Auto Update 2024/12/12 00:31:58

This commit is contained in:
motikan2010-bot 2024-12-12 09:31:58 +09:00
parent bde9c6452d
commit 5c545dcd89
28 changed files with 105 additions and 209 deletions

View file

@ -19,13 +19,13 @@
"stargazers_count": 74,
"watchers_count": 74,
"has_discussions": false,
"forks_count": 42,
"forks_count": 40,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 42,
"forks": 40,
"watchers": 74,
"score": 0,
"subscribers_count": 9

View file

@ -1,33 +0,0 @@
[
{
"id": 116948258,
"name": "Firefox-35-37-Exploit",
"full_name": "Afudadi\/Firefox-35-37-Exploit",
"owner": {
"login": "Afudadi",
"id": 20081823,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/20081823?v=4",
"html_url": "https:\/\/github.com\/Afudadi",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/Afudadi\/Firefox-35-37-Exploit",
"description": "CVE-2015-0816 + CVE-2015-0802",
"fork": false,
"created_at": "2018-01-10T11:21:36Z",
"updated_at": "2018-06-03T05:44:57Z",
"pushed_at": "2017-12-01T01:23:42Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 2
}
]

View file

@ -1,33 +0,0 @@
[
{
"id": 121688406,
"name": "CVE-2016-0034-Decompile",
"full_name": "hybridious\/CVE-2016-0034-Decompile",
"owner": {
"login": "hybridious",
"id": 26754785,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/26754785?v=4",
"html_url": "https:\/\/github.com\/hybridious",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/hybridious\/CVE-2016-0034-Decompile",
"description": "CVE-2016-0034 Decompile",
"fork": false,
"created_at": "2018-02-15T22:05:01Z",
"updated_at": "2022-01-19T08:26:38Z",
"pushed_at": "2017-12-01T01:30:04Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -29,36 +29,5 @@
"watchers": 1,
"score": 0,
"subscribers_count": 2
},
{
"id": 121688426,
"name": "CVE-2016-4117",
"full_name": "hybridious\/CVE-2016-4117",
"owner": {
"login": "hybridious",
"id": 26754785,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/26754785?v=4",
"html_url": "https:\/\/github.com\/hybridious",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/hybridious\/CVE-2016-4117",
"description": "CVE-2016-4117",
"fork": false,
"created_at": "2018-02-15T22:05:08Z",
"updated_at": "2023-11-18T03:10:27Z",
"pushed_at": "2017-12-01T01:21:05Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 6,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 6,
"watchers": 1,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -462,10 +462,10 @@
"description": "Dirty Cow exploit - CVE-2016-5195",
"fork": false,
"created_at": "2016-11-25T21:08:01Z",
"updated_at": "2024-12-07T09:43:35Z",
"updated_at": "2024-12-11T20:44:31Z",
"pushed_at": "2021-04-08T11:35:12Z",
"stargazers_count": 864,
"watchers_count": 864,
"stargazers_count": 865,
"watchers_count": 865,
"has_discussions": false,
"forks_count": 426,
"allow_forking": true,
@ -478,7 +478,7 @@
],
"visibility": "public",
"forks": 426,
"watchers": 864,
"watchers": 865,
"score": 0,
"subscribers_count": 9
},

View file

@ -1644,13 +1644,13 @@
"stargazers_count": 9,
"watchers_count": 9,
"has_discussions": false,
"forks_count": 161,
"forks_count": 160,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 161,
"forks": 160,
"watchers": 9,
"score": 0,
"subscribers_count": 1

View file

@ -200,10 +200,10 @@
"description": "Vulnerability analysis and PoC for the Apache Tomcat - CGIServlet enableCmdLineArguments Remote Code Execution (RCE)",
"fork": false,
"created_at": "2021-03-25T20:09:54Z",
"updated_at": "2024-08-24T04:48:14Z",
"updated_at": "2024-12-11T20:21:18Z",
"pushed_at": "2021-09-04T00:45:00Z",
"stargazers_count": 16,
"watchers_count": 16,
"stargazers_count": 17,
"watchers_count": 17,
"has_discussions": false,
"forks_count": 9,
"allow_forking": true,
@ -216,7 +216,7 @@
],
"visibility": "public",
"forks": 9,
"watchers": 16,
"watchers": 17,
"score": 0,
"subscribers_count": 2
},

View file

@ -1095,7 +1095,7 @@
"forks": 86,
"watchers": 240,
"score": 0,
"subscribers_count": 13
"subscribers_count": 12
},
{
"id": 251510910,
@ -1418,7 +1418,7 @@
"forks": 170,
"watchers": 540,
"score": 0,
"subscribers_count": 26
"subscribers_count": 25
},
{
"id": 257849182,
@ -1764,7 +1764,7 @@
"forks": 16,
"watchers": 46,
"score": 0,
"subscribers_count": 9
"subscribers_count": 8
},
{
"id": 296190446,

View file

@ -32,7 +32,7 @@
"forks": 45,
"watchers": 145,
"score": 0,
"subscribers_count": 16
"subscribers_count": 15
},
{
"id": 277048370,

View file

@ -28,7 +28,7 @@
"forks": 4,
"watchers": 3,
"score": 0,
"subscribers_count": 36
"subscribers_count": 37
},
{
"id": 320642790,

View file

@ -2383,10 +2383,10 @@
"description": "Apache2 2.4.49 - LFI & RCE Exploit - CVE-2021-41773",
"fork": false,
"created_at": "2022-03-12T21:24:55Z",
"updated_at": "2024-12-04T06:22:14Z",
"updated_at": "2024-12-11T18:43:30Z",
"pushed_at": "2022-03-12T21:30:58Z",
"stargazers_count": 99,
"watchers_count": 99,
"stargazers_count": 100,
"watchers_count": 100,
"has_discussions": false,
"forks_count": 34,
"allow_forking": true,
@ -2404,7 +2404,7 @@
],
"visibility": "public",
"forks": 34,
"watchers": 99,
"watchers": 100,
"score": 0,
"subscribers_count": 2
},

View file

@ -935,10 +935,10 @@
"description": "A Proof-Of-Concept for the CVE-2021-44228 vulnerability. ",
"fork": false,
"created_at": "2021-12-10T23:19:28Z",
"updated_at": "2024-12-11T02:31:33Z",
"updated_at": "2024-12-11T22:08:09Z",
"pushed_at": "2024-02-12T22:37:25Z",
"stargazers_count": 1812,
"watchers_count": 1812,
"stargazers_count": 1810,
"watchers_count": 1810,
"has_discussions": false,
"forks_count": 529,
"allow_forking": true,
@ -952,7 +952,7 @@
],
"visibility": "public",
"forks": 529,
"watchers": 1812,
"watchers": 1810,
"score": 0,
"subscribers_count": 26
},
@ -3749,7 +3749,7 @@
"description": "A fully automated, accurate, and extensive scanner for finding log4j RCE CVE-2021-44228 ",
"fork": false,
"created_at": "2021-12-13T03:57:50Z",
"updated_at": "2024-12-11T02:31:56Z",
"updated_at": "2024-12-11T22:08:09Z",
"pushed_at": "2022-11-23T18:23:24Z",
"stargazers_count": 3405,
"watchers_count": 3405,
@ -5635,7 +5635,7 @@
"fork": false,
"created_at": "2021-12-14T06:37:59Z",
"updated_at": "2024-11-16T19:51:31Z",
"pushed_at": "2024-04-24T05:35:26Z",
"pushed_at": "2024-12-11T23:04:50Z",
"stargazers_count": 386,
"watchers_count": 386,
"has_discussions": false,

View file

@ -107,10 +107,10 @@
"description": "A root exploit for CVE-2022-0847 (Dirty Pipe)",
"fork": false,
"created_at": "2022-03-07T18:55:20Z",
"updated_at": "2024-11-16T06:35:35Z",
"updated_at": "2024-12-11T23:56:20Z",
"pushed_at": "2022-03-08T06:20:05Z",
"stargazers_count": 1092,
"watchers_count": 1092,
"stargazers_count": 1093,
"watchers_count": 1093,
"has_discussions": false,
"forks_count": 218,
"allow_forking": true,
@ -119,7 +119,7 @@
"topics": [],
"visibility": "public",
"forks": 218,
"watchers": 1092,
"watchers": 1093,
"score": 0,
"subscribers_count": 17
},
@ -1163,10 +1163,10 @@
"description": "A collection of exploits and documentation that can be used to exploit the Linux Dirty Pipe vulnerability.",
"fork": false,
"created_at": "2022-03-12T20:57:24Z",
"updated_at": "2024-12-10T01:23:32Z",
"updated_at": "2024-12-11T19:59:24Z",
"pushed_at": "2023-05-20T05:55:45Z",
"stargazers_count": 557,
"watchers_count": 557,
"stargazers_count": 558,
"watchers_count": 558,
"has_discussions": false,
"forks_count": 142,
"allow_forking": true,
@ -1175,7 +1175,7 @@
"topics": [],
"visibility": "public",
"forks": 142,
"watchers": 557,
"watchers": 558,
"score": 0,
"subscribers_count": 15
},

View file

@ -112,7 +112,7 @@
"description": "Dockerized POC for CVE-2022-42889 Text4Shell",
"fork": false,
"created_at": "2022-10-18T09:58:00Z",
"updated_at": "2024-11-04T12:12:36Z",
"updated_at": "2024-12-11T23:18:37Z",
"pushed_at": "2022-11-14T17:12:41Z",
"stargazers_count": 75,
"watchers_count": 75,
@ -151,10 +151,10 @@
"description": "cve-2022-42889 Text4Shell CVE-2022-42889 affects Apache Commons Text versions 1.5 through 1.9. It has been patched as of Commons Text version 1.10. ",
"fork": false,
"created_at": "2022-10-18T13:53:55Z",
"updated_at": "2024-08-12T20:27:52Z",
"updated_at": "2024-12-11T23:18:39Z",
"pushed_at": "2022-10-18T14:10:07Z",
"stargazers_count": 37,
"watchers_count": 37,
"stargazers_count": 38,
"watchers_count": 38,
"has_discussions": false,
"forks_count": 14,
"allow_forking": true,
@ -163,7 +163,7 @@
"topics": [],
"visibility": "public",
"forks": 14,
"watchers": 37,
"watchers": 38,
"score": 0,
"subscribers_count": 1
},
@ -325,10 +325,10 @@
"description": "A fully automated, accurate, and extensive scanner for finding text4shell RCE CVE-2022-42889",
"fork": false,
"created_at": "2022-10-19T20:14:22Z",
"updated_at": "2024-08-12T20:27:54Z",
"updated_at": "2024-12-11T23:46:43Z",
"pushed_at": "2022-10-20T12:51:08Z",
"stargazers_count": 50,
"watchers_count": 50,
"stargazers_count": 51,
"watchers_count": 51,
"has_discussions": false,
"forks_count": 14,
"allow_forking": true,
@ -337,7 +337,7 @@
"topics": [],
"visibility": "public",
"forks": 14,
"watchers": 50,
"watchers": 51,
"score": 0,
"subscribers_count": 3
},

View file

@ -267,10 +267,10 @@
"description": "This PoC is targeting vulnerabilities in Palo Alto PAN-OS, specifically CVE-2024-0012 and CVE-2024-9474. This script automates the exploitation process, including payload creation, chunked delivery, and seamless command execution.",
"fork": false,
"created_at": "2024-12-11T18:13:32Z",
"updated_at": "2024-12-11T18:13:36Z",
"pushed_at": "2024-12-11T18:13:32Z",
"stargazers_count": 0,
"watchers_count": 0,
"updated_at": "2024-12-11T19:30:50Z",
"pushed_at": "2024-12-11T19:22:20Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -279,7 +279,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 0
}

View file

@ -14,10 +14,10 @@
"description": "CVE-2024-11477 7Zip Code Execution Writeup and Analysis",
"fork": false,
"created_at": "2024-11-29T06:13:36Z",
"updated_at": "2024-12-11T18:20:01Z",
"updated_at": "2024-12-11T22:04:10Z",
"pushed_at": "2024-12-04T01:01:28Z",
"stargazers_count": 37,
"watchers_count": 37,
"stargazers_count": 39,
"watchers_count": 39,
"has_discussions": false,
"forks_count": 7,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 7,
"watchers": 37,
"watchers": 39,
"score": 0,
"subscribers_count": 1
}

View file

@ -14,8 +14,8 @@
"description": "This repository contains a Proof of Concept (PoC) exploit for CVE-2024-11680, a critical vulnerability in ProjectSend r1605 and older versions. The exploit targets a Cross-Site Request Forgery (CSRF) flaw in combination with Privilege Misconfiguration issues.",
"fork": false,
"created_at": "2024-12-04T18:42:43Z",
"updated_at": "2024-12-10T05:27:17Z",
"pushed_at": "2024-12-04T19:25:34Z",
"updated_at": "2024-12-11T23:45:35Z",
"pushed_at": "2024-12-11T23:45:31Z",
"stargazers_count": 10,
"watchers_count": 10,
"has_discussions": false,

View file

@ -14,10 +14,10 @@
"description": "This repository automates the process of exploiting CVE-2024-25641 on Cacti 1.2.26",
"fork": false,
"created_at": "2024-08-26T13:34:35Z",
"updated_at": "2024-09-12T10:30:25Z",
"updated_at": "2024-12-11T23:38:31Z",
"pushed_at": "2024-09-05T11:52:22Z",
"stargazers_count": 6,
"watchers_count": 6,
"stargazers_count": 7,
"watchers_count": 7,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
@ -33,7 +33,7 @@
],
"visibility": "public",
"forks": 1,
"watchers": 6,
"watchers": 7,
"score": 0,
"subscribers_count": 1
},

View file

@ -14,10 +14,10 @@
"description": "CWE-781: Improper Address Validation in IOCTL with METHOD_NEITHER I\/O Control Code",
"fork": false,
"created_at": "2024-06-10T17:02:03Z",
"updated_at": "2024-12-11T09:24:17Z",
"updated_at": "2024-12-11T21:04:57Z",
"pushed_at": "2024-07-04T10:39:15Z",
"stargazers_count": 324,
"watchers_count": 324,
"stargazers_count": 325,
"watchers_count": 325,
"has_discussions": false,
"forks_count": 63,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 63,
"watchers": 324,
"watchers": 325,
"score": 0,
"subscribers_count": 5
},

View file

@ -14,10 +14,10 @@
"description": "CVE-2024-31317",
"fork": false,
"created_at": "2024-12-05T01:36:59Z",
"updated_at": "2024-12-06T13:11:25Z",
"updated_at": "2024-12-11T19:49:37Z",
"pushed_at": "2024-12-05T01:52:45Z",
"stargazers_count": 10,
"watchers_count": 10,
"stargazers_count": 11,
"watchers_count": 11,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 10,
"watchers": 11,
"score": 0,
"subscribers_count": 1
}

View file

@ -417,10 +417,10 @@
"description": "CVE-2024-3400 PAN-OS: OS Command Injection Vulnerability in GlobalProtect",
"fork": false,
"created_at": "2024-04-16T21:24:15Z",
"updated_at": "2024-12-10T20:24:07Z",
"updated_at": "2024-12-11T19:07:34Z",
"pushed_at": "2024-04-17T11:03:32Z",
"stargazers_count": 20,
"watchers_count": 20,
"stargazers_count": 21,
"watchers_count": 21,
"has_discussions": false,
"forks_count": 4,
"allow_forking": true,
@ -429,7 +429,7 @@
"topics": [],
"visibility": "public",
"forks": 4,
"watchers": 20,
"watchers": 21,
"score": 0,
"subscribers_count": 2
},

View file

@ -11,10 +11,10 @@
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/passtheticket\/CVE-2024-38200",
"description": "Microsoft Office NTLMv2 Disclosure Vulnerability - Not Fixed For Capturing Over HTTP",
"description": "CVE-2024-38200 & CVE-2024-43609 - Microsoft Office NTLMv2 Disclosure Vulnerability",
"fork": false,
"created_at": "2024-09-24T19:24:55Z",
"updated_at": "2024-12-09T22:58:27Z",
"updated_at": "2024-12-11T21:46:18Z",
"pushed_at": "2024-12-09T22:58:22Z",
"stargazers_count": 129,
"watchers_count": 129,

View file

@ -45,10 +45,10 @@
"description": "CVE-2024-40711-exp",
"fork": false,
"created_at": "2024-10-16T05:02:27Z",
"updated_at": "2024-12-11T13:20:45Z",
"updated_at": "2024-12-11T22:25:02Z",
"pushed_at": "2024-10-17T01:06:42Z",
"stargazers_count": 28,
"watchers_count": 28,
"stargazers_count": 30,
"watchers_count": 30,
"has_discussions": false,
"forks_count": 5,
"allow_forking": true,
@ -57,7 +57,7 @@
"topics": [],
"visibility": "public",
"forks": 5,
"watchers": 28,
"watchers": 30,
"score": 0,
"subscribers_count": 1
},

View file

@ -45,10 +45,10 @@
"description": "Exploit for CVE-2024-48990 (Local Privilege Escalation in needrestart < 3.8)",
"fork": false,
"created_at": "2024-11-21T23:59:49Z",
"updated_at": "2024-12-02T13:30:46Z",
"updated_at": "2024-12-11T19:06:31Z",
"pushed_at": "2024-11-22T01:17:00Z",
"stargazers_count": 1,
"watchers_count": 1,
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -57,7 +57,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"watchers": 2,
"score": 0,
"subscribers_count": 1
},

View file

@ -14,19 +14,19 @@
"description": "Cleo Unrestricted file upload and download PoC (CVE-2024-50623)",
"fork": false,
"created_at": "2024-12-11T14:19:55Z",
"updated_at": "2024-12-11T16:28:00Z",
"updated_at": "2024-12-11T19:45:47Z",
"pushed_at": "2024-12-11T14:23:19Z",
"stargazers_count": 0,
"watchers_count": 0,
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 0,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"forks": 1,
"watchers": 2,
"score": 0,
"subscribers_count": 0
}

View file

@ -14,10 +14,10 @@
"description": "Proof-of-Concept for CVE-2024-5932 GiveWP PHP Object Injection ",
"fork": false,
"created_at": "2024-08-21T09:51:21Z",
"updated_at": "2024-11-20T16:31:02Z",
"updated_at": "2024-12-11T23:50:45Z",
"pushed_at": "2024-08-22T15:20:46Z",
"stargazers_count": 1,
"watchers_count": 1,
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"watchers": 2,
"score": 0,
"subscribers_count": 1
},

View file

@ -14,10 +14,10 @@
"description": "a signal handler race condition in OpenSSH's server (sshd)",
"fork": false,
"created_at": "2024-07-01T10:55:29Z",
"updated_at": "2024-12-11T11:28:05Z",
"updated_at": "2024-12-11T20:03:37Z",
"pushed_at": "2024-07-01T10:54:02Z",
"stargazers_count": 467,
"watchers_count": 467,
"stargazers_count": 468,
"watchers_count": 468,
"has_discussions": false,
"forks_count": 181,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 181,
"watchers": 467,
"watchers": 468,
"score": 0,
"subscribers_count": 5
},

View file

@ -6146,7 +6146,11 @@
- [partywavesec/CVE-2024-42346](https://github.com/partywavesec/CVE-2024-42346)
### CVE-2024-42448
### CVE-2024-42448 (2024-12-11)
<code>From the VSPC management agent machine, under condition that the management agent is authorized on the server, it is possible to perform Remote Code Execution (RCE) on the VSPC server machine.
</code>
- [h3lye/CVE-2024-42448-RCE](https://github.com/h3lye/CVE-2024-42448-RCE)
### CVE-2024-42461 (2024-08-02)
@ -7398,7 +7402,11 @@
### CVE-2024-55557
- [partywavesec/CVE-2024-55557](https://github.com/partywavesec/CVE-2024-55557)
### CVE-2024-55587
### CVE-2024-55587 (2024-12-11)
<code>python-libarchive through 4.2.1 allows directory traversal (to create files) in extract in zip.py for ZipFile.extractall and ZipFile.extract.
</code>
- [CSIRTTrizna/CVE-2024-55587](https://github.com/CSIRTTrizna/CVE-2024-55587)
### CVE-2024-1642470
@ -44610,13 +44618,6 @@
## 2016
### CVE-2016-0034 (2016-01-13)
<code>Microsoft Silverlight 5 before 5.1.41212.0 mishandles negative offsets during decoding, which allows remote attackers to execute arbitrary code or cause a denial of service (object-header corruption) via a crafted web site, aka &quot;Silverlight Runtime Remote Code Execution Vulnerability.&quot;
</code>
- [hybridious/CVE-2016-0034-Decompile](https://github.com/hybridious/CVE-2016-0034-Decompile)
### CVE-2016-0040 (2016-02-10)
<code>The kernel in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, and Windows 7 SP1 allows local users to gain privileges via a crafted application, aka &quot;Windows Elevation of Privilege Vulnerability.&quot;
@ -45163,7 +45164,6 @@
</code>
- [amit-raut/CVE-2016-4117-Report](https://github.com/amit-raut/CVE-2016-4117-Report)
- [hybridious/CVE-2016-4117](https://github.com/hybridious/CVE-2016-4117)
### CVE-2016-4437 (2016-06-07)
@ -45975,13 +45975,6 @@
- [betalphafai/CVE-2015-0568](https://github.com/betalphafai/CVE-2015-0568)
### CVE-2015-0816 (2015-04-01)
<code>Mozilla Firefox before 37.0, Firefox ESR 31.x before 31.6, and Thunderbird before 31.6 do not properly restrict resource: URLs, which makes it easier for remote attackers to execute arbitrary JavaScript code with chrome privileges by leveraging the ability to bypass the Same Origin Policy, as demonstrated by the resource: URL associated with PDF.js.
</code>
- [Afudadi/Firefox-35-37-Exploit](https://github.com/Afudadi/Firefox-35-37-Exploit)
### CVE-2015-1130 (2015-04-10)
<code>The XPC implementation in Admin Framework in Apple OS X before 10.10.3 allows local users to bypass authentication and obtain admin privileges via unspecified vectors.