{"uuid": "a1c2575e-f6af-4807-9d06-dac4684dfb6e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2021-44659", "type": "published-proof-of-concept", "source": "https://t.me/BlueRedTeam/1558", "content": "#exploit\n1. CVE-2021-44659:\nAdding a new pipeline in GoCD server 21.3.0 has a functionality that could be abused to do an un-intended action in order to achieve a SSRF\nhttps://github.com/Mesh3l911/CVE-2021-44659\n\n2. A buffer overflow vulnerability in a babykernel.ko driver. The exploit is written in a way to bypass SMEP protection and the technique used is ret2usr\nhttps://github.com/0x3SC4L4T3/Babykernel-ctf-ret2usr\n\n@BlueRedTeam", "creation_timestamp": "2021-12-23T04:24:58.000000Z"}