[*] Exploit summary:
	zlib                :   1.2.11      :   CVE-2022-37434    :   9.8       :   STAT           :   Exploit (Github: WhooAmii_POC_to_review (G) isgo-golgo13_gokit-gorillakit-enginesvc (G) manas3c_CVE-POC (G) maxim12z_ECommerce (G) nidhi7598_external_zlib-1.2.11_AOSP_10_r33_CVE-2022-37434 (G) nidhi7598_external_zlib-1.2.7_CVE-2022-37434 (G) nomi-sec_PoC-in-GitHub (G) xen0bit_CVE-2022-37434_poc (G))
	openssl             :   1.1.1c      :   CVE-2022-2068     :   9.8       :   STAT/UEMU      :   Exploit (Github: backloop-biz_CVE_checks (G) jntass_TASSL-1.1.1 (G) mawinkler_c1-cs-scan-result (G) tianocore-docs_ThirdPartySecurityAdvisories (G))
	openssl             :   1.1.1c      :   CVE-2022-1292     :   9.8       :   STAT/UEMU      :   Exploit (Snyk: SNYK-UNMANAGED-OPENSSL-2807816 (S) / Github: WhooAmii_POC_to_review (G) alcaparra_CVE-2022-1292 (G) backloop-biz_CVE_checks (G) fdl66_openssl-1.0.2u-fix-cve (G) greek0x0_CVE-2022-1292 (G) jntass_TASSL-1.1.1 (G) li8u99_CVE-2022-1292 (G) manas3c_CVE-POC (G) mawinkler_c1-cs-scan-result (G) nidhi7598_openssl-OpenSSL_1_1_1g_AOSP_10_r33_CVE-2022-1292 (G) nomi-sec_PoC-in-GitHub (G) rama291041610_CVE-2022-1292 (G) tianocore-docs_ThirdPartySecurityAdvisories (G) trhacknon_CVE-2022-1292 (G) und3sc0n0c1d0_CVE-2022-1292 (G))
	openssl             :   1.1.1c      :   CVE-2021-3711     :   9.8       :   STAT/UEMU      :   Exploit (Github: Frannc0_test2 (G) NeXTLinux_griffon (G) anchore_grype (G) aymankhder_scanner-for-container (G) isgo-golgo13_gokit-gorillakit-enginesvc (G) jntass_TASSL-1.1.1 (G) jntass_TASSL-1.1.1k (G) leonov-av_scanvus (G) metapull_attackfinder (G) mmartins000_sinker (G) tianocore-docs_ThirdPartySecurityAdvisories (G))
	lighttpd            :   1.4.53      :   CVE-2019-11072    :   9.8       :   STAT/UEMU      :   Exploit (Github: jreisinger_checkip (G))
	libcurl             :   7.61.0      :   CVE-2019-3822     :   9.8       :   STAT           :   Exploit (Github: KorayAgaya_TrivyWeb (G) Mohzeela_external-secret (G) Yuki0x80_BlackHat2019 (G) saiyuki1919_BlackHat2019 (G) siddharthraopotukuchi_trivy (G) simiyo_trivy (G) t31m0_Vulnerability-Scanner-for-Containers (G) umahari_security (G))
	libcurl             :   7.61.0      :   CVE-2018-14618    :   9.8       :   STAT           :   Exploit (Github: KorayAgaya_TrivyWeb (G) Mohzeela_external-secret (G) cloudogu_ces-build-lib (G) ibrokethecloud_enforcer (G) siddharthraopotukuchi_trivy (G) simiyo_trivy (G) t31m0_Vulnerability-Scanner-for-Containers (G) umahari_security (G))
	expat               :   2.2.6       :   CVE-2022-25315    :   9.8       :   STAT/UEMU      :   Exploit (Snyk: SNYK-UNMANAGED-LIBEXPATLIBEXPAT-2404807 (S) / Github: Nivaskumark_external_expat_v2.1.0_CVE-2022-25315 (G) ShaikUsaf_external_expact_AOSP10_r33_CVE-2022-25315 (G) WhooAmii_POC_to_review (G) gatecheckdev_gatecheck (G) hshivhare67_external_expat_v2.1.0_CVE-2022-25315 (G) libexpat_libexpat_pull_559 (G) manas3c_CVE-POC (G) nomi-sec_PoC-in-GitHub (G))
	expat               :   2.2.6       :   CVE-2022-25236    :   9.8       :   STAT/UEMU      :   Exploit (PSS: 167238/Zoom-XMPP-Stanza-Smuggling-Remote-Code-Execution.html (P) / Github: ARGOeu-Metrics_secmon-probes (G) ARGOeu_secmon-probes (G) Satheesh575555_external_expat_AOSP10_r33_CVE-2022-25236 (G) nomi-sec_PoC-in-GitHub (G))
	expat               :   2.2.6       :   CVE-2022-25235    :   9.8       :   STAT/UEMU      :   Exploit (Github: ARGOeu-Metrics_secmon-probes (G) ARGOeu_secmon-probes (G) Satheesh575555_external_expat_AOSP10_r33_CVE-2022-25235 (G) WhooAmii_POC_to_review (G) manas3c_CVE-POC (G) nomi-sec_PoC-in-GitHub (G) rootameen_vulpine (G))
	expat               :   2.2.6       :   CVE-2022-23852    :   9.8       :   STAT/UEMU      :   Exploit (Github: Satheesh575555_external_expat_AOSP10_r33_CVE-2022-23852 (G) WhooAmii_POC_to_review (G) gatecheckdev_gatecheck (G) manas3c_CVE-POC (G) nomi-sec_PoC-in-GitHub (G) team-saba_vuln_CI-CD_AWS (G) team-saba_vuln_CI-CD_ec2 (G))
	expat               :   2.2.6       :   CVE-2022-22822    :   9.8       :   STAT/UEMU      :   Exploit (Github: WhooAmii_POC_to_review (G) manas3c_CVE-POC (G) CVE-2022-22827" title="nanopathi_external_expat_AOSP10_r33_CVE-2022-22822toCVE-2022-22827" target="_blank" >nanopathi_external_expat_AOSP10_r33_CVE-2022-22822toCVE-2022-22827 (G) nomi-sec_PoC-in-GitHub (G))
	kernel              :   4.19.56     :   CVE-2022-42896    :   8.8       :   STAT           :   Exploit (Github: Satheesh575555_linux-4.19.72_CVE-2022-42896 (G) Trinadh465_linux-4.19.72_CVE-2022-42896 (G) hshivhare67_kernel_v4.19.72_CVE-2022-42896_new (G) hshivhare67_kernel_v4.19.72_CVE-2022-42896_old (G) kdn111_linux-kernel-exploitation (G) khanhdn111_linux-kernel-exploitation (G) khanhdz-06_linux-kernel-exploitation (G) khanhdz191_linux-kernel-exploitation (G) khanhhdz_linux-kernel-exploitation (G) khanhhdz06_linux-kernel-exploitation (G) khanhnd123_linux-kernel-exploitation (G) nidhi7598_linux-4.1.15_CVE-2022-42896 (G) nomi-sec_PoC-in-GitHub (G) xairy_linux-kernel-exploitation (G))
	kernel              :   4.19.56     :   CVE-2022-0435     :   8.8       :   STAT           :   Exploit (Github: kdn111_linux-kernel-exploitation (G) khanhdn111_linux-kernel-exploitation (G) khanhdz-06_linux-kernel-exploitation (G) khanhdz191_linux-kernel-exploitation (G) khanhhdz_linux-kernel-exploitation (G) khanhhdz06_linux-kernel-exploitation (G) khanhnd123_linux-kernel-exploitation (G) manas3c_CVE-POC (G) nomi-sec_PoC-in-GitHub (G) wlswotmd_CVE-2022-0435 (G) xairy_linux-kernel-exploitation (G))
	kernel              :   4.19.56     :   CVE-2021-3656     :   8.8       :   STAT           :   Exploit (Github: nomi-sec_PoC-in-GitHub (G) rami08448_CVE-2021-3656-Demo (G))
	kernel              :   4.19.56     :   CVE-2021-3653     :   8.8       :   STAT           :   Exploit (Github: CVE-2021-3656-Demo" title="rami08448_CVE-2021-3656-Demo" target="_blank" >rami08448_CVE-2021-3656-Demo (G))
	kernel              :   4.19.56     :   CVE-2019-17666    :   8.8       :   STAT           :   Exploit (Github: alphaSeclab_sec-daily-2019 (G))
	expat               :   2.2.6       :   CVE-2022-22827" title="CVE-2022-22827" target="_blank" >CVE-2022-22827    :   8.8       :   STAT/UEMU      :   Exploit (Github: WhooAmii_POC_to_review (G) manas3c_CVE-POC (G) CVE-2022-22822toCVE-2022-22827" title="nanopathi_external_expat_AOSP10_r33_CVE-2022-22822toCVE-2022-22827" target="_blank" >nanopathi_external_expat_AOSP10_r33_CVE-2022-22822toCVE-2022-22827 (G) nomi-sec_PoC-in-GitHub (G))
	expat               :   2.2.6       :   CVE-2021-45960" title="CVE-2021-45960" target="_blank" >CVE-2021-45960    :   8.8       :   STAT/UEMU      :   Exploit (Github: CVE-2021-46143-" title="Trinadh465_external_lib_AOSP10_r33_CVE-2021-45960_CVE-2021-46143-" target="_blank" >Trinadh465_external_lib_AOSP10_r33_CVE-2021-45960_CVE-2021-46143- (G) WhooAmii_POC_to_review (G) hshivhare67_external_expat_v2.2.6_CVE-2021-45960 (G) nanopathi_external_expat_AOSP10_r33_CVE-2021-45960 (G) nomi-sec_PoC-in-GitHub (G))
	busybox             :   1.30.1      :   CVE-2022-28391    :   8.8       :   STAT/UEMU      :   Exploit (Github: KazKobara_dockerfile_fswiki_local (G) grggls_crypto-devops-test (G) isgo-golgo13_gokit-gorillakit-enginesvc (G))
	kernel              :   4.19.56     :   CVE-2022-1012 (V) :   8.2       :   STAT           :   Exploit (Github: manas3c_CVE-POC (G) nomi-sec_PoC-in-GitHub (G))
	kernel              :   4.19.56     :   CVE-2019-19770 (V):   8.2       :   STAT           :   Exploit (Github: mcgrof_break-blktrace (G))
	expat               :   2.2.6       :   CVE-2022-40674    :   8.1       :   STAT/UEMU      :   Exploit (Github: chainguard-dev_image-comparison (G) manas3c_CVE-POC (G) maxim12z_ECommerce (G) nidhi7598_expat_2.1.0_CVE-2022-40674 (G) nomi-sec_PoC-in-GitHub (G))
	busybox             :   1.30.1      :   CVE-2018-1000500  :   8.1       :   STAT/UEMU      :   Exploit (Github: alphaSeclab_sec-daily-2020 (G))
	kernel              :   4.19.56     :   CVE-2023-3269     :   7.8       :   STAT           :   Exploit (Github: LumaKernel_awesome-stars (G) aneasystone_github-trending (G) izj007_wechat (G) kherrick_hacker-news (G) kun-g_Scraping-Github-trending (G) lrh2000_StackRot (G) nomi-sec_PoC-in-GitHub (G))
	kernel              :   4.19.56     :   CVE-2023-32233    :   7.8       :   STAT           :   Exploit (Github: CVEDB_awesome-cve-repo (G) CVEDB_top (G) Liuk3r_CVE-2023-32233 (G) Mr-xn_Penetration_Testing_POC (G) PIDAN-HEIDASHUAI_CVE-2023-32233 (G) Threekiii_CVE (G) hktalent_TOP (G) nomi-sec_PoC-in-GitHub (G) oferchen_POC-CVE-2023-32233 (G) xairy_linux-kernel-exploitation (G) xyxj1024_xyxj1024.github.io (G))
	kernel              :   4.19.56     :   CVE-2023-23559    :   7.8       :   STAT           :   Exploit (Github: szymonh_szymonh (G))
	kernel              :   4.19.56     :   CVE-2023-2008     :   7.8       :   STAT           :   Exploit (Github: Mr-xn_Penetration_Testing_POC (G) bluefrostsecurity_CVE-2023-2008 (G) em1ga3l_cve-msrc-extractor (G) nomi-sec_PoC-in-GitHub (G) xairy_linux-kernel-exploitation (G))
	kernel              :   4.19.56     :   CVE-2023-1829     :   7.8       :   STAT           :   Exploit (Github: Threekiii_CVE (G) star-sg_CVE (G) xairy_linux-kernel-exploitation (G))
	kernel              :   4.19.56     :   CVE-2023-0461     :   7.8       :   STAT           :   Exploit (Github: hheeyywweellccoommee_linux-4.19.72_CVE-2023-0461-ycnbd (G) hshivhare67_kernel_v4.19.72_CVE-2023-0461 (G) nidhi7598_linux-4.19.72_CVE-2023-0461 (G) nomi-sec_PoC-in-GitHub (G))
	kernel              :   4.19.56     :   CVE-2022-45934    :   7.8       :   STAT           :   Exploit (Github: Satheesh575555_linux-4.1.15_CVE-2022-45934 (G) Trinadh465_linux-4.1.15_CVE-2022-45934 (G) Trinadh465_linux-4.19.72_CVE-2022-45934 (G) manas3c_CVE-POC (G) nidhi7598_linux-3.0.35_CVE-2022-45934 (G) nomi-sec_PoC-in-GitHub (G))
	kernel              :   4.19.56     :   CVE-2022-36123    :   7.8       :   STAT           :   Exploit (Github: sickcodes_security_blob_master_advisories_SICK-2022-128.md (G))
	kernel              :   4.19.56     :   CVE-2022-34918    :   7.8       :   STAT           :   Exploit (MSF: netfilter_nft_set_elem_init_privesc (L) / Github: JlSakuya_Linux-Privilege-Escalation-Exploits (G) Ly0nt4r_OSCP (G) Mr-xn_Penetration_Testing_POC (G) Sechack06_CVE-2022-34918 (G) Snoopy-Sec_Localroot-ALL-CVE (G) WhooAmii_POC_to_review (G) bsauce_kernel-exploit-factory (G) bsauce_kernel-security-learning (G) e-hakson_OSCP (G) eljosep_OSCP-Guide (G) felixfu59_kernel-hack (G) kdn111_linux-kernel-exploitation (G) khanhdn111_linux-kernel-exploitation (G) khanhdz-06_linux-kernel-exploitation (G) khanhdz191_linux-kernel-exploitation (G) khanhhdz_linux-kernel-exploitation (G) khanhhdz06_linux-kernel-exploitation (G) khanhnd123_linux-kernel-exploitation (G) lanleft_CVE2023-1829 (G) linulinu_CVE-2022-34918 (G) manas3c_CVE-POC (G) merlinepedra_CVE-2022-34918-LPE-PoC (G) merlinepedra25_CVE-2022-34918-LPE-PoC (G) nitishbadole_oscp-note-3 (G) nomi-sec_PoC-in-GitHub (G) purplewall1206_ERA-eBPF-assisted-Randomize-Allocator (G) randorisec_CVE-2022-34918-LPE-PoC (G) taielab_awesome-hacking-lists (G) tr3ss_gofetch (G) trhacknon_CVE-2022-34918-LPE-PoC (G) veritas501_CVE-2022-34918 (G) xairy_linux-kernel-exploitation (G) xuetusummer_Penetration_Testing_POC (G))
	kernel              :   4.19.56     :   CVE-2022-32250    :   7.8       :   STAT           :   Exploit (linux-exploit-suggester / Github: JlSakuya_Linux-Privilege-Escalation-Exploits (G) Mr-xn_Penetration_Testing_POC (G) Snoopy-Sec_Localroot-ALL-CVE (G) WhooAmii_POC_to_review (G) bsauce_kernel-exploit-factory (G) bsauce_kernel-security-learning (G) felixfu59_kernel-hack (G) kdn111_linux-kernel-exploitation (G) khanhdn111_linux-kernel-exploitation (G) khanhdz-06_linux-kernel-exploitation (G) khanhdz191_linux-kernel-exploitation (G) khanhhdz_linux-kernel-exploitation (G) khanhhdz06_linux-kernel-exploitation (G) khanhnd123_linux-kernel-exploitation (G) manas3c_CVE-POC (G) nomi-sec_PoC-in-GitHub (G) theori-io_CVE-2022-32250-exploit (G) xairy_linux-kernel-exploitation (G) xuetusummer_Penetration_Testing_POC (G) ysanatomic_CVE-2022-32250-LPE (G))
	kernel              :   4.19.56     :   CVE-2022-30594    :   7.8       :   STAT           :   Exploit (PSS: 170362/Linux-PT_SUSPEND_SECCOMP-Permission-Bypass-Ptracer-Death-Race.html (P) / Github: WhooAmii_POC_to_review (G) manas3c_CVE-POC (G) nidhi7598_linux-4.19.72_CVE-2022-30594 (G) nomi-sec_PoC-in-GitHub (G))
	kernel              :   4.19.56     :   CVE-2022-29968    :   7.8       :   STAT           :   Exploit (Snyk: SNYK-UNMANAGED-TORVALDSLINUX-3006622 (S) / Github: Mr-xn_Penetration_Testing_POC (G) WhooAmii_POC_to_review (G) jprx_CVE-2022-29968 (G) manas3c_CVE-POC (G) nomi-sec_PoC-in-GitHub (G) xuetusummer_Penetration_Testing_POC (G))
	kernel              :   4.19.56     :   CVE-2022-29581    :   7.8       :   STAT           :   Exploit (Github: Nidhi77777_linux-4.19.72_CVE-2022-29581 (G) WhooAmii_POC_to_review (G) manas3c_CVE-POC (G) nidhi7598_linux-4.19.72_CVE-2022-29581 (G) nidhihcl_linux-4.19.72_CVE-2022-29581 (G) nomi-sec_PoC-in-GitHub (G))
	kernel              :   4.19.56     :   CVE-2022-27666    :   7.8       :   STAT           :   Exploit (Github: Albocoder_cve-2022-27666-exploits (G) CVEDB_awesome-cve-repo (G) CVEDB_top (G) Ch4nc3n_PublicExploitation (G) JERRY123S_all-poc (G) JlSakuya_Linux-Privilege-Escalation-Exploits (G) Metarget_metarget (G) Mr-xn_Penetration_Testing_POC (G) WhooAmii_POC_to_review (G) bsauce_kernel-exploit-factory (G) bsauce_kernel-security-learning (G) cyberanand1337x_bug-bounty-2022 (G) hktalent_TOP (G) j4k0m_really-good-cybersec (G) kdn111_linux-kernel-exploitation (G) khanhdn111_linux-kernel-exploitation (G) khanhdz-06_linux-kernel-exploitation (G) khanhdz191_linux-kernel-exploitation (G) khanhhdz_linux-kernel-exploitation (G) khanhhdz06_linux-kernel-exploitation (G) khanhnd123_linux-kernel-exploitation (G) manas3c_CVE-POC (G) nomi-sec_PoC-in-GitHub (G) plummm_CVE-2022-27666 (G) weeka10_-hktalent-TOP (G) xairy_linux-kernel-exploitation (G) xuetusummer_Penetration_Testing_POC (G))
	kernel              :   4.19.56     :   CVE-2022-2639     :   7.8       :   STAT           :   Exploit (Github: EkamSinghWalia_Detection-and-Mitigation-for-CVE-2022-2639 (G) JlSakuya_Linux-Privilege-Escalation-Exploits (G) KayCHENvip_vulnerability-poc (G) Miraitowa70_POC-Notes (G) Mr-xn_Penetration_Testing_POC (G) Snoopy-Sec_Localroot-ALL-CVE (G) Threekiii_Awesome-POC (G) WhooAmii_POC_to_review (G) avboy1337_CVE-2022-2639-PipeVersion (G) bb33bb_CVE-2022-2639-PipeVersion (G) bsauce_kernel-exploit-factory (G) bsauce_kernel-security-learning (G) manas3c_CVE-POC (G) nomi-sec_PoC-in-GitHub (G) xuetusummer_Penetration_Testing_POC (G))
	kernel              :   4.19.56     :   CVE-2022-25265    :   7.8       :   STAT           :   Exploit (Github: nomi-sec_PoC-in-GitHub (G) x0reaxeax_exec-prot-bypass (G))
	kernel              :   4.19.56     :   CVE-2022-1011     :   7.8       :   STAT           :   Exploit (PSS: 166772/Linux-FUSE-Use-After-Free.html (P) / Github: PazDak_feathers-macos-detections (G) nomi-sec_PoC-in-GitHub (G) xkaneiki_CVE-2022-1011 (G))
	kernel              :   4.19.56     :   CVE-2022-0492     :   7.8       :   STAT           :   Exploit (Github: JadenQ_Cloud-Computing-Security-ProjectPage (G) LeoPer02_IDS-Dataset (G) Metarget_metarget (G) PaloAltoNetworks_can-ctr-escape-cve-2022-0492 (G) SPuerBRead_shovel (G) SgtMate_container_escape_showcase (G) SofianeHamlaoui_CVE-2022-0492-Checker (G) T1erno_CVE-2022-0492-Docker-Breakout-Checker-and-PoC (G) Trinadh465_device_renesas_kernel_AOSP10_r33_CVE-2022-0492 (G) WhooAmii_POC_to_review (G) adavarski_HomeLab-Proxmox-k8s-DevSecOps-playground (G) adavarski_HomeLab-k8s-DevSecOps-playground (G) bashofmann_hacking-kubernetes (G) bigpick_cve-reading-list (G) cdk-team_CDK (G) chenaotian_CVE-2022-0492 (G) hardenedvault_ved (G) kvesta_vesta (G) manas3c_CVE-POC (G) marksowell_my-stars (G) marksowell_starred (G) marksowell_stars (G) nomi-sec_PoC-in-GitHub (G) puckiestyle_CVE-2022-0492 (G) sam8k_Dynamic-and-Static-Analysis-of-SOUPs (G) soosmile_POC (G) ssst0n3_ssst0n3 (G) teamssix_container-escape-check (G) ttauveron_cheatsheet (G) yoeelingBin_CVE-2022-0492-Container-Escape (G))
	kernel              :   4.19.56     :   CVE-2021-42008    :   7.8       :   STAT           :   Exploit (Github: 0xdevil_CVE-2021-42008 (G) Al1ex_LinuxEelvation (G) BachoSeven_stellestelline (G) JlSakuya_Linux-Privilege-Escalation-Exploits (G) WhooAmii_POC_to_review (G) bcoles_kasld (G) bsauce_kernel-exploit-factory (G) bsauce_kernel-security-learning (G) hardenedvault_ved (G) kdn111_linux-kernel-exploitation (G) khanhdn111_linux-kernel-exploitation (G) khanhdz-06_linux-kernel-exploitation (G) khanhdz191_linux-kernel-exploitation (G) khanhhdz_linux-kernel-exploitation (G) khanhhdz06_linux-kernel-exploitation (G) khanhnd123_linux-kernel-exploitation (G) nomi-sec_PoC-in-GitHub (G) numanturle_CVE-2021-42008 (G) soosmile_POC (G) xairy_linux-kernel-exploitation (G))
	kernel              :   4.19.56     :   CVE-2021-3715     :   7.8       :   STAT           :   Exploit (Github: CVE-2022-2588" title="Markakd_CVE-2022-2588" target="_blank" >Markakd_CVE-2022-2588 (G) Markakd_GREBE (G) Markakd_kernel_exploit (G) VoidCybersec_thatone (G) bsauce_kernel-exploit-factory (G) dom4570_CVE-2022-2588 (G) kdn111_linux-kernel-exploitation (G) khanhdn111_linux-kernel-exploitation (G) khanhdz-06_linux-kernel-exploitation (G) khanhdz191_linux-kernel-exploitation (G) khanhhdz_linux-kernel-exploitation (G) khanhhdz06_linux-kernel-exploitation (G) khanhnd123_linux-kernel-exploitation (G) xairy_linux-kernel-exploitation (G))
	kernel              :   4.19.56     :   CVE-2021-3612     :   7.8       :   STAT           :   Exploit (Github: actions-marketplace-validations_doshyt_cve-monitor (G))
	kernel              :   4.19.56     :   CVE-2021-3444     :   7.8       :   STAT           :   Exploit (Github: Wi1L-Y_News (G))
	kernel              :   4.19.56     :   CVE-2021-33909 (V):   7.8       :   STAT           :   Exploit (PSS: 163621/Sequoia-A-Deep-Root-In-Linuxs-Filesystem-Layer.html (L) / Github: ChoKyuWon_exploit_articles (G) ChrisTheCoolHut_CVE-2021-33909 (G) H0j3n_EzpzCheatSheet (G) Liang2580_CVE-2021-33909 (G) Mr-xn_Penetration_Testing_POC (G) baerwolf_cve-2021-33909 (G) bbinfosec43_CVE-2021-33909 (G) gitezri_LinuxVulnerabilities (G) hac425xxx_heap-exploitation-in-real-world (G) hardenedvault_ved (G) huike007_penetration_poc (G) joydo_CVE-Writeups (G) kaosagnt_ansible-everyday (G) kdn111_linux-kernel-exploitation (G) khanhdn111_linux-kernel-exploitation (G) khanhdz-06_linux-kernel-exploitation (G) khanhdz191_linux-kernel-exploitation (G) khanhhdz_linux-kernel-exploitation (G) khanhhdz06_linux-kernel-exploitation (G) khanhnd123_linux-kernel-exploitation (G) knewbury01_codeql-workshop-integer-conversion (G) makoto56_penetration-suite-toolkit (G) nomi-sec_PoC-in-GitHub (G) sfowl_deep-directory (G) winterwolf32_CVE-S---Penetration_Testing_POC- (G) xairy_linux-kernel-exploitation (G) xuetusummer_Penetration_Testing_POC (G))
	kernel              :   4.19.56     :   CVE-2021-3347     :   7.8       :   STAT           :   Exploit (Github: WhooAmii_POC_to_review (G) manas3c_CVE-POC (G) nanopathi_linux-4.19.72_CVE-2021-3347 (G) nomi-sec_PoC-in-GitHub (G))
	kernel              :   4.19.56     :   CVE-2021-33034    :   7.8       :   STAT           :   Exploit (Github: Trinadh465_device_renesas_kernel_AOSP10_r33_CVE-2021-33034 (G) WhooAmii_POC_to_review (G) nomi-sec_PoC-in-GitHub (G))
	kernel              :   4.19.56     :   CVE-2021-27365    :   7.8       :   STAT           :   Exploit (linux-exploit-suggester / Github: JlSakuya_Linux-Privilege-Escalation-Exploits (G) aaronxie55_Presentation2_Markdown (G) c4pt000_kernel-5.11.6-expSEHDsec-HAXM-cgroup-virtio-nvidia-amd-kaliwifi (G) eeenvik1_scripts_for_YouTrack (G) gipi_cve-cemetery (G) kdn111_linux-kernel-exploitation (G) khanhdn111_linux-kernel-exploitation (G) khanhdz-06_linux-kernel-exploitation (G) khanhdz191_linux-kernel-exploitation (G) khanhhdz_linux-kernel-exploitation (G) khanhhdz06_linux-kernel-exploitation (G) khanhnd123_linux-kernel-exploitation (G) xairy_linux-kernel-exploitation (G))
	kernel              :   4.19.56     :   CVE-2021-23134    :   7.8       :   STAT           :   Exploit (Github: kdn111_linux-kernel-exploitation (G) khanhdn111_linux-kernel-exploitation (G) khanhdz-06_linux-kernel-exploitation (G) khanhdz191_linux-kernel-exploitation (G) khanhhdz_linux-kernel-exploitation (G) khanhhdz06_linux-kernel-exploitation (G) khanhnd123_linux-kernel-exploitation (G) xairy_linux-kernel-exploitation (G))
	kernel              :   4.19.56     :   CVE-2021-22555" title="CVE-2021-22555" target="_blank" >CVE-2021-22555    :   7.8       :   STAT           :   Exploit (linux-exploit-suggester / EDB ID: 50135 / MSF: netfilter_xtables_heap_oob_write_priv_esc (L) / PSS: 163528/Linux-Kernel-Netfilter-Heap-Out-Of-Bounds-Write.html (D) / Github: Al1ex_LinuxEelvation (G) CVE-2022-0995" title="AndreevSemen_CVE-2022-0995" target="_blank" >AndreevSemen_CVE-2022-0995 (G) AvavaAYA_ctf-writeup-collection (G) B0nfee_CVE-2022-0995 (G) Bonfee_CVE-2022-0995 (G) Ch4nc3n_PublicExploitation (G) ChoKyuWon_exploit_articles (G) JlSakuya_Linux-Privilege-Escalation-Exploits (G) JoneyJunior_cve-2021-22555 (G) Metarget_awesome-cloud-native-security (G) Metarget_metarget (G) Mr-xn_Penetration_Testing_POC (G) PIG-007_kernelAll (G) Snoopy-Sec_Localroot-ALL-CVE (G) WhooAmii_POC_to_review (G) YunDingLab_struct_sanitizer (G) adavarski_HomeLab-Proxmox-k8s-DevSecOps-playground (G) adavarski_HomeLab-k8s-DevSecOps-playground (G) arttnba3_D3CTF2023_d3kcache (G) atesemre_awesome-cloud-native-security (G) bcoles_kasld (G) bcoles_kernel-exploits (G) bsauce_kernel-exploit-factory (G) bsauce_kernel-security-learning (G) cgwalters_container-cve-2021-22555 (G) cpuu_LinuxKernelCVE (G) ctrsploit_ctrsploit (G) daletoniris_CVE-2021-22555-esc-priv (G) google_security-research (G) google_security-research_security_advisories_GHSA-xxx5-8mvq-3528 (G) hac425xxx_heap-exploitation-in-real-world (G) hacking-kubernetes_hacking-kubernetes.info (G) hardenedvault_ved (G) huike007_penetration_poc (G) j4k0m_really-good-cybersec (G) joydo_CVE-Writeups (G) kdn111_linux-kernel-exploitation (G) khanhdn111_linux-kernel-exploitation (G) khanhdz-06_linux-kernel-exploitation (G) khanhdz191_linux-kernel-exploitation (G) khanhhdz_linux-kernel-exploitation (G) khanhhdz06_linux-kernel-exploitation (G) khanhnd123_linux-kernel-exploitation (G) makoto56_penetration-suite-toolkit (G) manas3c_CVE-POC (G) masjohncook_netsec-project (G) nomi-sec_PoC-in-GitHub (G) reni2study_Cloud-Native-Security2 (G) ssst0n3_ctrsploit_archived (G) teamssix_container-escape-check (G) veritas501_CVE-2021-22555-PipeVersion (G) veritas501_pipe-primitive (G) winterwolf32_CVE-S---Penetration_Testing_POC- (G) xairy_linux-kernel-exploitation (G) xuetusummer_Penetration_Testing_POC (G) xyjl-ly_CVE-2021-22555-Exploit (G))
	kernel              :   4.19.56     :   CVE-2021-20268    :   7.8       :   STAT           :   Exploit (Github: dylandreimerink_gobpfld (G))
	kernel              :   4.19.56     :   CVE-2020-29661 (V):   7.8       :   STAT           :   Exploit (PSS: 160681/Linux-TIOCSPGRP-Broken-Locking.html (P))
	kernel              :   4.19.56     :   CVE-2020-27786    :   7.8       :   STAT           :   Exploit (Github: c0ld21_ndays (G) kdn111_linux-kernel-exploitation (G) khanhdn111_linux-kernel-exploitation (G) khanhdz-06_linux-kernel-exploitation (G) khanhdz191_linux-kernel-exploitation (G) khanhhdz_linux-kernel-exploitation (G) khanhhdz06_linux-kernel-exploitation (G) khanhnd123_linux-kernel-exploitation (G) kiks7_CVE-2020-27786-Kernel-Exploit (G) xairy_linux-kernel-exploitation (G))
	kernel              :   4.19.56     :   CVE-2020-25220    :   7.8       :   STAT           :   Exploit (Github: 404notf0und_CVE-Flow (G) alphaSeclab_sec-daily-2020 (G) kdn111_linux-kernel-exploitation (G) khanhdn111_linux-kernel-exploitation (G) khanhdz-06_linux-kernel-exploitation (G) khanhdz191_linux-kernel-exploitation (G) khanhhdz_linux-kernel-exploitation (G) khanhhdz06_linux-kernel-exploitation (G) khanhnd123_linux-kernel-exploitation (G) xairy_linux-kernel-exploitation (G))
	kernel              :   4.19.56     :   CVE-2020-14386    :   7.8       :   STAT           :   Exploit (Github: 0xT11_CVE-POC (G) DNTYO_F5_Vulnerability (G) Metarget_awesome-cloud-native-security (G) Metarget_metarget (G) atesemre_awesome-cloud-native-security (G) brant-ruan_awesome-container-escape (G) cgwalters_cve-2020-14386 (G) developer3000S_PoC-in-GitHub (G) hacking-kubernetes_hacking-kubernetes.info (G) hectorgie_PoC-in-GitHub (G) kdn111_linux-kernel-exploitation (G) khanhdn111_linux-kernel-exploitation (G) khanhdz-06_linux-kernel-exploitation (G) khanhdz191_linux-kernel-exploitation (G) khanhhdz_linux-kernel-exploitation (G) khanhhdz06_linux-kernel-exploitation (G) khanhnd123_linux-kernel-exploitation (G) kruztw_CVE (G) neargle_my-re0-k8s-security (G) nomi-sec_PoC-in-GitHub (G) orgTestCodacy11KRepos110MB_repo-3574-my-re0-k8s-security (G) reni2study_Cloud-Native-Security2 (G) sderosiaux_every-single-day-i-tldr (G) soosmile_POC (G) source-xu_docker-vuls (G) taielab_awesome-hacking-lists (G) teamssix_container-escape-check (G) xairy_linux-kernel-exploitation (G))
	kernel              :   4.19.56     :   CVE-2020-14381    :   7.8       :   STAT           :   Exploit (Github: kdn111_linux-kernel-exploitation (G) khanhdn111_linux-kernel-exploitation (G) khanhdz-06_linux-kernel-exploitation (G) khanhdz191_linux-kernel-exploitation (G) khanhhdz_linux-kernel-exploitation (G) khanhhdz06_linux-kernel-exploitation (G) khanhnd123_linux-kernel-exploitation (G) nanopathi_linux-4.19.72_CVE-2020-14381 (G) nomi-sec_PoC-in-GitHub (G) xairy_linux-kernel-exploitation (G))
	kernel              :   4.19.56     :   CVE-2020-14356    :   7.8       :   STAT           :   Exploit (Github: 404notf0und_CVE-Flow (G) ShaikUsaf_linux-4.19.72_CVE-2020-14356 (G) alphaSeclab_sec-daily-2020 (G) kdn111_linux-kernel-exploitation (G) khanhdn111_linux-kernel-exploitation (G) khanhdz-06_linux-kernel-exploitation (G) khanhdz191_linux-kernel-exploitation (G) khanhhdz_linux-kernel-exploitation (G) khanhhdz06_linux-kernel-exploitation (G) khanhnd123_linux-kernel-exploitation (G) xairy_linux-kernel-exploitation (G))
	kernel              :   4.19.56     :   CVE-2020-10757    :   7.8       :   STAT           :   Exploit (Github: ShaikUsaf_linux-4.19.72_CVE-2020-10757 (G) nomi-sec_PoC-in-GitHub (G))
	kernel              :   4.19.56     :   CVE-2019-7221     :   7.8       :   STAT           :   Exploit (PSS: 151713/KVM-VMX-Preemption-Timer-Use-After-Free.html (P) / Github: torvalds_linux_commits_master_arch_x86_kvm (G))
	kernel              :   4.19.56     :   CVE-2019-19816    :   7.8       :   STAT           :   Exploit (Github: bobfuzzer_CVE_tree_master_CVE-2019-19816 (G))
	kernel              :   4.19.56     :   CVE-2019-19241    :   7.8       :   STAT           :   Exploit (EDB ID: 47779 / PSS: 155669/Linux-sendmsg-Privilege-Escalation.html (P))
	kernel              :   4.19.56     :   CVE-2019-14835    :   7.8       :   STAT           :   Exploit (Github: alphaSeclab_sec-daily-2019 (G) kaosagnt_ansible-everyday (G))
	kernel              :   4.19.56     :   CVE-2019-13272 (V):   7.8       :   STAT           :   Exploit (linux-exploit-suggester / EDB ID: 47133 / MSF: ptrace_traceme_pkexec_helper (L) / PSS: 165051/Linux-Kernel-5.1.x-PTRACE_TRACEME-pkexec-Local-Privilege-Escalation.html (L) 153663/Linux-PTRACE_TRACEME-Broken-Permission-Object-Lifetime-Handling.html (P) 156929/Linux-PTRACE_TRACEME-Local-Root.html (L) / Github: 0xMrNiko_Awesome-Red-Teaming (G) 0xT11_CVE-POC (G) Al1ex_LinuxEelvation (G) Amar224_Pentest-Tools (G) AnonVulc_Pentest-Tools (G) CVEDB_awesome-cve-repo (G) CVEDB_top (G) CnHack3r_Penetration_PoC (G) Cyc1eC_CVE-2019-13272 (G) De4dCr0w_Linux-kernel-EoP-exp (G) Getshell_LinuxTQ (G) GgKendall_secureCodingDemo (G) H0j3n_EzpzCheatSheet (G) H1CH444MREB0RN_PenTest-free-tools (G) HaleyWei_POC-available (G) Huandtx_CVE-2019-13272 (G) JERRY123S_all-poc (G) JlSakuya_Linux-Privilege-Escalation-Exploits (G) Mehedi-Babu_pentest_tools_repo (G) Mr-xn_Penetration_Testing_POC (G) ONQLin_OS-CourseDesign (G) Offensive-Penetration-Security_OPSEC-Hall-of-fame (G) RashmikaEkanayake_Privilege-Escalation-CVE-2019-13272- (G) S3cur3Th1sSh1t_Pentest-Tools (G) SexyBeast233_SecBooks (G) Snoopy-Sec_Localroot-ALL-CVE (G) Tharana_Exploiting-a-Linux-kernel-vulnerability (G) Tharana_vulnerability-exploitation (G) Waseem27-art_ART-TOOLKIT (G) YIXINSHUWU_Penetration_Testing_POC (G) YellowVeN0m_Pentesters-toolbox (G) alphaSeclab_sec-daily-2019 (G) anoaghost_Localroot_Compile (G) babyshen_CVE-2019-13272 (G) bcoles_kernel-exploits (G) bigbigliang-malwarebenchmark_cve-2019-13272 (G) cedelasen_htb-laboratory (G) chorankates_Irked (G) cyberanand1337x_bug-bounty-2022 (G) datntsec_CVE-2019-13272 (G) developer3000S_PoC-in-GitHub (G) fei9747_LinuxEelvation (G) fengjixuchui_RedTeamer (G) go-bi_go-bi-soft (G) hack-parthsharma_Pentest-Tools (G) hasee2018_Penetration_Testing_POC (G) hectorgie_PoC-in-GitHub (G) hktalent_TOP (G) huike007_penetration_poc (G) huike007_poc (G) icecliffs_Linux-For-Root (G) jana30116_CVE-2019-13272-Local-Privilege-Escalation (G) jared1981_More-Pentest-Tools (G) jas502n_CVE-2019-13272 (G) jiayy_android_vuln_poc-exp (G) karlhat_Ksplice-demo (G) lnick2023_nicenice (G) merlinepedra_Pentest-Tools (G) merlinepedra25_Pentest-Tools (G) merlinepedra25_Pentest-Tools-1 (G) n3t1nv4d3_kernel-exploits (G) nitishbadole_Pentest_Tools (G) nu11secur1ty_CVE-mitre (G) oneoy_CVE-2019-13272 (G) password520_Penetration_PoC (G) password520_RedTeamer (G) pathakabhi24_Pentest-Tools (G) pjgmonteiro_Pentest-tools (G) polosec_CVE-2019-13272 (G) pwnCmndr_LinuxPrivEsc (G) qazbnm456_awesome-cve-poc (G) rakjong_LinuxElevation (G) retr0-13_Pentest-Tools (G) severnake_Pentest-Tools (G) sumedhaDharmasena_-Kernel-ptrace-c-mishandles-vulnerability-CVE-2019-13272 (G) teddy47_CVE-2019-13272---Documentation (G) theyoge_AD-Pentesting-Tools (G) weeka10_-hktalent-TOP (G) winterwolf32_CVE-S---Penetration_Testing_POC- (G) xbl3_awesome-cve-poc_qazbnm456 (G) xuetusummer_Penetration_Testing_POC (G) yedada-wei_- (G) yedada-wei_gongkaishouji (G) (X))
	kernel              :   4.19.56     :   CVE-2016-2854     :   7.8       :   STAT           :   Exploit (EDB ID: 41761 / PSS: 141914/AUFS-Ubuntu-15.10-Privilege-Escalation.html (P))
	kernel              :   4.19.56     :   CVE-2016-2853     :   7.8       :   STAT           :   Exploit (EDB ID: 41761 / PSS: 141914/AUFS-Ubuntu-15.10-Privilege-Escalation.html (P))
	kernel              :   4.19.56     :   CVE-2015-0570     :   7.8       :   STAT           :   Exploit (Github: R0B1NL1N_linux-kernel-exploitation (G) Technoashofficial_kernel-exploitation-linux (G) kdn111_linux-kernel-exploitation (G) khanhdn111_linux-kernel-exploitation (G) khanhdz-06_linux-kernel-exploitation (G) khanhdz191_linux-kernel-exploitation (G) khanhhdz_linux-kernel-exploitation (G) khanhhdz06_linux-kernel-exploitation (G) khanhnd123_linux-kernel-exploitation (G) skbasava_Linux-Kernel-exploit (G) xairy_linux-kernel-exploitation (G))
	kernel              :   4.19.56     :   CVE-2015-0569     :   7.8       :   STAT           :   Exploit (EDB ID: 39308 / PSS: 135372/Linux-Kernel-prima-WLAN-Driver-Heap-Overflow.html (P) / Github: tangsilian_android-vuln (G))
	expat               :   2.2.6       :   CVE-2021-46143" title="CVE-2021-46143" target="_blank" >CVE-2021-46143    :   7.8       :   STAT/UEMU      :   Exploit (Github: CVE-2021-45960_CVE-2021-46143-" title="Trinadh465_external_lib_AOSP10_r33_CVE-2021-45960_CVE-2021-46143-" target="_blank" >Trinadh465_external_lib_AOSP10_r33_CVE-2021-45960_CVE-2021-46143- (G) WhooAmii_POC_to_review (G) nanopathi_external_expat_AOSP10_r33_CVE-2021-46143 (G) nomi-sec_PoC-in-GitHub (G))
	zlib                :   1.2.11      :   CVE-2018-25032    :   7.5       :   STAT           :   Exploit (Github: ZipArchive_ZipArchive (G) chainguard-dev_zlib-patch-demo (G) gatecheckdev_gatecheck (G) isgo-golgo13_gokit-gorillakit-enginesvc (G) mario206_UnityReleaseNotes-latest (G) yeforriak_snyk-to-cve (G))
	pcre                :   8.42        :   CVE-2019-20838    :   7.5       :   UEMU           :   Exploit (Github: brandoncamenisch_release-the-code-litecoin (G) cdupuis_image-api (G) dispera_giant-squid (G) domyrtille_interview_project (G) epequeno_devops-demo (G) flexiondotorg_CNCF-02 (G) garethr_snykout (G) nedenwalker_spring-boot-app-using-gradle (G) nedenwalker_spring-boot-app-with-log4j-vuln (G) onzack_trivy-multiscanner (G) yeforriak_snyk-to-cve (G))
	openssl             :   1.1.1c      :   CVE-2023-2650     :   7.5       :   STAT/UEMU      :   Exploit (Github: hshivhare67_OpenSSL_1.1.1g_CVE-2023-2650 (G) nomi-sec_PoC-in-GitHub (G))
	openssl             :   1.1.1c      :   CVE-2023-0464     :   7.5       :   STAT/UEMU      :   Exploit (Github: 1g-v_DevSec_Docker_lab (G) Trinadh465_Openssl_1.1.1g_CVE-2023-0464 (G) cloudogu_ces-build-lib (G) nomi-sec_PoC-in-GitHub (G) ortelius_ms-textfile-crud (G))
	openssl             :   1.1.1c      :   CVE-2023-0215     :   7.5       :   STAT/UEMU      :   Exploit (Github: Tuttu7_Yum-command (G) bluesentinelsec_landing-zone (G) nidhi7598_OPENSSL_1.0.2_G2.5_CVE-2023-0215 (G) nidhi7598_OPENSSL_1.1.1g_G3_CVE-2023-0215 (G) nomi-sec_PoC-in-GitHub (G) rootameen_vulpine (G))
	openssl             :   1.1.1c      :   CVE-2022-4450     :   7.5       :   STAT/UEMU      :   Exploit (Github: Tuttu7_Yum-command (G) bluesentinelsec_landing-zone (G) nidhi7598_OPENSSL_1.1.1g_G3_CVE-2022-4450 (G) nomi-sec_PoC-in-GitHub (G) peng-hui_CarpetFuzz (G) rootameen_vulpine (G) waugustus_CarpetFuzz (G) waugustus_waugustus (G))
	openssl             :   1.1.1c      :   CVE-2022-0778     :   7.5       :   STAT/UEMU      :   Exploit (Snyk: SNYK-UNMANAGED-OPENSSL-2426984 (S) / PSS: 167344/OpenSSL-1.0.2-1.1.1-3.0-BN_mod_sqrt-Infinite-Loop.html (P) / Github: 0xUhaw_CVE-2022-0778 (G) BobTheShoplifter_CVE-2022-0778-POC (G) CVEDB_awesome-cve-repo (G) CVEDB_top (G) EnableSecurity_awesome-rtc-hacking (G) JERRY123S_all-poc (G) Mr-xn_Penetration_Testing_POC (G) Mrlucas5550100_PoC-CVE-2022-0778- (G) SnailDev_github-hot-hub (G) WhooAmii_POC_to_review (G) actions-marketplace-validations_neuvector_scan-action (G) bashofmann_neuvector-image-scan-action (G) cyberanand1337x_bug-bounty-2022 (G) drago-96_CVE-2022-0778 (G) fdl66_openssl-1.0.2u-fix-cve (G) gatecheckdev_gatecheck (G) halon_changelog (G) hktalent_TOP (G) isgo-golgo13_gokit-gorillakit-enginesvc (G) jkakavas_CVE-2022-0778-POC (G) jmartinezl_jmartinezl (G) jntass_TASSL-1.1.1 (G) lonnyzhang423_github-hot-hub (G) manas3c_CVE-POC (G) neuvector_scan-action (G) nomi-sec_PoC-in-GitHub (G) soosmile_POC (G) spaquet_docker-alpine-mailcatcher (G) tianocore-docs_ThirdPartySecurityAdvisories (G) weeka10_-hktalent-TOP (G) wllm-rbnt_asn1template (G) xuetusummer_Penetration_Testing_POC (G) yywing_cve-2022-0778 (G))
	openssl             :   1.1.1c      :   CVE-2021-23840    :   7.5       :   STAT/UEMU      :   Exploit (Github: falk-werner_cve-check (G) fdl66_openssl-1.0.2u-fix-cve (G) fredrkl_trivy-demo (G) isgo-golgo13_gokit-gorillakit-enginesvc (G) jntass_TASSL-1.1.1k (G) thecyberbaby_Trivy-by-AquaSecurity (G) thecyberbaby_Trivy-by-aquaSecurity (G) vinamra28_tekton-image-scan-trivy (G))
	libcurl             :   7.61.0      :   CVE-2020-8286     :   7.5       :   STAT           :   Exploit (Github: YaleSpinup_ecr-api (G) salrashid123_envoy_mtls (G))
	libcurl             :   7.61.0      :   CVE-2019-3823     :   7.5       :   STAT           :   Exploit (Github: KorayAgaya_TrivyWeb (G) Mohzeela_external-secret (G) siddharthraopotukuchi_trivy (G) simiyo_trivy (G) t31m0_Vulnerability-Scanner-for-Containers (G) umahari_security (G))
	libcurl             :   7.61.0      :   CVE-2018-16890    :   7.5       :   STAT           :   Exploit (Github: 0xT11_CVE-POC (G) KorayAgaya_TrivyWeb (G) Mohzeela_external-secret (G) siddharthraopotukuchi_trivy (G) simiyo_trivy (G) t31m0_Vulnerability-Scanner-for-Containers (G) umahari_security (G) zjw88282740_CVE-2018-16890 (G))
	kernel              :   4.19.56     :   CVE-2022-36946    :   7.5       :   STAT           :   Exploit (Github: Mr-xn_Penetration_Testing_POC (G) Pwnzer0tt1_CVE-2022-36946 (G) Satheesh575555_linux-4.19.72_CVE-2022-36946 (G) WhooAmii_POC_to_review (G) XmasSnowISBACK_CVE-2022-36946 (G) manas3c_CVE-POC (G) nik012003_nik012003 (G) nomi-sec_PoC-in-GitHub (G) xuetusummer_Penetration_Testing_POC (G))
	kernel              :   4.19.56     :   CVE-2021-45485 (V):   7.5       :   STAT           :   Exploit (Github: Satheesh575555_linux-4.19.72_CVE-2021-45485 (G) WhooAmii_POC_to_review (G) nomi-sec_PoC-in-GitHub (G))
	kernel              :   4.19.56     :   CVE-2019-10639    :   7.5       :   STAT           :   Exploit (Github: bcoles_kasld (G))
	expat               :   2.2.6       :   CVE-2022-43680    :   7.5       :   STAT/UEMU      :   Exploit (Github: Nivaskumark_external_expat_AOSP10_r33_CVE-2022-43680 (G) Trinadh465_external_expat-2.1.0_CVE-2022-43680 (G) VeerMuchandi_s3c-springboot-demo (G) manas3c_CVE-POC (G) maxim12z_ECommerce (G) nidhi7598_expat_2.1.0_CVE-2022-43680 (G) nidhi7598_external_expat_AOSP10_r33_CVE-2022-43680 (G) nidhihcl_external_expat_2.1.0_CVE-2022-43680 (G) nomi-sec_PoC-in-GitHub (G))
	expat               :   2.2.6       :   CVE-2022-25314    :   7.5       :   STAT/UEMU      :   Exploit (Github: ShaikUsaf_external_expact_AOSP10_r33_CVE-2022-25314 (G) WhooAmii_POC_to_review (G) manas3c_CVE-POC (G) nomi-sec_PoC-in-GitHub (G))
	expat               :   2.2.6       :   CVE-2022-23990    :   7.5       :   STAT/UEMU      :   Exploit (Github: Nivaskumark_expat_A10_r33_2_2_6_CVE-2022-23990 (G) Satheesh575555_external_expat_AOSP10_r33_CVE-2022-23990 (G) WhooAmii_POC_to_review (G) gatecheckdev_gatecheck (G) manas3c_CVE-POC (G) nomi-sec_PoC-in-GitHub (G))
	expat               :   2.2.6       :   CVE-2019-15903    :   7.5       :   STAT/UEMU      :   Exploit (Snyk: SNYK-COCOAPODS-EXPAT-540503 (S) / Github: fredrkl_trivy-demo (G))
	expat               :   2.2.6       :   CVE-2018-20843    :   7.5       :   STAT/UEMU      :   Exploit (Snyk: SNYK-COCOAPODS-EXPAT-470643 (S) / Github: fredrkl_trivy-demo (G))
	openssl             :   1.1.1c      :   CVE-2023-0286     :   7.4       :   STAT/UEMU      :   Exploit (Github: Tuttu7_Yum-command (G) dejanb_guac-rs (G) nidhi7598_OPENSSL_1.1.11g_G3_CVE-2023-0286 (G) nidhi7598_OPENSSL_1.1.1g_G3_CVE-2023-0286 (G) nomi-sec_PoC-in-GitHub (G) xkcd-2347_trust-api (G))
	openssl             :   1.1.1c      :   CVE-2021-3712     :   7.4       :   STAT/UEMU      :   Exploit (Github: Frannc0_test2 (G) NeXTLinux_griffon (G) anchore_grype (G) aymankhder_scanner-for-container (G) fdl66_openssl-1.0.2u-fix-cve (G) giantswarm_starboard-exporter (G) isgo-golgo13_gokit-gorillakit-enginesvc (G) jntass_TASSL-1.1.1 (G) leonov-av_scanvus (G) lucky-sideburn_secpod_wrap (G) metapull_attackfinder (G) tianocore-docs_ThirdPartySecurityAdvisories (G))
	kernel              :   4.19.56     :   CVE-2020-25705    :   7.4       :   STAT           :   Exploit (Github: developer3000S_PoC-in-GitHub (G) hectorgie_PoC-in-GitHub (G) nanopathi_linux-4.19.72_CVE-2020-25705 (G) nomi-sec_PoC-in-GitHub (G) tdwyer_CVE-2020-25705 (G))
	kernel              :   4.19.56     :   CVE-2020-25643    :   7.2       :   STAT           :   Exploit (Github: DNTYO_F5_Vulnerability (G))
	busybox             :   1.30.1      :   CVE-2021-42386    :   7.2       :   STAT/UEMU      :   Exploit (Github: isgo-golgo13_gokit-gorillakit-enginesvc (G))
	busybox             :   1.30.1      :   CVE-2021-42385    :   7.2       :   STAT/UEMU      :   Exploit (Github: isgo-golgo13_gokit-gorillakit-enginesvc (G))
	busybox             :   1.30.1      :   CVE-2021-42384    :   7.2       :   STAT/UEMU      :   Exploit (Github: isgo-golgo13_gokit-gorillakit-enginesvc (G))
	busybox             :   1.30.1      :   CVE-2021-42382    :   7.2       :   STAT/UEMU      :   Exploit (Github: isgo-golgo13_gokit-gorillakit-enginesvc (G))
	busybox             :   1.30.1      :   CVE-2021-42381    :   7.2       :   STAT/UEMU      :   Exploit (Github: isgo-golgo13_gokit-gorillakit-enginesvc (G))
	busybox             :   1.30.1      :   CVE-2021-42380    :   7.2       :   STAT/UEMU      :   Exploit (Github: isgo-golgo13_gokit-gorillakit-enginesvc (G))
	busybox             :   1.30.1      :   CVE-2021-42379    :   7.2       :   STAT/UEMU      :   Exploit (Github: isgo-golgo13_gokit-gorillakit-enginesvc (G))
	busybox             :   1.30.1      :   CVE-2021-42378    :   7.2       :   STAT/UEMU      :   Exploit (Github: isgo-golgo13_gokit-gorillakit-enginesvc (G))
	kernel              :   4.19.56     :   CVE-2021-4204     :   7.1       :   STAT           :   Exploit (Github: Metarget_metarget (G) Mr-xn_Penetration_Testing_POC (G) WhooAmii_POC_to_review (G) kdn111_linux-kernel-exploitation (G) khanhdn111_linux-kernel-exploitation (G) khanhdz-06_linux-kernel-exploitation (G) khanhdz191_linux-kernel-exploitation (G) khanhhdz_linux-kernel-exploitation (G) khanhhdz06_linux-kernel-exploitation (G) khanhnd123_linux-kernel-exploitation (G) manas3c_CVE-POC (G) nomi-sec_PoC-in-GitHub (G) tr3ee_CVE-2021-4204 (G) xairy_linux-kernel-exploitation (G) xuetusummer_Penetration_Testing_POC (G))
	kernel              :   4.19.56     :   CVE-2021-27364    :   7.1       :   STAT           :   Exploit (Github: aaronxie55_Presentation2_Markdown (G) c4pt000_kernel-5.11.6-expSEHDsec-HAXM-cgroup-virtio-nvidia-amd-kaliwifi (G) kdn111_linux-kernel-exploitation (G) khanhdn111_linux-kernel-exploitation (G) khanhdz-06_linux-kernel-exploitation (G) khanhdz191_linux-kernel-exploitation (G) khanhhdz_linux-kernel-exploitation (G) khanhhdz06_linux-kernel-exploitation (G) khanhnd123_linux-kernel-exploitation (G) xairy_linux-kernel-exploitation (G))
	kernel              :   4.19.56     :   CVE-2020-8428 (V) :   7.1       :   STAT           :   Exploit (Github: nomi-sec_PoC-in-GitHub (G))
	dbus                :   1.12.10     :   CVE-2019-12749    :   7.1       :   UEMU           :   Exploit (Github: fbreton_lacework (G))
	kernel              :   4.19.56     :   CVE-2023-35829    :   7         :   STAT           :   Exploit (Github: 20142995_sectool (G) apkc_CVE-2023-35829-poc (G) nomi-sec_PoC-in-GitHub (G) timb-machine_linux-malware (G))
	kernel              :   4.19.56     :   CVE-2022-41222    :   7         :   STAT           :   Exploit (PSS: 168466/Linux-Stable-5.4-5.10-Use-After-Free-Race-Condition.html (P))
	kernel              :   4.19.56     :   CVE-2022-29582    :   7         :   STAT           :   Exploit (Github: Ruia-ruia_CVE-2022-29582-Exploit (G) WhooAmii_POC_to_review (G) kdn111_linux-kernel-exploitation (G) khanhdn111_linux-kernel-exploitation (G) khanhdz-06_linux-kernel-exploitation (G) khanhdz191_linux-kernel-exploitation (G) khanhhdz_linux-kernel-exploitation (G) khanhhdz06_linux-kernel-exploitation (G) khanhnd123_linux-kernel-exploitation (G) manas3c_CVE-POC (G) nomi-sec_PoC-in-GitHub (G) tr3ss_gofetch (G) xairy_linux-kernel-exploitation (G))
	kernel              :   4.19.56     :   CVE-2022-1734     :   7         :   STAT           :   Exploit (Github: torvalds_linux_commit_d270453a0d9ec10bb8a802a142fb1b3601a83098 (G))
	kernel              :   4.19.56     :   CVE-2021-44733    :   7         :   STAT           :   Exploit (Github: WhooAmii_POC_to_review (G) joydo_CVE-Writeups (G) kdn111_linux-kernel-exploitation (G) khanhdn111_linux-kernel-exploitation (G) khanhdz-06_linux-kernel-exploitation (G) khanhdz191_linux-kernel-exploitation (G) khanhhdz_linux-kernel-exploitation (G) khanhhdz06_linux-kernel-exploitation (G) khanhnd123_linux-kernel-exploitation (G) nomi-sec_PoC-in-GitHub (G) pjlantz_optee-qemu (G) pjlantz_optee-qemu_blob_main_README.md (G) soosmile_POC (G) xairy_linux-kernel-exploitation (G))
	kernel              :   4.19.56     :   CVE-2021-4083     :   7         :   STAT           :   Exploit (PSS: 165504/Linux-Garbage-Collection-Memory-Corruption.html (P) / Github: advxrsary_vuln-scanner (G) sam8k_Dynamic-and-Static-Analysis-of-SOUPs (G))
	kernel              :   4.19.56     :   CVE-2021-40490    :   7         :   STAT           :   Exploit (Github: Nivaskumark_CVE-2021-40490_kernel_v4.19.72 (G) sam8k_Dynamic-and-Static-Analysis-of-SOUPs (G))
	kernel              :   4.19.56     :   CVE-2021-3609     :   7         :   STAT           :   Exploit (Github: kdn111_linux-kernel-exploitation (G) khanhdn111_linux-kernel-exploitation (G) khanhdz-06_linux-kernel-exploitation (G) khanhdz191_linux-kernel-exploitation (G) khanhhdz_linux-kernel-exploitation (G) khanhhdz06_linux-kernel-exploitation (G) khanhnd123_linux-kernel-exploitation (G) nrb547_kernel-exploitation_blob_main_cve-2021-3609_cve-2021-3609.md (G) xairy_linux-kernel-exploitation (G))
	kernel              :   4.19.56     :   CVE-2021-32399    :   7         :   STAT           :   Exploit (Github: WhooAmii_POC_to_review (G) nanopathi_linux-4.19.72_CVE-2021-32399 (G) nomi-sec_PoC-in-GitHub (G))
	kernel              :   4.19.56     :   CVE-2020-29370 (V):   7         :   STAT           :   Exploit (Github: nanopathi_linux-4.19.72_CVE-2020-29370 (G))
	kernel              :   4.19.56     :   CVE-2020-25212    :   7         :   STAT           :   Exploit (Github: 404notf0und_CVE-Flow (G))
	kernel              :   4.19.56     :   CVE-2019-18683    :   7         :   STAT           :   Exploit (Github: 0xT11_CVE-POC (G) De4dCr0w_Linux-kernel-EoP-exp (G) Limesss_cve-2019-18683 (G) developer3000S_PoC-in-GitHub (G) hectorgie_PoC-in-GitHub (G) kdn111_linux-kernel-exploitation (G) khanhdn111_linux-kernel-exploitation (G) khanhdz-06_linux-kernel-exploitation (G) khanhdz191_linux-kernel-exploitation (G) khanhhdz_linux-kernel-exploitation (G) khanhhdz06_linux-kernel-exploitation (G) khanhnd123_linux-kernel-exploitation (G) lnick2023_nicenice (G) qazbnm456_awesome-cve-poc (G) sanjana123-cloud_CVE-2019-18683 (G) xairy_linux-kernel-exploitation (G) xbl3_awesome-cve-poc_qazbnm456 (G))
	kernel              :   4.19.56     :   CVE-2019-13233    :   7         :   STAT           :   Exploit (Github: Sec20-Paper310_Paper310 (G))
	kernel              :   4.19.56     :   CVE-2019-11599    :   7         :   STAT           :   Exploit (EDB ID: 46781 / PSS: 152663/Linux-Missing-Lockdown.html (P) / Github: HaleyWei_POC-available (G) Sec20-Paper310_Paper310 (G))
	kernel              :   4.19.56     :   CVE-2023-2002     :   6.8       :   STAT           :   Exploit (Snyk: SNYK-UNMANAGED-TORVALDSLINUX-5507220 (S) / Github: CVEDB_awesome-cve-repo (G) CVEDB_top (G) hktalent_TOP (G) lrh2000_CVE-2023-2002 (G) nomi-sec_PoC-in-GitHub (G))
	kernel              :   4.19.56     :   CVE-2021-4203 (V) :   6.8       :   STAT           :   Exploit (Github: sam8k_Dynamic-and-Static-Analysis-of-SOUPs (G))
	expat               :   2.2.6       :   CVE-2013-0340     :   6.8 (v2)  :   STAT/UEMU      :   Exploit (Github: vulsio_gost (G))
	kernel              :   4.19.56     :   CVE-2023-28772    :   6.7       :   STAT           :   Exploit (Github: Satheesh575555_linux-4.1.15_CVE-2023-28772 (G) Trinadh465_linux-4.1.15_CVE-2023-28772 (G) hheeyywweellccoommee_linux-4.1.15_CVE-2023-28772-ipchu (G) hshivhare67_kernel_v4.1.15_CVE-2023-28772 (G) nidhi7598_linux-4.19.72_CVE-2023-28772 (G) nomi-sec_PoC-in-GitHub (G))
	kernel              :   4.19.56     :   CVE-2022-2503     :   6.7       :   STAT           :   Exploit (Github: google_security-research_security_advisories_GHSA-6vq3-w69p-w63m (G))
	kernel              :   4.19.56     :   CVE-2021-42739    :   6.7       :   STAT           :   Exploit (Github: JaskaranNarula_Host_Errata_Info (G))
	kernel              :   4.19.56     :   CVE-2021-42327    :   6.7       :   STAT           :   Exploit (Github: WhooAmii_POC_to_review (G) docfate111_CVE-2021-42327 (G) kdn111_linux-kernel-exploitation (G) khanhdn111_linux-kernel-exploitation (G) khanhdz-06_linux-kernel-exploitation (G) khanhdz191_linux-kernel-exploitation (G) khanhhdz_linux-kernel-exploitation (G) khanhhdz06_linux-kernel-exploitation (G) khanhnd123_linux-kernel-exploitation (G) nomi-sec_PoC-in-GitHub (G) soosmile_POC (G) xairy_linux-kernel-exploitation (G))
	kernel              :   4.19.56     :   CVE-2022-1015" title="CVE-2022-1015" target="_blank" >CVE-2022-1015     :   6.6       :   STAT           :   Exploit (Github: CVE-2023-0179-PoC" title="H4K6_CVE-2023-0179-PoC" target="_blank" >H4K6_CVE-2023-0179-PoC (G) JlSakuya_Linux-Privilege-Escalation-Exploits (G) Mr-xn_Penetration_Testing_POC (G) TurtleARM_CVE-2023-0179-PoC (G) WhooAmii_POC_to_review (G) bsauce_kernel-exploit-factory (G) bsauce_kernel-security-learning (G) delsploit_CVE-2022-1015 (G) flexiondotorg_CNCF-02 (G) hardenedvault_ved (G) hktalent_TOP (G) kdn111_linux-kernel-exploitation (G) khanhdn111_linux-kernel-exploitation (G) khanhdz-06_linux-kernel-exploitation (G) khanhdz191_linux-kernel-exploitation (G) khanhhdz_linux-kernel-exploitation (G) khanhhdz06_linux-kernel-exploitation (G) khanhnd123_linux-kernel-exploitation (G) manas3c_CVE-POC (G) nomi-sec_PoC-in-GitHub (G) now4yreal_linux-kernel-vulnerabilities (G) now4yreal_linux-kernel-vulnerabilities-root-cause-analysis (G) pivik271_CVE-2022-1015 (G) pqlx_CVE-2022-1015 (G) pr0ln_bob_kern_exp1 (G) shuttterman_bob_kern_exp1 (G) wlswotmd_CVE-2022-1015 (G) xairy_linux-kernel-exploitation (G) xuetusummer_Penetration_Testing_POC (G) yaobinwen_robin_on_rails (G) ysanatomic_CVE-2022-1015 (G) zanezhub_CVE-2022-1015-1016 (G))
	expat               :   2.2.6       :   CVE-2022-25313    :   6.5       :   STAT/UEMU      :   Exploit (Snyk: SNYK-UNMANAGED-LIBEXPATLIBEXPAT-2404806 (S) / Github: Griggorii_Ubuntu-20.04.2-desktop-amd64_By_Griggorii_linux-image-kernel-5.6.0-oem (G) ShaikUsaf_external_expact_AOSP10_r33_CVE-2022-25313 (G) Trinadh465_external_expat-2.1.0_CVE-2022-25313 (G) WhooAmii_POC_to_review (G) libexpat_libexpat_pull_558 (G) manas3c_CVE-POC (G) nidhi7598_expat_2.1.0_G2_CVE-2022-25313 (G) nomi-sec_PoC-in-GitHub (G))
	kernel              :   4.19.56     :   CVE-2021-3573     :   6.4       :   STAT           :   Exploit (Github: hardenedvault_ved (G) kdn111_linux-kernel-exploitation (G) khanhdn111_linux-kernel-exploitation (G) khanhdz-06_linux-kernel-exploitation (G) khanhdz191_linux-kernel-exploitation (G) khanhhdz_linux-kernel-exploitation (G) khanhhdz06_linux-kernel-exploitation (G) khanhnd123_linux-kernel-exploitation (G) xairy_linux-kernel-exploitation (G))
	kernel              :   4.19.56     :   CVE-2020-25211    :   6         :   STAT           :   Exploit (Github: 404notf0und_CVE-Flow (G))
	openssl             :   1.1.1c      :   CVE-2022-4304     :   5.9       :   STAT/UEMU      :   Exploit (Github: Trinadh465_Openssl-1.1.1g_CVE-2022-4304 (G) Tuttu7_Yum-command (G) nomi-sec_PoC-in-GitHub (G))
	openssl             :   1.1.1c      :   CVE-2021-4160     :   5.9       :   STAT/UEMU      :   Exploit (Github: actions-marketplace-validations_neuvector_scan-action (G) andrewd-sysdig_nodejs-helloworld (G) bashofmann_neuvector-image-scan-action (G) fdl66_openssl-1.0.2u-fix-cve (G) neuvector_scan-action (G) tianocore-docs_ThirdPartySecurityAdvisories (G))
	openssl             :   1.1.1c      :   CVE-2021-3449     :   5.9       :   STAT/UEMU      :   Exploit (Github: AliceMongodin_NSAPool-PenTest (G) EdgeSecurityTeam_Vulnerability (G) FeFi7_attacking_embedded_linux (G) SF4bin_SEEKER_dataset (G) WhooAmii_POC_to_review (G) anquanscan_sec-tools (G) arindam0310018_04-Apr-2022-DevOps__Scan-Images-In-ACR-Using-Trivy (G) falk-werner_cve-check (G) fredrkl_trivy-demo (G) gitchangye_cve (G) isgo-golgo13_gokit-gorillakit-enginesvc (G) jntass_TASSL-1.1.1k (G) manas3c_CVE-POC (G) nomi-sec_PoC-in-GitHub (G) rnbochsr_yr_of_the_jellyfish (G) scriptzteam_glFTPd-v2.11ab-STABLE (G) soosmile_POC (G) taielab_awesome-hacking-lists (G) terorie_cve-2021-3449 (G) thecyberbaby_Trivy-by-AquaSecurity (G) thecyberbaby_Trivy-by-aquaSecurity (G) tianocore-docs_ThirdPartySecurityAdvisories (G) tzwlhack_Vulnerability (G) vinamra28_tekton-image-scan-trivy (G) yonhan3_openssl-cve (G))
	openssl             :   1.1.1c      :   CVE-2021-23841    :   5.9       :   STAT/UEMU      :   Exploit (Github: Satheesh575555_Openssl_1_1_0_CVE-2021-23841 (G) Trinadh465_external_boringssl_openssl_1.1.0g_CVE-2021-23841 (G) WhooAmii_POC_to_review (G) arindam0310018_04-Apr-2022-DevOps__Scan-Images-In-ACR-Using-Trivy (G) falk-werner_cve-check (G) fdl66_openssl-1.0.2u-fix-cve (G) fredrkl_trivy-demo (G) isgo-golgo13_gokit-gorillakit-enginesvc (G) jntass_TASSL-1.1.1k (G) manas3c_CVE-POC (G) nomi-sec_PoC-in-GitHub (G) thecyberbaby_Trivy-by-AquaSecurity (G) thecyberbaby_Trivy-by-aquaSecurity (G) vinamra28_tekton-image-scan-trivy (G))
	openssl             :   1.1.1c      :   CVE-2020-1971     :   5.9       :   STAT/UEMU      :   Exploit (Github: MBHudson_CVE-2020-1971 (G) Metztli_debian-openssl-1.1.1i (G) arindam0310018_04-Apr-2022-DevOps__Scan-Images-In-ACR-Using-Trivy (G) developer-guy_image-scanning-using-trivy-as-go-library (G) developer3000S_PoC-in-GitHub (G) fdl66_openssl-1.0.2u-fix-cve (G) fredrkl_trivy-demo (G) hectorgie_PoC-in-GitHub (G) jntass_TASSL-1.1.1k (G) nomi-sec_PoC-in-GitHub (G) scott-leung_tools (G) soosmile_POC (G) stevechanieee_-5-OpenSSL_Versioning (G) thecyberbaby_Trivy-by-AquaSecurity (G) thecyberbaby_Trivy-by-aquaSecurity (G) vinamra28_tekton-image-scan-trivy (G))
	lighttpd            :   1.4.53      :   CVE-2022-22707    :   5.9       :   STAT/UEMU      :   Exploit (Github: jreisinger_checkip (G))
	libcurl             :   7.61.0      :   CVE-2023-27536    :   5.9       :   STAT           :   Exploit (Github: 1g-v_DevSec_Docker_lab (G))
	libcurl             :   7.61.0      :   CVE-2023-27535    :   5.9       :   STAT           :   Exploit (Github: 1g-v_DevSec_Docker_lab (G))
	kernel              :   4.19.56     :   CVE-2020-28097    :   5.9       :   STAT           :   Exploit (Github: sam8k_Dynamic-and-Static-Analysis-of-SOUPs (G))
	kernel              :   4.19.56     :   CVE-2023-1998     :   5.6       :   STAT           :   Exploit (EDB ID: 51384 / Github: google_security-research_security_advisories_GHSA-mj4w-6495-6crx (G))
	kernel              :   4.19.56     :   CVE-2020-14390    :   5.6       :   STAT           :   Exploit (Github: ZIllR0_Routers (G))
	kernel              :   4.19.56     :   CVE-2023-23455    :   5.5       :   STAT           :   Exploit (Github: alopresto_epss_api_demo (G) alopresto6m_epss_api_demo (G))
	kernel              :   4.19.56     :   CVE-2023-23454    :   5.5       :   STAT           :   Exploit (Github: alopresto_epss_api_demo (G) alopresto6m_epss_api_demo (G))
	kernel              :   4.19.56     :   CVE-2023-1249     :   5.5       :   STAT           :   Exploit (PSS: 171912/CentOS-Stream-9-Missing-Kernel-Security-Fix.html (L))
	kernel              :   4.19.56     :   CVE-2022-42703 (V):   5.5       :   STAT           :   Exploit (Github: Squirre17_hbp-attack-demo (G) bcoles_kasld (G) fardeen-ahmed_Bug-bounty-Writeups (G) kdn111_linux-kernel-exploitation (G) khanhdn111_linux-kernel-exploitation (G) khanhdz-06_linux-kernel-exploitation (G) khanhdz191_linux-kernel-exploitation (G) khanhhdz_linux-kernel-exploitation (G) khanhhdz06_linux-kernel-exploitation (G) khanhnd123_linux-kernel-exploitation (G) nomi-sec_PoC-in-GitHub (G) CVE-2023-3640" title="pray77_CVE-2023-3640" target="_blank" >pray77_CVE-2023-3640 (G) pray77_SCTF2023_kernelpwn (G) veritas501_hbp_attack_demo (G) xairy_linux-kernel-exploitation (G))
	kernel              :   4.19.56     :   CVE-2022-41218    :   5.5       :   STAT           :   Exploit (Github: V4bel_CVE-2022-41218 (G) WhooAmii_POC_to_review (G) kdn111_linux-kernel-exploitation (G) khanhdn111_linux-kernel-exploitation (G) khanhdz-06_linux-kernel-exploitation (G) khanhdz191_linux-kernel-exploitation (G) khanhhdz_linux-kernel-exploitation (G) khanhhdz06_linux-kernel-exploitation (G) khanhnd123_linux-kernel-exploitation (G) manas3c_CVE-POC (G) nomi-sec_PoC-in-GitHub (G) xairy_linux-kernel-exploitation (G))
	kernel              :   4.19.56     :   CVE-2022-25375    :   5.5       :   STAT           :   Exploit (Snyk: SNYK-UNMANAGED-TORVALDSLINUX-2407769 (S) / Github: WhooAmii_POC_to_review (G) manas3c_CVE-POC (G) nomi-sec_PoC-in-GitHub (G) soosmile_POC (G) szymonh_rndis-co (G) szymonh_szymonh (G))
	kernel              :   4.19.56     :   CVE-2022-2318     :   5.5       :   STAT           :   Exploit (Github: torvalds_linux_commit_9cc02ede696272c5271a401e4f27c262359bc2f6 (G))
	kernel              :   4.19.56     :   CVE-2022-2078     :   5.5       :   STAT           :   Exploit (Github: delsploit_CVE-2022-2078 (G) kdn111_linux-kernel-exploitation (G) khanhdn111_linux-kernel-exploitation (G) khanhdz-06_linux-kernel-exploitation (G) khanhdz191_linux-kernel-exploitation (G) khanhhdz_linux-kernel-exploitation (G) khanhhdz06_linux-kernel-exploitation (G) khanhnd123_linux-kernel-exploitation (G) nomi-sec_PoC-in-GitHub (G) xairy_linux-kernel-exploitation (G))
	kernel              :   4.19.56     :   CVE-2022-1016     :   5.5       :   STAT           :   Exploit (Github: kdn111_linux-kernel-exploitation (G) khanhdn111_linux-kernel-exploitation (G) khanhdz-06_linux-kernel-exploitation (G) khanhdz191_linux-kernel-exploitation (G) khanhhdz_linux-kernel-exploitation (G) khanhhdz06_linux-kernel-exploitation (G) khanhnd123_linux-kernel-exploitation (G) xairy_linux-kernel-exploitation (G) yaobinwen_robin_on_rails (G) CVE-2022-1015-1016" title="zanezhub_CVE-2022-1015-1016" target="_blank" >zanezhub_CVE-2022-1015-1016 (G))
	kernel              :   4.19.56     :   CVE-2022-0487     :   5.5       :   STAT           :   Exploit (Github: CVE-2022-0847" title="si1ent-le_CVE-2022-0847" target="_blank" >si1ent-le_CVE-2022-0847 (G))
	kernel              :   4.19.56     :   CVE-2022-0480 (V) :   5.5       :   STAT           :   Exploit (Github: kata-containers_kata-containers_issues_3373 (G))
	kernel              :   4.19.56     :   CVE-2021-45868 (V):   5.5       :   STAT           :   Exploit (Snyk: SNYK-UNMANAGED-TORVALDSLINUX-3006722 (S))
	kernel              :   4.19.56     :   CVE-2021-4155     :   5.5       :   STAT           :   Exploit (Github: lafayette96_CVE-Errata-Tool (G))
	kernel              :   4.19.56     :   CVE-2021-4150     :   5.5       :   STAT           :   Exploit (Github: sam8k_Dynamic-and-Static-Analysis-of-SOUPs (G))
	kernel              :   4.19.56     :   CVE-2021-4148 (V) :   5.5       :   STAT           :   Exploit (Github: sam8k_Dynamic-and-Static-Analysis-of-SOUPs (G))
	kernel              :   4.19.56     :   CVE-2021-3679     :   5.5       :   STAT           :   Exploit (Github: aegistudio_RingBufferDetonator (G) nomi-sec_PoC-in-GitHub (G))
	kernel              :   4.19.56     :   CVE-2021-29650 (V):   5.5       :   STAT           :   Exploit (Github: woc-hack_tutorial (G))
	kernel              :   4.19.56     :   CVE-2021-29155    :   5.5       :   STAT           :   Exploit (Github: Kakashiiiiy_CVE-2021-29155 (G) WhooAmii_POC_to_review (G) benschlueter_CVE-2021-29155 (G) manas3c_CVE-POC (G) nomi-sec_PoC-in-GitHub (G) soosmile_POC (G))
	kernel              :   4.19.56     :   CVE-2020-36322    :   5.5       :   STAT           :   Exploit (Github: JaskaranNarula_Host_Errata_Info (G))
	kernel              :   4.19.56     :   CVE-2020-27194    :   5.5       :   STAT           :   Exploit (Github: Al1ex_LinuxEelvation (G) JlSakuya_Linux-Privilege-Escalation-Exploits (G) OrangeGzY_security-research-learning (G) bsauce_kernel-exploit-factory (G) bsauce_kernel-security-learning (G) developer3000S_PoC-in-GitHub (G) hectorgie_PoC-in-GitHub (G) kdn111_linux-kernel-exploitation (G) khanhdn111_linux-kernel-exploitation (G) khanhdz-06_linux-kernel-exploitation (G) khanhdz191_linux-kernel-exploitation (G) khanhhdz_linux-kernel-exploitation (G) khanhhdz06_linux-kernel-exploitation (G) khanhnd123_linux-kernel-exploitation (G) kruztw_CVE (G) nomi-sec_PoC-in-GitHub (G) scannells_exploits (G) willinin_CVE-2020-27194-exp (G) xairy_linux-kernel-exploitation (G) xmzyshypnc_CVE-2020-27194 (G))
	kernel              :   4.19.56     :   CVE-2020-25704    :   5.5       :   STAT           :   Exploit (Github: JaskaranNarula_Host_Errata_Info (G))
	kernel              :   4.19.56     :   CVE-2020-10720    :   5.5       :   STAT           :   Exploit (Github: 404notf0und_CVE-Flow (G))
	kernel              :   4.19.56     :   CVE-2019-9857     :   5.5       :   STAT           :   Exploit (Github: hiboma_hiboma (G))
	kernel              :   4.19.56     :   CVE-2019-7222     :   5.5       :   STAT           :   Exploit (PSS: 151712/KVM-kvm_inject_page_fault-Uninitialized-Memory-Leak.html (P) / Github: torvalds_linux_commits_master_arch_x86_kvm (G))
	kernel              :   4.19.56     :   CVE-2019-19039    :   5.5       :   STAT           :   Exploit (Github: bobfuzzer_CVE_tree_master_CVE-2019-19039 (G))
	kernel              :   4.19.56     :   CVE-2019-19037    :   5.5       :   STAT           :   Exploit (Github: bobfuzzer_CVE_tree_master_CVE-2019-19037 (G))
	kernel              :   4.19.56     :   CVE-2019-19036    :   5.5       :   STAT           :   Exploit (Github: DelspoN_CVE (G) bobfuzzer_CVE_tree_master_CVE-2019-19036 (G))
	kernel              :   4.19.56     :   CVE-2019-18885    :   5.5       :   STAT           :   Exploit (Github: 0xT11_CVE-POC (G) bobfuzzer_CVE-2019-18885 (G) developer3000S_PoC-in-GitHub (G) hectorgie_PoC-in-GitHub (G))
	dbus                :   1.12.10     :   CVE-2020-12049    :   5.5       :   UEMU           :   Exploit (PSS: 172840/D-Bus-File-Descriptor-Leak-Denial-Of-Service.html (D) / Github: fbreton_lacework (G))
	kernel              :   4.19.56     :   CVE-2020-26147    :   5.4       :   STAT           :   Exploit (Github: kali973_fragAttacks (G) vanhoefm_fragattacks (G))
	pcre                :   8.42        :   CVE-2020-14155    :   5.3       :   UEMU           :   Exploit (Github: arindam0310018_04-Apr-2022-DevOps__Scan-Images-In-ACR-Using-Trivy (G) binxio_gcr-kritis-signer (G) dispera_giant-squid (G) domyrtille_interview_project (G) epequeno_devops-demo (G) garethr_snykout (G) nedenwalker_spring-boot-app-using-gradle (G) nedenwalker_spring-boot-app-with-log4j-vuln (G) onzack_trivy-multiscanner (G))
	openssl             :   1.1.1c      :   CVE-2023-0466     :   5.3       :   STAT/UEMU      :   Exploit (Github: bluesentinelsec_landing-zone (G))
	openssl             :   1.1.1c      :   CVE-2022-2097     :   5.3       :   STAT/UEMU      :   Exploit (Github: PeterThomasAwen_OpenSSLUpgrade1.1.1q-Ubuntu (G) WhooAmii_POC_to_review (G) cdupuis_image-api (G) isgo-golgo13_gokit-gorillakit-enginesvc (G) jntass_TASSL-1.1.1 (G) manas3c_CVE-POC (G) nomi-sec_PoC-in-GitHub (G) tianocore-docs_ThirdPartySecurityAdvisories (G))
	openssl             :   1.1.1c      :   CVE-2019-1551     :   5.3       :   STAT/UEMU      :   Exploit (Github: Mohzeela_external-secret (G) arindam0310018_04-Apr-2022-DevOps__Scan-Images-In-ACR-Using-Trivy (G) fredrkl_trivy-demo (G) garethr_snykout (G) mrodden_vyger (G) siddharthraopotukuchi_trivy (G) t31m0_Vulnerability-Scanner-for-Containers (G) thecyberbaby_Trivy-by-AquaSecurity (G) thecyberbaby_Trivy-by-aquaSecurity (G) umahari_security (G) vinamra28_tekton-image-scan-trivy (G))
	openssl             :   1.1.1c      :   CVE-2019-1549     :   5.3       :   STAT/UEMU      :   Exploit (Github: Mohzeela_external-secret (G) arindam0310018_04-Apr-2022-DevOps__Scan-Images-In-ACR-Using-Trivy (G) djschleen_ash (G) fredrkl_trivy-demo (G) jntass_TASSL-1.1.1k (G) mrodden_vyger (G) siddharthraopotukuchi_trivy (G) simiyo_trivy (G) t31m0_Vulnerability-Scanner-for-Containers (G) thecyberbaby_Trivy-by-AquaSecurity (G) thecyberbaby_Trivy-by-aquaSecurity (G) umahari_security (G) vinamra28_tekton-image-scan-trivy (G))
	libcurl             :   7.61.0      :   CVE-2021-22876    :   5.3       :   STAT           :   Exploit (Github: indece-official_clair-client (G))
	busybox             :   1.30.1      :   CVE-2021-42374    :   5.3       :   STAT/UEMU      :   Exploit (Github: isgo-golgo13_gokit-gorillakit-enginesvc (G))
	kernel              :   4.19.56     :   CVE-2020-28974 (V):   5         :   STAT           :   Exploit (Github: ZIllR0_Routers (G))
	openssl             :   1.1.1c      :   CVE-2019-1547     :   4.7       :   STAT/UEMU      :   Exploit (Github: Mohzeela_external-secret (G) arindam0310018_04-Apr-2022-DevOps__Scan-Images-In-ACR-Using-Trivy (G) djschleen_ash (G) fredrkl_trivy-demo (G) jntass_TASSL-1.1.1k (G) mrodden_vyger (G) siddharthraopotukuchi_trivy (G) simiyo_trivy (G) t31m0_Vulnerability-Scanner-for-Containers (G) thecyberbaby_Trivy-by-AquaSecurity (G) thecyberbaby_Trivy-by-aquaSecurity (G) umahari_security (G) vinamra28_tekton-image-scan-trivy (G))
	kernel              :   4.19.56     :   CVE-2022-40307    :   4.7       :   STAT           :   Exploit (Github: SettRaziel_bsi_cert_bot (G))
	kernel              :   4.19.56     :   CVE-2021-33624    :   4.7       :   STAT           :   Exploit (Github: Kakashiiiiy_CVE-2021-33624 (G) WhooAmii_POC_to_review (G) benschlueter_CVE-2021-33624 (G) nomi-sec_PoC-in-GitHub (G) soosmile_POC (G))
	kernel              :   4.19.56     :   CVE-2022-25258    :   4.6       :   STAT           :   Exploit (Github: WhooAmii_POC_to_review (G) manas3c_CVE-POC (G) nomi-sec_PoC-in-GitHub (G) soosmile_POC (G) szymonh_d-os-descriptor (G) szymonh_szymonh (G))
	kernel              :   4.19.56     :   CVE-2022-0494 (V) :   4.4       :   STAT           :   Exploit (Github: sam8k_Dynamic-and-Static-Analysis-of-SOUPs (G))
	kernel              :   4.19.56     :   CVE-2021-4032     :   4.4       :   STAT           :   Exploit (Github: CVE-2021-4034-NoGCC" title="EstamelGG_CVE-2021-4034-NoGCC" target="_blank" >EstamelGG_CVE-2021-4034-NoGCC (G))
	kernel              :   4.19.56     :   CVE-2021-27363    :   4.4       :   STAT           :   Exploit (Github: aaronxie55_Presentation2_Markdown (G) c4pt000_kernel-5.11.6-expSEHDsec-HAXM-cgroup-virtio-nvidia-amd-kaliwifi (G) kdn111_linux-kernel-exploitation (G) khanhdn111_linux-kernel-exploitation (G) khanhdz-06_linux-kernel-exploitation (G) khanhdz191_linux-kernel-exploitation (G) khanhhdz_linux-kernel-exploitation (G) khanhhdz06_linux-kernel-exploitation (G) khanhnd123_linux-kernel-exploitation (G) xairy_linux-kernel-exploitation (G))
	kernel              :   4.19.56     :   CVE-2019-19045    :   4.4       :   STAT           :   Exploit (Github: torvalds_linux_commit_c8c2a057fdc7de1cd16f4baa51425b932a42eb39 (G))
	kernel              :   4.19.56     :   CVE-2019-15666    :   4.4       :   STAT           :   Exploit (linux-exploit-suggester / Github: Al1ex_LinuxEelvation (G) De4dCr0w_Linux-kernel-EoP-exp (G) JlSakuya_Linux-Privilege-Escalation-Exploits (G) bsauce_kernel-exploit-factory (G) bsauce_kernel-security-learning (G) go-bi_go-bi-soft (G) siddicky_yotjf (G))
	kernel              :   4.19.56     :   CVE-2020-26558    :   4.2       :   STAT           :   Exploit (Github: JeffroMF_awesome-bluetooth-security321 (G) engn33r_awesome-bluetooth-security (G))
	openssl             :   1.1.1c      :   CVE-2019-1563     :   3.7       :   STAT/UEMU      :   Exploit (Github: Mohzeela_external-secret (G) arindam0310018_04-Apr-2022-DevOps__Scan-Images-In-ACR-Using-Trivy (G) djschleen_ash (G) fredrkl_trivy-demo (G) jntass_TASSL-1.1.1k (G) mrodden_vyger (G) siddharthraopotukuchi_trivy (G) simiyo_trivy (G) t31m0_Vulnerability-Scanner-for-Containers (G) thecyberbaby_Trivy-by-AquaSecurity (G) thecyberbaby_Trivy-by-aquaSecurity (G) umahari_security (G) vinamra28_tekton-image-scan-trivy (G))
	libcurl             :   7.61.0      :   CVE-2021-22924    :   3.7       :   STAT           :   Exploit (Github: Trinadh465_external_curl_AOSP10_r33_CVE-2021-22924 (G) kenlavbah_log4jnotes (G) nomi-sec_PoC-in-GitHub (G))
	kernel              :   4.19.56     :   CVE-2020-24588    :   3.5       :   STAT           :   Exploit (Github: kali973_fragAttacks (G) vanhoefm_fragattacks (G))
	kernel              :   4.19.56     :   CVE-2020-24586    :   3.5       :   STAT           :   Exploit (Github: kali973_fragAttacks (G) vanhoefm_fragattacks (G))
	openssl             :   1.1.1c      :   CVE-2019-1552     :   3.3       :   STAT/UEMU      :   Exploit (Github: imhunterand_hackerone-publicy-disclosed (G) javirodriguezzz_Shodan-Browser (G) jntass_TASSL-1.1.1k (G))
	kernel              :   4.19.56     :   CVE-2022-32296    :   3.3       :   STAT           :   Exploit (Github: 0xkol_rfc6056-device-tracker (G))
	kernel              :   4.19.56     :   CVE-2020-24587    :   2.6       :   STAT           :   Exploit (Github: kali973_fragAttacks (G) vanhoefm_fragattacks (G))