2024-11-29 03:31:51 +09:00
[
{
"id" : 813202333 ,
"name" : "CVE-2024-26229" ,
"full_name" : "varwara\/CVE-2024-26229" ,
"owner" : {
"login" : "varwara" ,
"id" : 167913816 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/167913816?v=4" ,
"html_url" : "https:\/\/github.com\/varwara" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/varwara\/CVE-2024-26229" ,
"description" : "CWE-781: Improper Address Validation in IOCTL with METHOD_NEITHER I\/O Control Code" ,
"fork" : false ,
"created_at" : "2024-06-10T17:02:03Z" ,
2024-12-15 03:32:08 +09:00
"updated_at" : "2024-12-14T18:01:42Z" ,
2024-11-29 03:31:51 +09:00
"pushed_at" : "2024-07-04T10:39:15Z" ,
2024-12-15 03:32:08 +09:00
"stargazers_count" : 326 ,
"watchers_count" : 326 ,
2024-11-29 03:31:51 +09:00
"has_discussions" : false ,
"forks_count" : 63 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 63 ,
2024-12-15 03:32:08 +09:00
"watchers" : 326 ,
2024-11-29 03:31:51 +09:00
"score" : 0 ,
"subscribers_count" : 5
} ,
{
"id" : 813503450 ,
"name" : "CVE-2024-26229-exploit" ,
"full_name" : "RalfHacker\/CVE-2024-26229-exploit" ,
"owner" : {
"login" : "RalfHacker" ,
"id" : 54005327 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/54005327?v=4" ,
"html_url" : "https:\/\/github.com\/RalfHacker" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/RalfHacker\/CVE-2024-26229-exploit" ,
"description" : "Windows LPE" ,
"fork" : false ,
"created_at" : "2024-06-11T08:03:29Z" ,
2024-12-18 15:32:30 +09:00
"updated_at" : "2024-12-18T02:05:23Z" ,
2024-11-29 03:31:51 +09:00
"pushed_at" : "2024-06-11T20:41:59Z" ,
2024-12-18 15:32:30 +09:00
"stargazers_count" : 111 ,
"watchers_count" : 111 ,
2024-11-29 03:31:51 +09:00
"has_discussions" : false ,
"forks_count" : 23 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 23 ,
2024-12-18 15:32:30 +09:00
"watchers" : 111 ,
2024-11-29 03:31:51 +09:00
"score" : 0 ,
2024-12-14 21:32:03 +09:00
"subscribers_count" : 2
2024-11-29 03:31:51 +09:00
} ,
{
"id" : 814637832 ,
"name" : "CVE-2024-26229-BOF" ,
"full_name" : "apkc\/CVE-2024-26229-BOF" ,
"owner" : {
"login" : "apkc" ,
"id" : 18083944 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/18083944?v=4" ,
"html_url" : "https:\/\/github.com\/apkc" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/apkc\/CVE-2024-26229-BOF" ,
"description" : "BOF implementations of CVE-2024-26229 for Cobalt Strike and BruteRatel" ,
"fork" : false ,
"created_at" : "2024-06-13T11:57:50Z" ,
2024-12-18 15:32:30 +09:00
"updated_at" : "2024-12-18T02:07:23Z" ,
2024-11-29 03:31:51 +09:00
"pushed_at" : "2024-06-13T07:30:48Z" ,
2024-12-18 15:32:30 +09:00
"stargazers_count" : 16 ,
"watchers_count" : 16 ,
2024-11-29 03:31:51 +09:00
"has_discussions" : false ,
"forks_count" : 32 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 32 ,
2024-12-18 15:32:30 +09:00
"watchers" : 16 ,
2024-11-29 03:31:51 +09:00
"score" : 0 ,
"subscribers_count" : 0
} ,
{
"id" : 815768749 ,
"name" : "CVE-2024-26229" ,
"full_name" : "team-MineDEV\/CVE-2024-26229" ,
"owner" : {
"login" : "team-MineDEV" ,
"id" : 149191616 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/149191616?v=4" ,
"html_url" : "https:\/\/github.com\/team-MineDEV" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/team-MineDEV\/CVE-2024-26229" ,
"description" : "Windows CSC服务特权提升漏洞。 当程序向缓冲区写入的数据超出其处理能力时,就会发生基于堆的缓冲区溢出,从而导致多余的数据溢出到相邻的内存区域。这种溢出会损坏内存,并可能使攻击者能够执行任意代码或未经授权访问系统。本质上,攻击者可以编写触发溢出的恶意代码或输入,从而控制受影响的系统、执行任意命令、安装恶意软件或访问敏感数据。 微软已发出警告成功利用此漏洞的攻击者可以获得 SYSTEM 权限,这是 Windows 系统上的最高访问级别。这增加了与 CVE-2024-26229 相关的风险,使其成为恶意行为者的主要目标。" ,
"fork" : false ,
"created_at" : "2024-06-16T05:06:31Z" ,
"updated_at" : "2024-11-02T06:09:23Z" ,
"pushed_at" : "2024-06-16T05:29:26Z" ,
"stargazers_count" : 10 ,
"watchers_count" : 10 ,
"has_discussions" : false ,
"forks_count" : 3 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 3 ,
"watchers" : 10 ,
"score" : 0 ,
"subscribers_count" : 1
} ,
{
"id" : 838016004 ,
"name" : "eop24-26229" ,
"full_name" : "Cracked5pider\/eop24-26229" ,
"owner" : {
"login" : "Cracked5pider" ,
"id" : 51360176 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/51360176?v=4" ,
"html_url" : "https:\/\/github.com\/Cracked5pider" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/Cracked5pider\/eop24-26229" ,
"description" : "A firebeam plugin that exploits the CVE-2024-26229 vulnerability to perform elevation of privilege from a unprivileged user" ,
"fork" : false ,
"created_at" : "2024-08-04T17:40:51Z" ,
2024-12-15 09:31:47 +09:00
"updated_at" : "2024-12-14T19:10:57Z" ,
2024-11-29 03:31:51 +09:00
"pushed_at" : "2024-08-15T10:48:05Z" ,
2024-12-15 09:31:47 +09:00
"stargazers_count" : 34 ,
"watchers_count" : 34 ,
2024-11-29 03:31:51 +09:00
"has_discussions" : false ,
"forks_count" : 6 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 6 ,
2024-12-15 09:31:47 +09:00
"watchers" : 34 ,
2024-11-29 03:31:51 +09:00
"score" : 0 ,
"subscribers_count" : 2
} ,
{
"id" : 871953279 ,
"name" : "CVE-2024-26229" ,
"full_name" : "mqxmm\/CVE-2024-26229" ,
"owner" : {
"login" : "mqxmm" ,
"id" : 79595418 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/79595418?v=4" ,
"html_url" : "https:\/\/github.com\/mqxmm" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/mqxmm\/CVE-2024-26229" ,
"description" : null ,
"fork" : false ,
"created_at" : "2024-10-13T12:10:35Z" ,
"updated_at" : "2024-10-13T12:11:24Z" ,
"pushed_at" : "2024-10-13T12:11:21Z" ,
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"has_discussions" : false ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 0 ,
"score" : 0 ,
"subscribers_count" : 1
}
]