tools (G) nu11secur1ty_CVE-mitre (G) oneoy_CVE-2019-13272 (G) password520_Penetration_PoC (G) password520_RedTeamer (G) pathakabhi24_Pentest-Tools (G) pjgmonteiro_Pentest-tools (G) polosec_CVE-2019-13272 (G) pwnCmndr_LinuxPrivEsc (G) qazbnm456_awesome-cve-poc (G) rakjong_LinuxElevation (G) retr0-13_Pentest-Tools (G) severnake_Pentest-Tools (G) sumedhaDharmasena_-Kernel-ptrace-c-mishandles-vulnerability-CVE-2019-13272 (G) teddy47_CVE-2019-13272---Documentation (G) theyoge_AD-Pentesting-Tools (G) weeka10_-hktalent-TOP (G) winterwolf32_CVE-S---Penetration_Testing_POC- (G) xbl3_awesome-cve-poc_qazbnm456 (G) xuetusummer_Penetration_Testing_POC (G) yedada-wei_- (G) yedada-wei_gongkaishouji (G) (X))
	kernel              :   4.14.105    :  	CVE-2018-6555     :   7.8       :   STAT/PACK      :   Exploit (Github: kdn111_linux-kernel-exploitation (G) khanhdn111_linux-kernel-exploitation (G) khanhdz-06_linux-kernel-exploitation (G) khanhdz191_linux-kernel-exploitation (G) khanhhdz_linux-kernel-exploitation (G) khanhhdz06_linux-kernel-exploitation (G) khanhnd123_linux-kernel-exploitation (G) xairy_linux-kernel-exploitation (G))
	kernel              :   4.14.105    :  	CVE-2018-18281    :   7.8       :   STAT/PACK      :   Exploit (PSS: 150001/Linux-mremap-TLB-Flush-Too-Late.html (P) / Github: jiayy_android_vuln_poc-exp (G) kdn111_linux-kernel-exploitation (G) khanhdn111_linux-kernel-exploitation (G) khanhdz-06_linux-kernel-exploitation (G) khanhdz191_linux-kernel-exploitation (G) khanhhdz_linux-kernel-exploitation (G) khanhhdz06_linux-kernel-exploitation (G) khanhnd123_linux-kernel-exploitation (G) xairy_linux-kernel-exploitation (G))
	kernel              :   4.14.105    :  	CVE-2018-12233    :   7.8       :   STAT/PACK      :   Exploit (Github: shankarapailoor_moonshine (G))
	kernel              :   4.14.105    :  	CVE-2016-2854     :   7.8       :   STAT/PACK      :   Exploit (EDB ID: 41761 / PSS: 141914/AUFS-Ubuntu-15.10-Privilege-Escalation.html (P))
	kernel              :   4.14.105    :  	CVE-2016-2853     :   7.8       :   STAT/PACK      :   Exploit (EDB ID: 41761 / PSS: 141914/AUFS-Ubuntu-15.10-Privilege-Escalation.html (P))
	kernel              :   4.14.105    :  	CVE-2015-0570     :   7.8       :   STAT/PACK      :   Exploit (Github: R0B1NL1N_linux-kernel-exploitation (G) Technoashofficial_kernel-exploitation-linux (G) kdn111_linux-kernel-exploitation (G) khanhdn111_linux-kernel-exploitation (G) khanhdz-06_linux-kernel-exploitation (G) khanhdz191_linux-kernel-exploitation (G) khanhhdz_linux-kernel-exploitation (G) khanhhdz06_linux-kernel-exploitation (G) khanhnd123_linux-kernel-exploitation (G) skbasava_Linux-Kernel-exploit (G) xairy_linux-kernel-exploitation (G))
	kernel              :   4.14.105    :  	CVE-2015-0569     :   7.8       :   STAT/PACK      :   Exploit (EDB ID: 39308 / PSS: 135372/Linux-Kernel-prima-WLAN-Driver-Heap-Overflow.html (P) / Github: tangsilian_android-vuln (G))
	glibc               :   2.27        :  	CVE-2021-3999     :   7.8       :   STAT           :   Exploit (Github: flexiondotorg_CNCF-02 (G) maxim12z_ECommerce (G) rootameen_vulpine (G))
	glibc               :   2.27        :  	CVE-2019-6488     :   7.8       :   STAT           :   Exploit (Github: flyrev_security-scan-ci-presentation (G))
	glibc               :   2.27        :  	CVE-2018-11237    :   7.8       :   STAT           :   Exploit (PSS: 147870/GNU-glibc-Local-Buffer-Overflow.html (P) / Github: flyrev_security-scan-ci-presentation (G) simonsdave_clair-cicd (G))
	zlib                :   1.2.11      :  	CVE-2018-25032    :   7.5       :   STAT/PACK      :   Exploit (Github: ZipArchive_ZipArchive (G) chainguard-dev_zlib-patch-demo (G) gatecheckdev_gatecheck (G) isgo-golgo13_gokit-gorillakit-enginesvc (G) mario206_UnityReleaseNotes-latest (G) yeforriak_snyk-to-cve (G))
	php                 :   7.2.16      :  	CVE-2020-7067     :   7.5       :   STAT           :   Exploit (Github: 0xbigshaq_php7-internals (G) imhunterand_hackerone-publicy-disclosed (G) vincd_search-cve (G))
	openssl             :   1.1.1b      :  	CVE-2023-2650     :   7.5       :   STAT/UEMU      :   Exploit (Github: hshivhare67_OpenSSL_1.1.1g_CVE-2023-2650 (G) nomi-sec_PoC-in-GitHub (G))
	openssl             :   1.1.1b      :  	CVE-2023-0464     :   7.5       :   STAT/UEMU      :   Exploit (Github: 1g-v_DevSec_Docker_lab (G) Trinadh465_Openssl_1.1.1g_CVE-2023-0464 (G) cloudogu_ces-build-lib (G) nomi-sec_PoC-in-GitHub (G) ortelius_ms-textfile-crud (G))
	openssl             :   1.1.1b      :  	CVE-2023-0215     :   7.5       :   STAT/UEMU      :   Exploit (Github: Tuttu7_Yum-command (G) bluesentinelsec_landing-zone (G) nidhi7598_OPENSSL_1.0.2_G2.5_CVE-2023-0215 (G) nidhi7598_OPENSSL_1.1.1g_G3_CVE-2023-0215 (G) nomi-sec_PoC-in-GitHub (G) rootameen_vulpine (G))
	openssl             :   1.1.1b      :  	CVE-2022-4450     :   7.5       :   STAT/UEMU      :   Exploit (Github: Tuttu7_Yum-command (G) bluesentinelsec_landing-zone (G) nidhi7598_OPENSSL_1.1.1g_G3_CVE-2022-4450 (G) nomi-sec_PoC-in-GitHub (G) peng-hui_CarpetFuzz (G) rootameen_vulpine (G) waugustus_CarpetFuzz (G) waugustus_waugustus (G))
	openssl             :   1.1.1b      :  	CVE-2022-0778     :   7.5       :   STAT/UEMU      :   Exploit (Snyk: SNYK-UNMANAGED-OPENSSL-2426984 (S) / PSS: 167344/OpenSSL-1.0.2-1.1.1-3.0-BN_mod_sqrt-Infinite-Loop.html (P) / Github: 0xUhaw_CVE-2022-0778 (G) BobTheShoplifter_CVE-2022-0778-POC (G) CVEDB_awesome-cve-repo (G) CVEDB_top (G) EnableSecurity_awesome-rtc-hacking (G) JERRY123S_all-poc (G) Mr-xn_Penetration_Testing_POC (G) Mrlucas5550100_PoC-CVE-2022-0778- (G) SnailDev_github-hot-hub (G) WhooAmii_POC_to_review (G) actions-marketplace-validations_neuvector_scan-action (G) bashofmann_neuvector-image-scan-action (G) cyberanand1337x_bug-bounty-2022 (G) drago-96_CVE-2022-0778 (G) fdl66_openssl-1.0.2u-fix-cve (G) gatecheckdev_gatecheck (G) halon_changelog (G) hktalent_TOP (G) isgo-golgo13_gokit-gorillakit-enginesvc (G) jkakavas_CVE-2022-0778-POC (G) jmartinezl_jmartinezl (G) jntass_TASSL-1.1.1 (G) lonnyzhang423_github-hot-hub (G) manas3c_CVE-POC (G) neuvector_scan-action (G) nomi-sec_PoC-in-GitHub (G) soosmile_POC (G) spaquet_docker-alpine-mailcatcher (G) tianocore-docs_ThirdPartySecurityAdvisories (G) weeka10_-hktalent-TOP (G) wllm-rbnt_asn1template (G) xuetusummer_Penetration_Testing_POC (G) yywing_cve-2022-0778 (G))
	openssl             :   1.1.1b      :  	CVE-2021-23840    :   7.5       :   STAT/UEMU      :   Exploit (Github: falk-werner_cve-check (G) fdl66_openssl-1.0.2u-fix-cve (G) fredrkl_trivy-demo (G) isgo-golgo13_gokit-gorillakit-enginesvc (G) jntass_TASSL-1.1.1k (G) thecyberbaby_Trivy-by-AquaSecurity (G) thecyberbaby_Trivy-by-aquaSecurity (G) vinamra28_tekton-image-scan-trivy (G))
	libcurl             :   7.64.0      :  	CVE-2020-8286     :   7.5       :   STAT           :   Exploit (Github: YaleSpinup_ecr-api (G) salrashid123_envoy_mtls (G))
	kernel              :   4.14.105    :  	CVE-2022-36946    :   7.5       :   STAT/PACK      :   Exploit (Github: Mr-xn_Penetration_Testing_POC (G) Pwnzer0tt1_CVE-2022-36946 (G) Satheesh575555_linux-4.19.72_CVE-2022-36946 (G) WhooAmii_POC_to_review (G) XmasSnowISBACK_CVE-2022-36946 (G) manas3c_CVE-POC (G) nik012003_nik012003 (G) nomi-sec_PoC-in-GitHub (G) xuetusummer_Penetration_Testing_POC (G))
	kernel              :   4.14.105    :  	CVE-2021-45485 (V):   7.5       :   STAT/PACK      :   Exploit (Github: Satheesh575555_linux-4.19.72_CVE-2021-45485 (G) WhooAmii_POC_to_review (G) nomi-sec_PoC-in-GitHub (G))
	kernel              :   4.14.105    :  	CVE-2019-11479    :   7.5       :   STAT/PACK      :   Exploit (Github: hightemp_docLinux (G) kaosagnt_ansible-everyday (G) misanthropos_FFFFM (G))
	kernel              :   4.14.105    :  	CVE-2019-11478    :   7.5       :   STAT/PACK      :   Exploit (Github: hightemp_docLinux (G) kaosagnt_ansible-everyday (G) misanthropos_FFFFM (G))
	kernel              :   4.14.105    :  	CVE-2019-11477    :   7.5       :   STAT/PACK      :   Exploit (Github: 0xT11_CVE-POC (G) developer3000S_PoC-in-GitHub (G) fengjian_kpatch-sack-panic (G) hectorgie_PoC-in-GitHub (G) hightemp_docLinux (G) kaosagnt_ansible-everyday (G) lucassbeiler_linux_hardening_arsenal (G) misanthropos_FFFFM (G) sasqwatch_cve-2019-11477-poc (G) sonoransun_tcp_sack_fix (G))
	kernel              :   4.14.105    :  	CVE-2019-10639    :   7.5       :   STAT/PACK      :   Exploit (Github: bcoles_kasld (G))
	kernel              :   4.14.105    :  	CVE-2018-5391     :   7.5       :   STAT/PACK      :   Exploit (Github: chetanshirke_my_ref (G))
	kernel              :   4.14.105    :  	CVE-2018-5390     :   7.5       :   STAT/PACK      :   Exploit (Github: hiboma_hiboma (G) lnick2023_nicenice (G) qazbnm456_awesome-cve-poc (G) xbl3_awesome-cve-poc_qazbnm456 (G))
	kernel              :   4.14.105    :  	CVE-2017-1000410  :   7.5       :   STAT/PACK      :   Exploit (Github: JeffroMF_awesome-bluetooth-security321 (G) engn33r_awesome-bluetooth-security (G))
	glibc               :   2.27        :  	CVE-2021-38604    :   7.5       :   STAT           :   Exploit (Github: dispera_giant-squid (G) nedenwalker_spring-boot-app-using-gradle (G) nedenwalker_spring-boot-app-with-log4j-vuln (G) thegeeklab_audit-exporter (G))
	glibc               :   2.27        :  	CVE-2021-3326     :   7.5       :   STAT           :   Exploit (Github: dispera_giant-squid (G) domyrtille_interview_project (G) epequeno_devops-demo (G) nedenwalker_spring-boot-app-using-gradle (G) nedenwalker_spring-boot-app-with-log4j-vuln (G) onzack_trivy-multiscanner (G))
	glibc               :   2.27        :  	CVE-2019-9192     :   7.5       :   STAT           :   Exploit (Github: CKL2022_meta-timesys (G) TimesysGit_meta-timesys (G) cdupuis_image-api (G) garethr_snykout (G) renren82_timesys (G) siva7080_meta-timesys (G) xlloss_meta-timesys (G))
	glibc               :   2.27        :  	CVE-2018-20796    :   7.5       :   STAT           :   Exploit (Github: cdupuis_image-api (G) flyrev_security-scan-ci-presentation (G) garethr_snykout (G))
	glibc               :   2.27        :  	CVE-2018-19591    :   7.5       :   STAT           :   Exploit (Github: simonsdave_clair-cicd (G))
	glibc               :   2.27        :  	CVE-2009-5155     :   7.5       :   STAT           :   Exploit (Github: flyrev_security-scan-ci-presentation (G) iakovmarkov_prometheus-vuls-exporter (G) nedenwalker_spring-boot-app-using-gradle (G) nedenwalker_spring-boot-app-with-log4j-vuln (G) thegeeklab_audit-exporter (G))
	openssl             :   1.1.1b      :  	CVE-2023-0286     :   7.4       :   STAT/UEMU      :   Exploit (Github: Tuttu7_Yum-command (G) dejanb_guac-rs (G) nidhi7598_OPENSSL_1.1.11g_G3_CVE-2023-0286 (G) nidhi7598_OPENSSL_1.1.1g_G3_CVE-2023-0286 (G) nomi-sec_PoC-in-GitHub (G) xkcd-2347_trust-api (G))
	openssl             :   1.1.1b      :  	CVE-2021-3712     :   7.4       :   STAT/UEMU      :   Exploit (Github: Frannc0_test2 (G) NeXTLinux_griffon (G) anchore_grype (G) aymankhder_scanner-for-container (G) fdl66_openssl-1.0.2u-fix-cve (G) giantswarm_starboard-exporter (G) isgo-golgo13_gokit-gorillakit-enginesvc (G) jntass_TASSL-1.1.1 (G) leonov-av_scanvus (G) lucky-sideburn_secpod_wrap (G) metapull_attackfinder (G) tianocore-docs_ThirdPartySecurityAdvisories (G))
	openssl             :   1.1.1b      :  	CVE-2019-1543     :   7.4       :   STAT/UEMU      :   Exploit (Github: ANTONYOH_midterm_trivy (G) KorayAgaya_TrivyWeb (G) McLaouth_trivi (G) Mohzeela_external-secret (G) aquasecurity_trivy (G) candrapw_trivy (G) cloudogu_ces-build-lib (G) fhirfactory_pegacorn-scanner-trivy (G) fredrkl_trivy-demo (G) georgearce24_aquasecurity-trivy (G) immydestiny_trivy-file (G) jntass_TASSL-1.1.1k (G) justPray_1122 (G) kaisenlinux_trivy (G) krishna-commits_trivy (G) krishna-commits_trivy-test (G) mrodden_vyger (G) pottava_trivy-restapi (G) rafavinnce_trivy_0.27.1 (G) ronomon_crypto-async (G) siddharthraopotukuchi_trivy (G) simiyo_trivy (G) t31m0_Vulnerability-Scanner-for-Containers (G) thecyberbaby_Trivy-by-AquaSecurity (G) thecyberbaby_Trivy-by-aquaSecurity (G) umahari_security (G))
	kernel              :   4.14.105    :  	CVE-2020-25705    :   7.4       :   STAT/PACK      :   Exploit (Github: developer3000S_PoC-in-GitHub (G) hectorgie_PoC-in-GitHub (G) nanopathi_linux-4.19.72_CVE-2020-25705 (G) nomi-sec_PoC-in-GitHub (G) tdwyer_CVE-2020-25705 (G))
	kernel              :   4.14.105    :  	CVE-2020-25643    :   7.2       :   STAT/PACK      :   Exploit (Github: DNTYO_F5_Vulnerability (G))
	busybox             :   1.30.1      :  	CVE-2021-42386    :   7.2       :   STAT/PACK      :   Exploit (Github: isgo-golgo13_gokit-gorillakit-enginesvc (G))
	busybox             :   1.30.1      :  	CVE-2021-42385    :   7.2       :   STAT/PACK      :   Exploit (Github: isgo-golgo13_gokit-gorillakit-enginesvc (G))
	busybox             :   1.30.1      :  	CVE-2021-42384    :   7.2       :   STAT/PACK      :   Exploit (Github: isgo-golgo13_gokit-gorillakit-enginesvc (G))
	busybox             :   1.30.1      :  	CVE-2021-42382    :   7.2       :   STAT/PACK      :   Exploit (Github: isgo-golgo13_gokit-gorillakit-enginesvc (G))
	busybox             :   1.30.1      :  	CVE-2021-42381    :   7.2       :   STAT/PACK      :   Exploit (Github: isgo-golgo13_gokit-gorillakit-enginesvc (G))
	busybox             :   1.30.1      :  	CVE-2021-42380    :   7.2       :   STAT/PACK      :   Exploit (Github: isgo-golgo13_gokit-gorillakit-enginesvc (G))
	busybox             :   1.30.1      :  	CVE-2021-42379    :   7.2       :   STAT/PACK      :   Exploit (Github: isgo-golgo13_gokit-gorillakit-enginesvc (G))
	busybox             :   1.30.1      :  	CVE-2021-42378    :   7.2       :   STAT/PACK      :   Exploit (Github: isgo-golgo13_gokit-gorillakit-enginesvc (G))
	kernel              :   4.14.105    :  	CVE-2021-4204     :   7.1       :   STAT/PACK      :   Exploit (Github: Metarget_metarget (G) Mr-xn_Penetration_Testing_POC (G) WhooAmii_POC_to_review (G) kdn111_linux-kernel-exploitation (G) khanhdn111_linux-kernel-exploitation (G) khanhdz-06_linux-kernel-exploitation (G) khanhdz191_linux-kernel-exploitation (G) khanhhdz_linux-kernel-exploitation (G) khanhhdz06_linux-kernel-exploitation (G) khanhnd123_linux-kernel-exploitation (G) manas3c_CVE-POC (G) nomi-sec_PoC-in-GitHub (G) tr3ee_CVE-2021-4204 (G) xairy_linux-kernel-exploitation (G) xuetusummer_Penetration_Testing_POC (G))
	kernel              :   4.14.105    :  	CVE-2021-27364    :   7.1       :   STAT/PACK      :   Exploit (Github: aaronxie55_Presentation2_Markdown (G) c4pt000_kernel-5.11.6-expSEHDsec-HAXM-cgroup-virtio-nvidia-amd-kaliwifi (G) kdn111_linux-kernel-exploitation (G) khanhdn111_linux-kernel-exploitation (G) khanhdz-06_linux-kernel-exploitation (G) khanhdz191_linux-kernel-exploitation (G) khanhhdz_linux-kernel-exploitation (G) khanhhdz06_linux-kernel-exploitation (G) khanhnd123_linux-kernel-exploitation (G) xairy_linux-kernel-exploitation (G))
	kernel              :   4.14.105    :  	CVE-2023-35829    :   7         :   STAT/PACK      :   Exploit (Github: 20142995_sectool (G) apkc_CVE-2023-35829-poc (G) nomi-sec_PoC-in-GitHub (G) timb-machine_linux-malware (G))
	kernel              :   4.14.105    :  	CVE-2022-41222    :   7         :   STAT/PACK      :   Exploit (PSS: 168466/Linux-Stable-5.4-5.10-Use-After-Free-Race-Condition.html (P))
	kernel              :   4.14.105    :  	CVE-2022-29582    :   7         :   STAT/PACK      :   Exploit (Github: Ruia-ruia_CVE-2022-29582-Exploit (G) WhooAmii_POC_to_review (G) kdn111_linux-kernel-exploitation (G) khanhdn111_linux-kernel-exploitation (G) khanhdz-06_linux-kernel-exploitation (G) khanhdz191_linux-kernel-exploitation (G) khanhhdz_linux-kernel-exploitation (G) khanhhdz06_linux-kernel-exploitation (G) khanhnd123_linux-kernel-exploitation (G) manas3c_CVE-POC (G) nomi-sec_PoC-in-GitHub (G) tr3ss_gofetch (G) xairy_linux-kernel-exploitation (G))
	kernel              :   4.14.105    :  	CVE-2022-1734     :   7         :   STAT/PACK      :   Exploit (Github: torvalds_linux_commit_d270453a0d9ec10bb8a802a142fb1b3601a83098 (G))
	kernel              :   4.14.105    :  	CVE-2021-44733    :   7         :   STAT/PACK      :   Exploit (Github: WhooAmii_POC_to_review (G) joydo_CVE-Writeups (G) kdn111_linux-kernel-exploitation (G) khanhdn111_linux-kernel-exploitation (G) khanhdz-06_linux-kernel-exploitation (G) khanhdz191_linux-kernel-exploitation (G) khanhhdz_linux-kernel-exploitation (G) khanhhdz06_linux-kernel-exploitation (G) khanhnd123_linux-kernel-exploitation (G) nomi-sec_PoC-in-GitHub (G) pjlantz_optee-qemu (G) pjlantz_optee-qemu_blob_main_README.md (G) soosmile_POC (G) xairy_linux-kernel-exploitation (G))
	kernel              :   4.14.105    :  	CVE-2021-4083     :   7         :   STAT/PACK      :   Exploit (PSS: 165504/Linux-Garbage-Collection-Memory-Corruption.html (P) / Github: advxrsary_vuln-scanner (G) sam8k_Dynamic-and-Static-Analysis-of-SOUPs (G))
	kernel              :   4.14.105    :  	CVE-2021-40490    :   7         :   STAT/PACK      :   Exploit (Github: Nivaskumark_CVE-2021-40490_kernel_v4.19.72 (G) sam8k_Dynamic-and-Static-Analysis-of-SOUPs (G))
	kernel              :   4.14.105    :  	CVE-2021-3609     :   7         :   STAT/PACK      :   Exploit (Github: kdn111_linux-kernel-exploitation (G) khanhdn111_linux-kernel-exploitation (G) khanhdz-06_linux-kernel-exploitation (G) khanhdz191_linux-kernel-exploitation (G) khanhhdz_linux-kernel-exploitation (G) khanhhdz06_linux-kernel-exploitation (G) khanhnd123_linux-kernel-exploitation (G) nrb547_kernel-exploitation_blob_main_cve-2021-3609_cve-2021-3609.md (G) xairy_linux-kernel-exploitation (G))
	kernel              :   4.14.105    :  	CVE-2021-32399    :   7         :   STAT/PACK      :   Exploit (Github: WhooAmii_POC_to_review (G) nanopathi_linux-4.19.72_CVE-2021-32399 (G) nomi-sec_PoC-in-GitHub (G))
	kernel              :   4.14.105    :  	CVE-2020-29370 (V):   7         :   STAT/PACK      :   Exploit (Github: nanopathi_linux-4.19.72_CVE-2020-29370 (G))
	kernel              :   4.14.105    :  	CVE-2020-25212    :   7         :   STAT/PACK      :   Exploit (Github: 404notf0und_CVE-Flow (G))
	kernel              :   4.14.105    :  	CVE-2019-18683    :   7         :   STAT/PACK      :   Exploit (Github: 0xT11_CVE-POC (G) De4dCr0w_Linux-kernel-EoP-exp (G) Limesss_cve-2019-18683 (G) developer3000S_PoC-in-GitHub (G) hectorgie_PoC-in-GitHub (G) kdn111_linux-kernel-exploitation (G) khanhdn111_linux-kernel-exploitation (G) khanhdz-06_linux-kernel-exploitation (G) khanhdz191_linux-kernel-exploitation (G) khanhhdz_linux-kernel-exploitation (G) khanhhdz06_linux-kernel-exploitation (G) khanhnd123_linux-kernel-exploitation (G) lnick2023_nicenice (G) qazbnm456_awesome-cve-poc (G) sanjana123-cloud_CVE-2019-18683 (G) xairy_linux-kernel-exploitation (G) xbl3_awesome-cve-poc_qazbnm456 (G))
	kernel              :   4.14.105    :  	CVE-2019-13233    :   7         :   STAT/PACK      :   Exploit (Github: Sec20-Paper310_Paper310 (G))
	kernel              :   4.14.105    :  	CVE-2019-11599    :   7         :   STAT/PACK      :   Exploit (EDB ID: 46781 / PSS: 152663/Linux-Missing-Lockdown.html (P) / Github: HaleyWei_POC-available (G) Sec20-Paper310_Paper310 (G))
	kernel              :   4.14.105    :  	CVE-2019-11486    :   7         :   STAT/PACK      :   Exploit (Github: Sec20-Paper310_Paper310 (G))
	glibc               :   2.27        :  	CVE-2020-1752     :   7         :   STAT           :   Exploit (Github: garethr_snykout (G))
	glibc               :   2.27        :  	CVE-2020-1751     :   7         :   STAT           :   Exploit (Github: Azure_container-scan (G) ExpLangcn_FuYao-Go (G) actions-marketplace-validations_Azure_container-scan (G) binxio_gcr-kritis-signer (G) drjhunter_container-scan (G) garethr_snykout (G))
	kernel              :   4.14.105    :  	CVE-2023-2002     :   6.8       :   STAT/PACK      :   Exploit (Snyk: SNYK-UNMANAGED-TORVALDSLINUX-5507220 (S) / Github: CVEDB_awesome-cve-repo (G) CVEDB_top (G) hktalent_TOP (G) lrh2000_CVE-2023-2002 (G) nomi-sec_PoC-in-GitHub (G))
	kernel              :   4.14.105    :  	CVE-2021-4203 (V) :   6.8       :   STAT/PACK      :   Exploit (Github: sam8k_Dynamic-and-Static-Analysis-of-SOUPs (G))
	kernel              :   4.14.105    :  	CVE-2023-28772    :   6.7       :   STAT/PACK      :   Exploit (Github: Satheesh575555_linux-4.1.15_CVE-2023-28772 (G) Trinadh465_linux-4.1.15_CVE-2023-28772 (G) hheeyywweellccoommee_linux-4.1.15_CVE-2023-28772-ipchu (G) hshivhare67_kernel_v4.1.15_CVE-2023-28772 (G) nidhi7598_linux-4.19.72_CVE-2023-28772 (G) nomi-sec_PoC-in-GitHub (G))
	kernel              :   4.14.105    :  	CVE-2022-2503     :   6.7       :   STAT/PACK      :   Exploit (Github: google_security-research_security_advisories_GHSA-6vq3-w69p-w63m (G))
	kernel              :   4.14.105    :  	CVE-2021-42739    :   6.7       :   STAT/PACK      :   Exploit (Github: JaskaranNarula_Host_Errata_Info (G))
	kernel              :   4.14.105    :  	CVE-2021-42327    :   6.7       :   STAT/PACK      :   Exploit (Github: WhooAmii_POC_to_review (G) docfate111_CVE-2021-42327 (G) kdn111_linux-kernel-exploitation (G) khanhdn111_linux-kernel-exploitation (G) khanhdz-06_linux-kernel-exploitation (G) khanhdz191_linux-kernel-exploitation (G) khanhhdz_linux-kernel-exploitation (G) khanhhdz06_linux-kernel-exploitation (G) khanhnd123_linux-kernel-exploitation (G) nomi-sec_PoC-in-GitHub (G) soosmile_POC (G) xairy_linux-kernel-exploitation (G))
	kernel              :   4.14.105    :  	CVE-2022-1015     :   6.6       :   STAT/PACK      :   Exploit (Github: H4K6_CVE-2023-0179-PoC (G) JlSakuya_Linux-Privilege-Escalation-Exploits (G) Mr-xn_Penetration_Testing_POC (G) TurtleARM_CVE-2023-0179-PoC (G) WhooAmii_POC_to_review (G) bsauce_kernel-exploit-factory (G) bsauce_kernel-security-learning (G) delsploit_CVE-2022-1015 (G) flexiondotorg_CNCF-02 (G) hardenedvault_ved (G) hktalent_TOP (G) kdn111_linux-kernel-exploitation (G) khanhdn111_linux-kernel-exploitation (G) khanhdz-06_linux-kernel-exploitation (G) khanhdz191_linux-kernel-exploitation (G) khanhhdz_linux-kernel-exploitation (G) khanhhdz06_linux-kernel-exploitation (G) khanhnd123_linux-kernel-exploitation (G) manas3c_CVE-POC (G) nomi-sec_PoC-in-GitHub (G) now4yreal_linux-kernel-vulnerabilities (G) now4yreal_linux-kernel-vulnerabilities-root-cause-analysis (G) pivik271_CVE-2022-1015 (G) pqlx_CVE-2022-1015 (G) pr0ln_bob_kern_exp1 (G) shuttterman_bob_kern_exp1 (G) wlswotmd_CVE-2022-1015 (G) xairy_linux-kernel-exploitation (G) xuetusummer_Penetration_Testing_POC (G) yaobinwen_robin_on_rails (G) ysanatomic_CVE-2022-1015 (G) zanezhub_CVE-2022-1015-1016 (G))
	php                 :   7.2.16      :  	CVE-2022-31629    :   6.5       :   STAT           :   Exploit (Github: WhooAmii_POC_to_review (G) manas3c_CVE-POC (G) nomi-sec_PoC-in-GitHub (G) silnex_CVE-2022-31629-poc (G))
	kernel              :   4.14.105    :  	CVE-2018-15572    :   6.5       :   STAT/PACK      :   Exploit (Github: codexlynx_hardware-attacks-state-of-the-art (G) elivepatch_livepatch-overlay (G))
	bzip2               :   1.0.6       :  	CVE-2016-3189     :   6.5       :   UEMU/PACK      :   Exploit (Github: actions-marketplace-validations_phonito_phonito-scanner-action (G) bubbleguuum_zypperdiff (G) genuinetools_reg (G) ngkz_my-lfs-setup (G) orgTestCodacy11KRepos110MB_repo-3654-reg (G) phonito_phonito-scanner-action (G) phonito_phonito-vulnerable-container (G) strongcourage_uafbench (G) tomwillfixit_alpine-cvecheck (G) yfoelling_yair (G))
	kernel              :   4.14.105    :  	CVE-2021-3573     :   6.4       :   STAT/PACK      :   Exploit (Github: hardenedvault_ved (G) kdn111_linux-kernel-exploitation (G) khanhdn111_linux-kernel-exploitation (G) khanhdz-06_linux-kernel-exploitation (G) khanhdz191_linux-kernel-exploitation (G) khanhhdz_linux-kernel-exploitation (G) khanhhdz06_linux-kernel-exploitation (G) khanhnd123_linux-kernel-exploitation (G) xairy_linux-kernel-exploitation (G))
	kernel              :   4.14.105    :  	CVE-2020-25211    :   6         :   STAT/PACK      :   Exploit (Github: 404notf0und_CVE-Flow (G))
	openssl             :   1.1.1b      :  	CVE-2022-4304     :   5.9       :   STAT/UEMU      :   Exploit (Github: Trinadh465_Openssl-1.1.1g_CVE-2022-4304 (G) Tuttu7_Yum-command (G) nomi-sec_PoC-in-GitHub (G))
	openssl             :   1.1.1b      :  	CVE-2021-4160     :   5.9       :   STAT/UEMU      :   Exploit (Github: actions-marketplace-validations_neuvector_scan-action (G) andrewd-sysdig_nodejs-helloworld (G) bashofmann_neuvector-image-scan-action (G) fdl66_openssl-1.0.2u-fix-cve (G) neuvector_scan-action (G) tianocore-docs_ThirdPartySecurityAdvisories (G))
	openssl             :   1.1.1b      :  	CVE-2021-3449     :   5.9       :   STAT/UEMU      :   Exploit (Github: AliceMongodin_NSAPool-PenTest (G) EdgeSecurityTeam_Vulnerability (G) FeFi7_attacking_embedded_linux (G) SF4bin_SEEKER_dataset (G) WhooAmii_POC_to_review (G) anquanscan_sec-tools (G) arindam0310018_04-Apr-2022-DevOps__Scan-Images-In-ACR-Using-Trivy (G) falk-werner_cve-check (G) fredrkl_trivy-demo (G) gitchangye_cve (G) isgo-golgo13_gokit-gorillakit-enginesvc (G) jntass_TASSL-1.1.1k (G) manas3c_CVE-POC (G) nomi-sec_PoC-in-GitHub (G) rnbochsr_yr_of_the_jellyfish (G) scriptzteam_glFTPd-v2.11ab-STABLE (G) soosmile_POC (G) taielab_awesome-hacking-lists (G) terorie_cve-2021-3449 (G) thecyberbaby_Trivy-by-AquaSecurity (G) thecyberbaby_Trivy-by-aquaSecurity (G) tianocore-docs_ThirdPartySecurityAdvisories (G) tzwlhack_Vulnerability (G) vinamra28_tekton-image-scan-trivy (G) yonhan3_openssl-cve (G))
	openssl             :   1.1.1b      :  	CVE-2021-23841    :   5.9       :   STAT/UEMU      :   Exploit (Github: Satheesh575555_Openssl_1_1_0_CVE-2021-23841 (G) Trinadh465_external_boringssl_openssl_1.1.0g_CVE-2021-23841 (G) WhooAmii_POC_to_review (G) arindam0310018_04-Apr-2022-DevOps__Scan-Images-In-ACR-Using-Trivy (G) falk-werner_cve-check (G) fdl66_openssl-1.0.2u-fix-cve (G) fredrkl_trivy-demo (G) isgo-golgo13_gokit-gorillakit-enginesvc (G) jntass_TASSL-1.1.1k (G) manas3c_CVE-POC (G) nomi-sec_PoC-in-GitHub (G) thecyberbaby_Trivy-by-AquaSecurity (G) thecyberbaby_Trivy-by-aquaSecurity (G) vinamra28_tekton-image-scan-trivy (G))
	openssl             :   1.1.1b      :  	CVE-2020-1971     :   5.9       :   STAT/UEMU      :   Exploit (Github: MBHudson_CVE-2020-1971 (G) Metztli_debian-openssl-1.1.1i (G) arindam0310018_04-Apr-2022-DevOps__Scan-Images-In-ACR-Using-Trivy (G) developer-guy_image-scanning-using-trivy-as-go-library (G) developer3000S_PoC-in-GitHub (G) fdl66_openssl-1.0.2u-fix-cve (G) fredrkl_trivy-demo (G) hectorgie_PoC-in-GitHub (G) jntass_TASSL-1.1.1k (G) nomi-sec_PoC-in-GitHub (G) scott-leung_tools (G) soosmile_POC (G) stevechanieee_-5-OpenSSL_Versioning (G) thecyberbaby_Trivy-by-AquaSecurity (G) thecyberbaby_Trivy-by-aquaSecurity (G) vinamra28_tekton-image-scan-trivy (G))
	libcurl             :   7.64.0      :  	CVE-2023-27536    :   5.9       :   STAT           :   Exploit (Github: 1g-v_DevSec_Docker_lab (G))
	libcurl             :   7.64.0      :  	CVE-2023-27535    :   5.9       :   STAT           :   Exploit (Github: 1g-v_DevSec_Docker_lab (G))
	kernel              :   4.14.105    :  	CVE-2020-28097    :   5.9       :   STAT/PACK      :   Exploit (Github: sam8k_Dynamic-and-Static-Analysis-of-SOUPs (G))
	kernel              :   4.14.105    :  	CVE-2018-12232 (V):   5.9       :   STAT/PACK      :   Exploit (Github: hiboma_hiboma (G) shankarapailoor_moonshine (G))
	kernel              :   4.14.105    :  	CVE-2018-11412    :   5.9       :   STAT/PACK      :   Exploit (EDB ID: 44832 / PSS: 148054/Linux-Kernel-ext4_read_inline_data-Memory-Corruption.html (P))
	kernel              :   4.14.105    :  	CVE-2018-1108     :   5.9       :   STAT/PACK      :   Exploit (PSS: 147423/Linux-RNG-Flaws.html (P))
	glibc               :   2.27        :  	CVE-2019-25013    :   5.9       :   STAT           :   Exploit (Github: YaleSpinup_ecr-api (G) brandoncamenisch_release-the-code-litecoin (G) dispera_giant-squid (G) domyrtille_interview_project (G) epequeno_devops-demo (G) nedenwalker_spring-boot-app-using-gradle (G) nedenwalker_spring-boot-app-with-log4j-vuln (G) onzack_trivy-multiscanner (G))
	glibc               :   2.27        :  	CVE-2015-8985     :   5.9       :   STAT           :   Exploit (Github: flyrev_security-scan-ci-presentation (G) mrash_afl-cve (G) nedenwalker_spring-boot-app-using-gradle (G) nedenwalker_spring-boot-app-with-log4j-vuln (G) yfoelling_yair (G))
	dnsmasq             :   2.80        :  	CVE-2020-25687    :   5.9       :   UEMU/PACK      :   Exploit (Github: AZ-X_pique (G) DNTYO_F5_Vulnerability (G) kaosagnt_ansible-everyday (G) klcheung99_CSCM28CW2 (G))
	dnsmasq             :   2.80        :  	CVE-2020-25683    :   5.9       :   UEMU/PACK      :   Exploit (Github: AZ-X_pique (G) DNTYO_F5_Vulnerability (G) kaosagnt_ansible-everyday (G) klcheung99_CSCM28CW2 (G))
	kernel              :   4.14.105    :  	CVE-2023-1998     :   5.6       :   STAT/PACK      :   Exploit (EDB ID: 51384 / Github: google_security-research_security_advisories_GHSA-mj4w-6495-6crx (G))
	kernel              :   4.14.105    :  	CVE-2020-14390    :   5.6       :   STAT/PACK      :   Exploit (Github: ZIllR0_Routers (G))
	kernel              :   4.14.105    :  	CVE-2019-7308 (V) :   5.6       :   STAT/PACK      :   Exploit (PSS: 151475/Linux-Insufficient-eBPF-Spectre-V1-Mitigation.html (P) / Github: CKExploits_pwnlinux (G) fengjixuchui_CPU-vulnerabiility-collections (G) houjingyi233_CPU-vulnerability-collections (G) kdn111_linux-kernel-exploitation (G) khanhdn111_linux-kernel-exploitation (G) khanhdz-06_linux-kernel-exploitation (G) khanhdz191_linux-kernel-exploitation (G) khanhhdz_linux-kernel-exploitation (G) khanhhdz06_linux-kernel-exploitation (G) khanhnd123_linux-kernel-exploitation (G) xairy_linux-kernel-exploitation (G))
	php                 :   7.2.16      :  	CVE-2022-31628    :   5.5       :   STAT           :   Exploit (Github: mdsnins_mdsnins (G))
	kernel              :   4.14.105    :  	CVE-2023-23455    :   5.5       :   STAT/PACK      :   Exploit (Github: alopresto_epss_api_demo (G) alopresto6m_epss_api_demo (G))
	kernel              :   4.14.105    :  	CVE-2023-23454    :   5.5       :   STAT/PACK      :   Exploit (Github: alopresto_epss_api_demo (G) alopresto6m_epss_api_demo (G))
	kernel              :   4.14.105    :  	CVE-2023-1249     :   5.5       :   STAT/PACK      :   Exploit (PSS: 171912/CentOS-Stream-9-Missing-Kernel-Security-Fix.html (L))
	kernel              :   4.14.105    :  	CVE-2022-42703 (V):   5.5       :   STAT/PACK      :   Exploit (Github: Squirre17_hbp-attack-demo (G) bcoles_kasld (G) fardeen-ahmed_Bug-bounty-Writeups (G) kdn111_linux-kernel-exploitation (G) khanhdn111_linux-kernel-exploitation (G) khanhdz-06_linux-kernel-exploitation (G) khanhdz191_linux-kernel-exploitation (G) khanhhdz_linux-kernel-exploitation (G) khanhhdz06_linux-kernel-exploitation (G) khanhnd123_linux-kernel-exploitation (G) nomi-sec_PoC-in-GitHub (G) pray77_CVE-2023-3640 (G) pray77_SCTF2023_kernelpwn (G) veritas501_hbp_attack_demo (G) xairy_linux-kernel-exploitation (G))
	kernel              :   4.14.105    :  	CVE-2022-41218    :   5.5       :   STAT/PACK      :   Exploit (Github: V4bel_CVE-2022-41218 (G) WhooAmii_POC_to_review (G) kdn111_linux-kernel-exploitation (G) khanhdn111_linux-kernel-exploitation (G) khanhdz-06_linux-kernel-exploitation (G) khanhdz191_linux-kernel-exploitation (G) khanhhdz_linux-kernel-exploitation (G) khanhhdz06_linux-kernel-exploitation (G) khanhnd123_linux-kernel-exploitation (G) manas3c_CVE-POC (G) nomi-sec_PoC-in-GitHub (G) xairy_linux-kernel-exploitation (G))
	kernel              :   4.14.105    :  	CVE-2022-25375    :   5.5       :   STAT/PACK      :   Exploit (Snyk: SNYK-UNMANAGED-TORVALDSLINUX-2407769 (S) / Github: WhooAmii_POC_to_review (G) manas3c_CVE-POC (G) nomi-sec_PoC-in-GitHub (G) soosmile_POC (G) szymonh_rndis-co (G) szymonh_szymonh (G))
	kernel              :   4.14.105    :  	CVE-2022-2318     :   5.5       :   STAT/PACK      :   Exploit (Github: torvalds_linux_commit_9cc02ede696272c5271a401e4f27c262359bc2f6 (G))
	kernel              :   4.14.105    :  	CVE-2022-2078     :   5.5       :   STAT/PACK      :   Exploit (Github: delsploit_CVE-2022-2078 (G) kdn111_linux-kernel-exploitation (G) khanhdn111_linux-kernel-exploitation (G) khanhdz-06_linux-kernel-exploitation (G) khanhdz191_linux-kernel-exploitation (G) khanhhdz_linux-kernel-exploitation (G) khanhhdz06_linux-kernel-exploitation (G) khanhnd123_linux-kernel-exploitation (G) nomi-sec_PoC-in-GitHub (G) xairy_linux-kernel-exploitation (G))
	kernel              :   4.14.105    :  	CVE-2022-1016     :   5.5       :   STAT/PACK      :   Exploit (Github: kdn111_linux-kernel-exploitation (G) khanhdn111_linux-kernel-exploitation (G) khanhdz-06_linux-kernel-exploitation (G) khanhdz191_linux-kernel-exploitation (G) khanhhdz_linux-kernel-exploitation (G) khanhhdz06_linux-kernel-exploitation (G) khanhnd123_linux-kernel-exploitation (G) xairy_linux-kernel-exploitation (G) yaobinwen_robin_on_rails (G) zanezhub_CVE-2022-1015-1016 (G))
	kernel              :   4.14.105    :  	CVE-2022-0487     :   5.5       :   STAT/PACK      :   Exploit (Github: si1ent-le_CVE-2022-0847 (G))
	kernel              :   4.14.105    :  	CVE-2022-0480 (V) :   5.5       :   STAT/PACK      :   Exploit (Github: kata-containers_kata-containers_issues_3373 (G))
	kernel              :   4.14.105    :  	CVE-2021-45868 (V):   5.5       :   STAT/PACK      :   Exploit (Snyk: SNYK-UNMANAGED-TORVALDSLINUX-3006722 (S))
	kernel              :   4.14.105    :  	CVE-2021-4155     :   5.5       :   STAT/PACK      :   Exploit (Github: lafayette96_CVE-Errata-Tool (G))
	kernel              :   4.14.105    :  	CVE-2021-4150     :   5.5       :   STAT/PACK      :   Exploit (Github: sam8k_Dynamic-and-Static-Analysis-of-SOUPs (G))
	kernel              :   4.14.105    :  	CVE-2021-4148 (V) :   5.5       :   STAT/PACK      :   Exploit (Github: sam8k_Dynamic-and-Static-Analysis-of-SOUPs (G))
	kernel              :   4.14.105    :  	CVE-2021-3679     :   5.5       :   STAT/PACK      :   Exploit (Github: aegistudio_RingBufferDetonator (G) nomi-sec_PoC-in-GitHub (G))
	kernel              :   4.14.105    :  	CVE-2021-29650 (V):   5.5       :   STAT/PACK      :   Exploit (Github: woc-hack_tutorial (G))
	kernel              :   4.14.105    :  	CVE-2021-29155 (V):   5.5       :   STAT/PACK      :   Exploit (Github: Kakashiiiiy_CVE-2021-29155 (G) WhooAmii_POC_to_review (G) benschlueter_CVE-2021-29155 (G) manas3c_CVE-POC (G) nomi-sec_PoC-in-GitHub (G) soosmile_POC (G))
	kernel              :   4.14.105    :  	CVE-2020-36322    :   5.5       :   STAT/PACK      :   Exploit (Github: JaskaranNarula_Host_Errata_Info (G))
	kernel              :   4.14.105    :  	CVE-2020-27194 (V):   5.5       :   STAT/PACK      :   Exploit (Github: Al1ex_LinuxEelvation (G) JlSakuya_Linux-Privilege-Escalation-Exploits (G) OrangeGzY_security-research-learning (G) bsauce_kernel-exploit-factory (G) bsauce_kernel-security-learning (G) developer3000S_PoC-in-GitHub (G) hectorgie_PoC-in-GitHub (G) kdn111_linux-kernel-exploitation (G) khanhdn111_linux-kernel-exploitation (G) khanhdz-06_linux-kernel-exploitation (G) khanhdz191_linux-kernel-exploitation (G) khanhhdz_linux-kernel-exploitation (G) khanhhdz06_linux-kernel-exploitation (G) khanhnd123_linux-kernel-exploitation (G) kruztw_CVE (G) nomi-sec_PoC-in-GitHub (G) scannells_exploits (G) willinin_CVE-2020-27194-exp (G) xairy_linux-kernel-exploitation (G) xmzyshypnc_CVE-2020-27194 (G))
	kernel              :   4.14.105    :  	CVE-2020-25704    :   5.5       :   STAT/PACK      :   Exploit (Github: JaskaranNarula_Host_Errata_Info (G))
	kernel              :   4.14.105    :  	CVE-2020-10720    :   5.5       :   STAT/PACK      :   Exploit (Github: 404notf0und_CVE-Flow (G))
	kernel              :   4.14.105    :  	CVE-2019-9857     :   5.5       :   STAT/PACK      :   Exploit (Github: hiboma_hiboma (G))
	kernel              :   4.14.105    :  	CVE-2019-7222     :   5.5       :   STAT/PACK      :   Exploit (PSS: 151712/KVM-kvm_inject_page_fault-Uninitialized-Memory-Leak.html (P) / Github: torvalds_linux_commits_master_arch_x86_kvm (G))
	kernel              :   4.14.105    :  	CVE-2019-5489     :   5.5       :   STAT/PACK      :   Exploit (Github: 0xT11_CVE-POC (G) developer3000S_PoC-in-GitHub (G) hectorgie_PoC-in-GitHub (G) mmxsrup_CVE-2019-5489 (G) nomi-sec_PoC-in-GitHub (G))
	kernel              :   4.14.105    :  	CVE-2019-19039    :   5.5       :   STAT/PACK      :   Exploit (Github: bobfuzzer_CVE_tree_master_CVE-2019-19039 (G))
	kernel              :   4.14.105    :  	CVE-2019-19037    :   5.5       :   STAT/PACK      :   Exploit (Github: bobfuzzer_CVE_tree_master_CVE-2019-19037 (G))
	kernel              :   4.14.105    :  	CVE-2019-19036    :   5.5       :   STAT/PACK      :   Exploit (Github: DelspoN_CVE (G) bobfuzzer_CVE_tree_master_CVE-2019-19036 (G))
	kernel              :   4.14.105    :  	CVE-2019-18885    :   5.5       :   STAT/PACK      :   Exploit (Github: 0xT11_CVE-POC (G) bobfuzzer_CVE-2019-18885 (G) developer3000S_PoC-in-GitHub (G) hectorgie_PoC-in-GitHub (G))
	kernel              :   4.14.105    :  	CVE-2019-10207    :   5.5       :   STAT/PACK      :   Exploit (Github: 0xT11_CVE-POC (G) alphaSeclab_sec-daily-2019 (G) butterflyhack_CVE-2019-10207 (G) developer3000S_PoC-in-GitHub (G) hectorgie_PoC-in-GitHub (G))
	kernel              :   4.14.105    :  	CVE-2018-7740     :   5.5       :   STAT/PACK      :   Exploit (Github: blurbdust_blurbdust.github.io (G))
	kernel              :   4.14.105    :  	CVE-2018-7273     :   5.5       :   STAT/PACK      :   Exploit (EDB ID: 44325 / PSS: 146863/Linux-Kernel-show_floppy-KASLR-Address-Leak.html (P) / Github: bcoles_kasld (G) lnick2023_nicenice (G) qazbnm456_awesome-cve-poc (G) xbl3_awesome-cve-poc_qazbnm456 (G))
	kernel              :   4.14.105    :  	CVE-2018-6554     :   5.5       :   STAT/PACK      :   Exploit (Github: hiboma_hiboma (G) kdn111_linux-kernel-exploitation (G) khanhdn111_linux-kernel-exploitation (G) khanhdz-06_linux-kernel-exploitation (G) khanhdz191_linux-kernel-exploitation (G) khanhhdz_linux-kernel-exploitation (G) khanhhdz06_linux-kernel-exploitation (G) khanhnd123_linux-kernel-exploitation (G) xairy_linux-kernel-exploitation (G))
	kernel              :   4.14.105    :  	CVE-2018-18397    :   5.5       :   STAT/PACK      :   Exploit (PSS: 150748/Linux-userfaultfd-tmpfs-File-Permission-Bypass.html (P))
	kernel              :   4.14.105    :  	CVE-2018-15594    :   5.5       :   STAT/PACK      :   Exploit (Github: elivepatch_livepatch-overlay (G))
	kernel              :   4.14.105    :  	CVE-2018-11508    :   5.5       :   STAT/PACK      :   Exploit (EDB ID: 46208 / PSS: 151241/Linux-Kernel-4.13-compat_get_timex-Kernel-Pointer-Leak.html (P) / Github: bcoles_kasld (G))
	glibc               :   2.27        :  	CVE-2020-27618    :   5.5       :   STAT           :   Exploit (Github: dispera_giant-squid (G) domyrtille_interview_project (G) epequeno_devops-demo (G) nedenwalker_spring-boot-app-using-gradle (G) nedenwalker_spring-boot-app-with-log4j-vuln (G) onzack_trivy-multiscanner (G))
	glibc               :   2.27        :  	CVE-2020-10029    :   5.5       :   STAT           :   Exploit (Github: ForAllSecure_VulnerabilitiesLab (G) alphaSeclab_sec-daily-2020 (G) garethr_snykout (G))
	glibc               :   2.27        :  	CVE-2019-7309     :   5.5       :   STAT           :   Exploit (Github: flyrev_security-scan-ci-presentation (G))
	kernel              :   4.14.105    :  	CVE-2020-26147    :   5.4       :   STAT/PACK      :   Exploit (Github: kali973_fragAttacks (G) vanhoefm_fragattacks (G))
	php                 :   7.2.16      :  	CVE-2019-11046    :   5.3       :   STAT           :   Exploit (Github: siemens_fluffi (G))
	php                 :   7.2.16      :  	CVE-2019-11038    :   5.3       :   STAT           :   Exploit (Github: arindam0310018_04-Apr-2022-DevOps__Scan-Images-In-ACR-Using-Trivy (G))
	openssl             :   1.1.1b      :  	CVE-2023-0466     :   5.3       :   STAT/UEMU      :   Exploit (Github: bluesentinelsec_landing-zone (G))
	openssl             :   1.1.1b      :  	CVE-2022-2097     :   5.3       :   STAT/UEMU      :   Exploit (Github: PeterThomasAwen_OpenSSLUpgrade1.1.1q-Ubuntu (G) WhooAmii_POC_to_review (G) cdupuis_image-api (G) isgo-golgo13_gokit-gorillakit-enginesvc (G) jntass_TASSL-1.1.1 (G) manas3c_CVE-POC (G) nomi-sec_PoC-in-GitHub (G) tianocore-docs_ThirdPartySecurityAdvisories (G))
	openssl             :   1.1.1b      :  	CVE-2019-1551     :   5.3       :   STAT/UEMU      :   Exploit (Github: Mohzeela_external-secret (G) arindam0310018_04-Apr-2022-DevOps__Scan-Images-In-ACR-Using-Trivy (G) fredrkl_trivy-demo (G) garethr_snykout (G) mrodden_vyger (G) siddharthraopotukuchi_trivy (G) t31m0_Vulnerability-Scanner-for-Containers (G) thecyberbaby_Trivy-by-AquaSecurity (G) thecyberbaby_Trivy-by-aquaSecurity (G) umahari_security (G) vinamra28_tekton-image-scan-trivy (G))
	openssl             :   1.1.1b      :  	CVE-2019-1549     :   5.3       :   STAT/UEMU      :   Exploit (Github: Mohzeela_external-secret (G) arindam0310018_04-Apr-2022-DevOps__Scan-Images-In-ACR-Using-Trivy (G) djschleen_ash (G) fredrkl_trivy-demo (G) jntass_TASSL-1.1.1k (G) mrodden_vyger (G) siddharthraopotukuchi_trivy (G) simiyo_trivy (G) t31m0_Vulnerability-Scanner-for-Containers (G) thecyberbaby_Trivy-by-AquaSecurity (G) thecyberbaby_Trivy-by-aquaSecurity (G) umahari_security (G) vinamra28_tekton-image-scan-trivy (G))
	libcurl             :   7.64.0      :  	CVE-2021-22876    :   5.3       :   STAT           :   Exploit (Github: indece-official_clair-client (G))
	kernel              :   4.14.105    :  	CVE-2018-1120     :   5.3       :   STAT/PACK      :   Exploit (EDB ID: 44806 / PSS: 147806/Procps-ng-Audit-Report.html (P))
	glibc               :   2.27        :  	CVE-2016-10739    :   5.3       :   STAT           :   Exploit (Github: CKL2022_meta-timesys (G) TimesysGit_meta-timesys (G) flyrev_security-scan-ci-presentation (G) nedenwalker_spring-boot-app-using-gradle (G) nedenwalker_spring-boot-app-with-log4j-vuln (G) renren82_timesys (G) siva7080_meta-timesys (G) xlloss_meta-timesys (G))
	dropbear_ssh        :   2017.75     :  	CVE-2018-15599    :   5.3       :   UEMU           :   Exploit (Github: odolezal_silvercrest_zigbee_gateway (G) xtaran_dist-detect (G))
	busybox             :   1.30.1      :  	CVE-2021-42374    :   5.3       :   STAT/PACK      :   Exploit (Github: isgo-golgo13_gokit-gorillakit-enginesvc (G))
	lua                 :   5.1.5       :  	CVE-2014-5461     :   5 (v2)    :   STAT/UEMU/PACK :   Exploit (Github: bharatsunny_dagda (G) eliasgranderubio_dagda (G) man151098_dagda (G) samboy_lunacy (G))
	kernel              :   4.14.105    :  	CVE-2020-28974    :   5         :   STAT/PACK      :   Exploit (Github: ZIllR0_Routers (G))
	kernel              :   4.14.105    :  	CVE-2018-12904    :   4.9       :   STAT/PACK      :   Exploit (EDB ID: 44944)
	openssl             :   1.1.1b      :  	CVE-2019-1547     :   4.7       :   STAT/UEMU      :   Exploit (Github: Mohzeela_external-secret (G) arindam0310018_04-Apr-2022-DevOps__Scan-Images-In-ACR-Using-Trivy (G) djschleen_ash (G) fredrkl_trivy-demo (G) jntass_TASSL-1.1.1k (G) mrodden_vyger (G) siddharthraopotukuchi_trivy (G) simiyo_trivy (G) t31m0_Vulnerability-Scanner-for-Containers (G) thecyberbaby_Trivy-by-AquaSecurity (G) thecyberbaby_Trivy-by-aquaSecurity (G) umahari_security (G) vinamra28_tekton-image-scan-trivy (G))
	kernel              :   4.14.105    :  	CVE-2022-40307    :   4.7       :   STAT/PACK      :   Exploit (Github: SettRaziel_bsi_cert_bot (G))
	kernel              :   4.14.105    :  	CVE-2021-33624 (V):   4.7       :   STAT/PACK      :   Exploit (Github: Kakashiiiiy_CVE-2021-33624 (G) WhooAmii_POC_to_review (G) benschlueter_CVE-2021-33624 (G) nomi-sec_PoC-in-GitHub (G) soosmile_POC (G))
	kernel              :   4.14.105    :  	CVE-2022-25258    :   4.6       :   STAT/PACK      :   Exploit (Github: WhooAmii_POC_to_review (G) manas3c_CVE-POC (G) nomi-sec_PoC-in-GitHub (G) soosmile_POC (G) szymonh_d-os-descriptor (G) szymonh_szymonh (G))
	kernel              :   4.14.105    :  	CVE-2022-0494 (V) :   4.4       :   STAT/PACK      :   Exploit (Github: sam8k_Dynamic-and-Static-Analysis-of-SOUPs (G))
	kernel              :   4.14.105    :  	CVE-2021-4032     :   4.4       :   STAT/PACK      :   Exploit (Github: EstamelGG_CVE-2021-4034-NoGCC (G))
	kernel              :   4.14.105    :  	CVE-2021-27363    :   4.4       :   STAT/PACK      :   Exploit (Github: aaronxie55_Presentation2_Markdown (G) c4pt000_kernel-5.11.6-expSEHDsec-HAXM-cgroup-virtio-nvidia-amd-kaliwifi (G) kdn111_linux-kernel-exploitation (G) khanhdn111_linux-kernel-exploitation (G) khanhdz-06_linux-kernel-exploitation (G) khanhdz191_linux-kernel-exploitation (G) khanhhdz_linux-kernel-exploitation (G) khanhhdz06_linux-kernel-exploitation (G) khanhnd123_linux-kernel-exploitation (G) xairy_linux-kernel-exploitation (G))
	kernel              :   4.14.105    :  	CVE-2019-19045    :   4.4       :   STAT/PACK      :   Exploit (Github: torvalds_linux_commit_c8c2a057fdc7de1cd16f4baa51425b932a42eb39 (G))
	kernel              :   4.14.105    :  	CVE-2019-15666    :   4.4       :   STAT/PACK      :   Exploit (linux-exploit-suggester / Github: Al1ex_LinuxEelvation (G) De4dCr0w_Linux-kernel-EoP-exp (G) JlSakuya_Linux-Privilege-Escalation-Exploits (G) bsauce_kernel-exploit-factory (G) bsauce_kernel-security-learning (G) go-bi_go-bi-soft (G) siddicky_yotjf (G))
	php                 :   7.2.16      :  	CVE-2020-7066     :   4.3       :   STAT           :   Exploit (Github: 0xbigshaq_php7-internals (G))
	kernel              :   4.14.105    :  	CVE-2020-26558    :   4.2       :   STAT/PACK      :   Exploit (Github: JeffroMF_awesome-bluetooth-security321 (G) engn33r_awesome-bluetooth-security (G))
	openssl             :   1.1.1b      :  	CVE-2019-1563     :   3.7       :   STAT/UEMU      :   Exploit (Github: Mohzeela_external-secret (G) arindam0310018_04-Apr-2022-DevOps__Scan-Images-In-ACR-Using-Trivy (G) djschleen_ash (G) fredrkl_trivy-demo (G) jntass_TASSL-1.1.1k (G) mrodden_vyger (G) siddharthraopotukuchi_trivy (G) simiyo_trivy (G) t31m0_Vulnerability-Scanner-for-Containers (G) thecyberbaby_Trivy-by-AquaSecurity (G) thecyberbaby_Trivy-by-aquaSecurity (G) umahari_security (G) vinamra28_tekton-image-scan-trivy (G))
	libcurl             :   7.64.0      :  	CVE-2021-22924    :   3.7       :   STAT           :   Exploit (Github: Trinadh465_external_curl_AOSP10_r33_CVE-2021-22924 (G) kenlavbah_log4jnotes (G) nomi-sec_PoC-in-GitHub (G))
	libcurl             :   7.64.0      :  	CVE-2021-22890    :   3.7       :   STAT           :   Exploit (Github: indece-official_clair-client (G))
	dnsmasq             :   2.80        :  	CVE-2020-25686    :   3.7       :   UEMU/PACK      :   Exploit (Github: AZ-X_pique (G) CVEDB_awesome-cve-repo (G) CVEDB_top (G) DNTYO_F5_Vulnerability (G) EdgeSecurityTeam_Vulnerability (G) JERRY123S_all-poc (G) SexyBeast233_SecBooks (G) cyberanand1337x_bug-bounty-2022 (G) developer3000S_PoC-in-GitHub (G) hktalent_TOP (G) kaosagnt_ansible-everyday (G) klcheung99_CSCM28CW2 (G) knqyf263_dnspooq (G) mboukhalfa_multironic (G) nomi-sec_PoC-in-GitHub (G) tzwlhack_Vulnerability (G) weeka10_-hktalent-TOP (G))
	dnsmasq             :   2.80        :  	CVE-2020-25685    :   3.7       :   UEMU/PACK      :   Exploit (Github: AZ-X_pique (G) CVEDB_awesome-cve-repo (G) CVEDB_top (G) DNTYO_F5_Vulnerability (G) EdgeSecurityTeam_Vulnerability (G) JERRY123S_all-poc (G) SexyBeast233_SecBooks (G) cyberanand1337x_bug-bounty-2022 (G) hktalent_TOP (G) kaosagnt_ansible-everyday (G) klcheung99_CSCM28CW2 (G) knqyf263_dnspooq (G) mboukhalfa_multironic (G) tzwlhack_Vulnerability (G) weeka10_-hktalent-TOP (G))
	dnsmasq             :   2.80        :  	CVE-2020-25684    :   3.7       :   UEMU/PACK      :   Exploit (Github: AZ-X_pique (G) CVEDB_awesome-cve-repo (G) CVEDB_top (G) DNTYO_F5_Vulnerability (G) EdgeSecurityTeam_Vulnerability (G) JERRY123S_all-poc (G) SexyBeast233_SecBooks (G) cyberanand1337x_bug-bounty-2022 (G) developer3000S_PoC-in-GitHub (G) hktalent_TOP (G) kaosagnt_ansible-everyday (G) klcheung99_CSCM28CW2 (G) knqyf263_dnspooq (G) mboukhalfa_multironic (G) nomi-sec_PoC-in-GitHub (G) tzwlhack_Vulnerability (G) weeka10_-hktalent-TOP (G))
	php                 :   7.2.16      :  	CVE-2020-7068     :   3.6       :   STAT           :   Exploit (Github: 404notf0und_CVE-Flow (G))
	kernel              :   4.14.105    :  	CVE-2020-24588    :   3.5       :   STAT/PACK      :   Exploit (Github: kali973_fragAttacks (G) vanhoefm_fragattacks (G))
	kernel              :   4.14.105    :  	CVE-2020-24586    :   3.5       :   STAT/PACK      :   Exploit (Github: kali973_fragAttacks (G) vanhoefm_fragattacks (G))
	openssl             :   1.1.1b      :  	CVE-2019-1552     :   3.3       :   STAT/UEMU      :   Exploit (Github: imhunterand_hackerone-publicy-disclosed (G) javirodriguezzz_Shodan-Browser (G) jntass_TASSL-1.1.1k (G))
	kernel              :   4.14.105    :  	CVE-2022-32296    :   3.3       :   STAT/PACK      :   Exploit (Github: 0xkol_rfc6056-device-tracker (G))
	kernel              :   4.14.105    :  	CVE-2020-24587    :   2.6       :   STAT/PACK      :   Exploit (Github: kali973_fragAttacks (G) vanhoefm_fragattacks (G))

[*] Summary of known exploited vulnerabilities:
[+] WARNING: Vulnerability CVE-2023-0266 is a known exploited vulnerability.
[+] WARNING: Vulnerability CVE-2019-13272 is a known exploited vulnerability.
[+] WARNING: Vulnerability CVE-2019-11043 is a known exploited vulnerability.
[+] WARNING: Vulnerability CVE-2021-3156 is a known exploited vulnerability.





[*] Exploitability notes:
    R - remote exploits
    L - local exploits
    D - DoS exploits
    G - PoC code found on Github (unknown exploit vector)
    P - PoC code found on Packetstormsecurity (unknown exploit vector)
    S - PoC code found on Snyk vulnerability database (unknown exploit vector)
    X - Vulnerability is known as exploited
    V - Kernel vulnerability was verified from module s26


[*] Source notes:
    STAT - Details found by static modules (S06, S09, S24, S25)
    PACK - Details found by package management environment (S08)
    UEMU - Details found by dynamic user-mode emulation modules (S115, S116)
    SEMU - Details found by dynamic system emulation modules (L*)