{"uuid": "2165c40a-b7f9-412e-8e14-0bbd9f756c6f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2021-44659", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/5038", "content": "#exploit\n1. CVE-2021-44659:\nAdding a new pipeline in GoCD server 21.3.0 has a functionality that could be abused to do an un-intended action in order to achieve a SSRF\nhttps://github.com/Mesh3l911/CVE-2021-44659\n\n2. A buffer overflow vulnerability in a babykernel.ko driver. The exploit is written in a way to bypass SMEP protection and the technique used is ret2usr\nhttps://github.com/0x3SC4L4T3/Babykernel-ctf-ret2usr", "creation_timestamp": "2021-12-23T11:12:01.000000Z"}