Auto Update 2024/04/17 12:29:25

This commit is contained in:
motikan2010-bot 2024-04-17 21:29:25 +09:00
parent edf70eed05
commit d2f9f8df08
48 changed files with 333 additions and 240 deletions

View file

@ -43,10 +43,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2024-04-17T03:20:37Z",
"updated_at": "2024-04-17T10:12:13Z",
"pushed_at": "2023-11-24T09:21:56Z",
"stargazers_count": 1917,
"watchers_count": 1917,
"stargazers_count": 1920,
"watchers_count": 1920,
"has_discussions": true,
"forks_count": 332,
"allow_forking": true,
@ -76,7 +76,7 @@
],
"visibility": "public",
"forks": 332,
"watchers": 1917,
"watchers": 1920,
"score": 0,
"subscribers_count": 35
},

View file

@ -13,10 +13,10 @@
"description": null,
"fork": false,
"created_at": "2018-12-20T12:12:59Z",
"updated_at": "2024-03-26T09:00:41Z",
"updated_at": "2024-04-17T11:59:35Z",
"pushed_at": "2019-01-31T23:27:45Z",
"stargazers_count": 5,
"watchers_count": 5,
"stargazers_count": 6,
"watchers_count": 6,
"has_discussions": false,
"forks_count": 6,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 6,
"watchers": 5,
"watchers": 6,
"score": 0,
"subscribers_count": 1
}

View file

@ -13,10 +13,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2024-04-17T03:20:37Z",
"updated_at": "2024-04-17T10:12:13Z",
"pushed_at": "2023-11-24T09:21:56Z",
"stargazers_count": 1917,
"watchers_count": 1917,
"stargazers_count": 1920,
"watchers_count": 1920,
"has_discussions": true,
"forks_count": 332,
"allow_forking": true,
@ -46,7 +46,7 @@
],
"visibility": "public",
"forks": 332,
"watchers": 1917,
"watchers": 1920,
"score": 0,
"subscribers_count": 35
},

View file

@ -414,10 +414,10 @@
"description": "Java反序列化漏洞利用工具V1.0 Java反序列化相关漏洞的检查工具采用JDK 1.8+NetBeans8.2开发软件运行必须安装JDK 1.8或者以上版本。 支持weblogic xml反序列化漏洞 CVE-2017-10271\/CNVD-C-2019-48814\/CVE-2019-2725检查。",
"fork": false,
"created_at": "2018-09-13T09:44:18Z",
"updated_at": "2024-04-15T11:54:06Z",
"updated_at": "2024-04-17T06:28:15Z",
"pushed_at": "2020-10-01T20:20:41Z",
"stargazers_count": 423,
"watchers_count": 423,
"stargazers_count": 424,
"watchers_count": 424,
"has_discussions": false,
"forks_count": 166,
"allow_forking": true,
@ -426,7 +426,7 @@
"topics": [],
"visibility": "public",
"forks": 166,
"watchers": 423,
"watchers": 424,
"score": 0,
"subscribers_count": 9
},

View file

@ -43,10 +43,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2024-04-17T03:20:37Z",
"updated_at": "2024-04-17T10:12:13Z",
"pushed_at": "2023-11-24T09:21:56Z",
"stargazers_count": 1917,
"watchers_count": 1917,
"stargazers_count": 1920,
"watchers_count": 1920,
"has_discussions": true,
"forks_count": 332,
"allow_forking": true,
@ -76,7 +76,7 @@
],
"visibility": "public",
"forks": 332,
"watchers": 1917,
"watchers": 1920,
"score": 0,
"subscribers_count": 35
},

View file

@ -44,7 +44,7 @@
"fork": false,
"created_at": "2024-01-04T21:44:21Z",
"updated_at": "2024-01-05T06:29:51Z",
"pushed_at": "2024-04-12T16:38:37Z",
"pushed_at": "2024-04-17T08:59:09Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,

View file

@ -73,19 +73,19 @@
"description": "Unsigned driver loader using CVE-2018-19320",
"fork": false,
"created_at": "2022-11-12T05:48:13Z",
"updated_at": "2024-04-16T06:20:46Z",
"updated_at": "2024-04-17T09:57:08Z",
"pushed_at": "2023-04-09T13:50:29Z",
"stargazers_count": 142,
"watchers_count": 142,
"stargazers_count": 143,
"watchers_count": 143,
"has_discussions": false,
"forks_count": 38,
"forks_count": 39,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 38,
"watchers": 142,
"forks": 39,
"watchers": 143,
"score": 0,
"subscribers_count": 6
},

View file

@ -557,10 +557,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2024-04-17T03:20:37Z",
"updated_at": "2024-04-17T10:12:13Z",
"pushed_at": "2023-11-24T09:21:56Z",
"stargazers_count": 1917,
"watchers_count": 1917,
"stargazers_count": 1920,
"watchers_count": 1920,
"has_discussions": true,
"forks_count": 332,
"allow_forking": true,
@ -590,7 +590,7 @@
],
"visibility": "public",
"forks": 332,
"watchers": 1917,
"watchers": 1920,
"score": 0,
"subscribers_count": 35
},

View file

@ -471,7 +471,7 @@
"description": "Mitigate CVE-2018-6389 WordPress load-scripts \/ load-styles attacks",
"fork": false,
"created_at": "2018-08-30T01:25:20Z",
"updated_at": "2024-04-15T15:38:13Z",
"updated_at": "2024-04-17T09:56:24Z",
"pushed_at": "2018-08-30T01:47:48Z",
"stargazers_count": 11,
"watchers_count": 11,

View file

@ -1,20 +1,20 @@
[
{
"id": 787694555,
"name": "CVE-2019-12937-ToaruOS-",
"full_name": "AkashicYiTai\/CVE-2019-12937-ToaruOS-",
"name": "CVE-2019-12937-ToaruOS",
"full_name": "AkashicYiTai\/CVE-2019-12937-ToaruOS",
"owner": {
"login": "AkashicYiTai",
"id": 97335989,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/97335989?v=4",
"html_url": "https:\/\/github.com\/AkashicYiTai"
},
"html_url": "https:\/\/github.com\/AkashicYiTai\/CVE-2019-12937-ToaruOS-",
"html_url": "https:\/\/github.com\/AkashicYiTai\/CVE-2019-12937-ToaruOS",
"description": null,
"fork": false,
"created_at": "2024-04-17T02:14:45Z",
"updated_at": "2024-04-17T02:14:46Z",
"pushed_at": "2024-04-17T02:14:46Z",
"updated_at": "2024-04-17T07:51:22Z",
"pushed_at": "2024-04-17T07:51:19Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,

View file

@ -43,10 +43,10 @@
"description": "CVE-2019-1458 Windows LPE Exploit",
"fork": false,
"created_at": "2020-03-11T08:30:14Z",
"updated_at": "2024-01-30T11:22:40Z",
"updated_at": "2024-04-17T08:01:37Z",
"pushed_at": "2020-03-11T09:59:01Z",
"stargazers_count": 134,
"watchers_count": 134,
"stargazers_count": 135,
"watchers_count": 135,
"has_discussions": false,
"forks_count": 39,
"allow_forking": true,
@ -59,7 +59,7 @@
],
"visibility": "public",
"forks": 39,
"watchers": 134,
"watchers": 135,
"score": 0,
"subscribers_count": 5
},

View file

@ -13,10 +13,10 @@
"description": "Integer overflow in Oniguruma",
"fork": false,
"created_at": "2019-11-20T10:00:18Z",
"updated_at": "2019-12-03T08:44:25Z",
"updated_at": "2024-04-17T11:59:42Z",
"pushed_at": "2019-11-20T15:53:38Z",
"stargazers_count": 2,
"watchers_count": 2,
"stargazers_count": 3,
"watchers_count": 3,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 2,
"watchers": 3,
"score": 0,
"subscribers_count": 2
},

View file

@ -13,10 +13,10 @@
"description": "Heap-buffer-overflow in Oniguruma (function gb18030_mbc_enc_len)",
"fork": false,
"created_at": "2019-11-21T22:43:34Z",
"updated_at": "2021-01-04T16:55:17Z",
"updated_at": "2024-04-17T11:59:37Z",
"pushed_at": "2019-11-22T00:04:51Z",
"stargazers_count": 2,
"watchers_count": 2,
"stargazers_count": 3,
"watchers_count": 3,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 2,
"watchers": 3,
"score": 0,
"subscribers_count": 2
},

View file

@ -13,10 +13,10 @@
"description": "Heap-buffer-overflow in Oniguruma (function fetch_interval_quantifier)",
"fork": false,
"created_at": "2019-11-21T23:53:16Z",
"updated_at": "2022-10-05T22:57:34Z",
"updated_at": "2024-04-17T11:59:49Z",
"pushed_at": "2019-11-22T00:04:37Z",
"stargazers_count": 2,
"watchers_count": 2,
"stargazers_count": 3,
"watchers_count": 3,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 2,
"watchers": 3,
"score": 0,
"subscribers_count": 2
},

View file

@ -515,7 +515,7 @@
"fork": false,
"created_at": "2024-04-15T06:40:04Z",
"updated_at": "2024-04-15T19:23:08Z",
"pushed_at": "2024-04-15T19:17:36Z",
"pushed_at": "2024-04-17T06:42:24Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,

View file

@ -193,10 +193,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2024-04-17T03:20:37Z",
"updated_at": "2024-04-17T10:12:13Z",
"pushed_at": "2023-11-24T09:21:56Z",
"stargazers_count": 1917,
"watchers_count": 1917,
"stargazers_count": 1920,
"watchers_count": 1920,
"has_discussions": true,
"forks_count": 332,
"allow_forking": true,
@ -226,7 +226,7 @@
],
"visibility": "public",
"forks": 332,
"watchers": 1917,
"watchers": 1920,
"score": 0,
"subscribers_count": 35
}

View file

@ -13,10 +13,10 @@
"description": "Java反序列化漏洞利用工具V1.0 Java反序列化相关漏洞的检查工具采用JDK 1.8+NetBeans8.2开发软件运行必须安装JDK 1.8或者以上版本。 支持weblogic xml反序列化漏洞 CVE-2017-10271\/CNVD-C-2019-48814\/CVE-2019-2725检查。",
"fork": false,
"created_at": "2018-09-13T09:44:18Z",
"updated_at": "2024-04-15T11:54:06Z",
"updated_at": "2024-04-17T06:28:15Z",
"pushed_at": "2020-10-01T20:20:41Z",
"stargazers_count": 423,
"watchers_count": 423,
"stargazers_count": 424,
"watchers_count": 424,
"has_discussions": false,
"forks_count": 166,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 166,
"watchers": 423,
"watchers": 424,
"score": 0,
"subscribers_count": 9
},
@ -598,35 +598,5 @@
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 721175397,
"name": "CVE-2019-2725",
"full_name": "Kamiya767\/CVE-2019-2725",
"owner": {
"login": "Kamiya767",
"id": 136062929,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/136062929?v=4",
"html_url": "https:\/\/github.com\/Kamiya767"
},
"html_url": "https:\/\/github.com\/Kamiya767\/CVE-2019-2725",
"description": null,
"fork": false,
"created_at": "2023-11-20T14:08:07Z",
"updated_at": "2023-11-20T14:08:14Z",
"pushed_at": "2023-11-20T14:08:10Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
}
]

View file

@ -13,10 +13,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2024-04-17T03:20:37Z",
"updated_at": "2024-04-17T10:12:13Z",
"pushed_at": "2023-11-24T09:21:56Z",
"stargazers_count": 1917,
"watchers_count": 1917,
"stargazers_count": 1920,
"watchers_count": 1920,
"has_discussions": true,
"forks_count": 332,
"allow_forking": true,
@ -46,7 +46,7 @@
],
"visibility": "public",
"forks": 332,
"watchers": 1917,
"watchers": 1920,
"score": 0,
"subscribers_count": 35
},

View file

@ -13,10 +13,10 @@
"description": "攻击WIFI的常用方式",
"fork": false,
"created_at": "2021-11-29T08:38:27Z",
"updated_at": "2024-04-17T03:59:10Z",
"updated_at": "2024-04-17T09:22:57Z",
"pushed_at": "2021-11-29T08:57:39Z",
"stargazers_count": 12,
"watchers_count": 12,
"stargazers_count": 13,
"watchers_count": 13,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 12,
"watchers": 13,
"score": 0,
"subscribers_count": 1
}

View file

@ -13,10 +13,10 @@
"description": "Writeup and exploit for installed app to system privilege escalation on Android 12 Beta through CVE-2021-0928, a `writeToParcel`\/`createFromParcel` serialization mismatch in `OutputConfiguration`",
"fork": false,
"created_at": "2022-01-29T10:14:32Z",
"updated_at": "2024-04-02T00:22:39Z",
"updated_at": "2024-04-17T08:34:41Z",
"pushed_at": "2022-03-03T17:50:03Z",
"stargazers_count": 95,
"watchers_count": 95,
"stargazers_count": 96,
"watchers_count": 96,
"has_discussions": false,
"forks_count": 20,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 20,
"watchers": 95,
"watchers": 96,
"score": 0,
"subscribers_count": 5
}

View file

@ -43,10 +43,10 @@
"description": "C# and Impacket implementation of PrintNightmare CVE-2021-1675\/CVE-2021-34527",
"fork": false,
"created_at": "2021-06-29T17:24:14Z",
"updated_at": "2024-04-13T20:52:50Z",
"updated_at": "2024-04-17T12:15:29Z",
"pushed_at": "2021-07-20T15:28:13Z",
"stargazers_count": 1789,
"watchers_count": 1789,
"stargazers_count": 1790,
"watchers_count": 1790,
"has_discussions": false,
"forks_count": 580,
"allow_forking": true,
@ -55,7 +55,7 @@
"topics": [],
"visibility": "public",
"forks": 580,
"watchers": 1789,
"watchers": 1790,
"score": 0,
"subscribers_count": 44
},

View file

@ -857,10 +857,10 @@
"description": "🐱‍💻 ✂️ 🤬 CVE-2021-44228 - LOG4J Java exploit - WAF bypass tricks",
"fork": false,
"created_at": "2021-12-10T22:35:00Z",
"updated_at": "2024-04-17T01:08:16Z",
"updated_at": "2024-04-17T07:04:13Z",
"pushed_at": "2022-01-15T16:18:44Z",
"stargazers_count": 925,
"watchers_count": 925,
"stargazers_count": 926,
"watchers_count": 926,
"has_discussions": false,
"forks_count": 140,
"allow_forking": true,
@ -889,7 +889,7 @@
],
"visibility": "public",
"forks": 140,
"watchers": 925,
"watchers": 926,
"score": 0,
"subscribers_count": 25
},
@ -1268,12 +1268,12 @@
"description": "CVE-2021-44228 Log4j2 BurpSuite Scanner,Customize ceye.io api or other apis,including internal networks",
"fork": false,
"created_at": "2021-12-11T07:19:11Z",
"updated_at": "2024-04-15T02:56:24Z",
"updated_at": "2024-04-17T09:45:38Z",
"pushed_at": "2023-06-13T09:17:54Z",
"stargazers_count": 767,
"watchers_count": 767,
"stargazers_count": 769,
"watchers_count": 769,
"has_discussions": false,
"forks_count": 112,
"forks_count": 113,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -1284,8 +1284,8 @@
"log4jshell"
],
"visibility": "public",
"forks": 112,
"watchers": 767,
"forks": 113,
"watchers": 769,
"score": 0,
"subscribers_count": 11
},
@ -3696,10 +3696,10 @@
"description": "Scanner for Log4j RCE CVE-2021-44228",
"fork": false,
"created_at": "2021-12-13T06:53:01Z",
"updated_at": "2023-09-30T21:23:44Z",
"updated_at": "2024-04-17T08:31:16Z",
"pushed_at": "2022-07-06T00:37:55Z",
"stargazers_count": 11,
"watchers_count": 11,
"stargazers_count": 12,
"watchers_count": 12,
"has_discussions": false,
"forks_count": 5,
"allow_forking": true,
@ -3708,7 +3708,7 @@
"topics": [],
"visibility": "public",
"forks": 5,
"watchers": 11,
"watchers": 12,
"score": 0,
"subscribers_count": 2
},

View file

@ -13,10 +13,10 @@
"description": "Environment with vulnerable kernel for exploitation of the TEE driver (CVE-2021-44733)",
"fork": false,
"created_at": "2021-12-23T17:45:35Z",
"updated_at": "2024-03-26T16:50:22Z",
"updated_at": "2024-04-17T06:23:32Z",
"pushed_at": "2021-12-28T07:57:13Z",
"stargazers_count": 73,
"watchers_count": 73,
"stargazers_count": 74,
"watchers_count": 74,
"has_discussions": false,
"forks_count": 13,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 13,
"watchers": 73,
"watchers": 74,
"score": 0,
"subscribers_count": 3
}

View file

@ -13,10 +13,10 @@
"description": "Windows LPE exploit for CVE-2022-37969",
"fork": false,
"created_at": "2023-03-09T21:17:44Z",
"updated_at": "2024-03-09T18:19:11Z",
"updated_at": "2024-04-17T11:47:24Z",
"pushed_at": "2023-07-11T16:50:28Z",
"stargazers_count": 124,
"watchers_count": 124,
"stargazers_count": 125,
"watchers_count": 125,
"has_discussions": false,
"forks_count": 39,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 39,
"watchers": 124,
"watchers": 125,
"score": 0,
"subscribers_count": 5
}

View file

@ -13,10 +13,10 @@
"description": "This is a one-time signature verification bypass. For persistent signature verification bypass, check https:\/\/github.com\/TomKing062\/CVE-2022-38691_38692",
"fork": false,
"created_at": "2023-06-10T08:31:26Z",
"updated_at": "2024-04-16T08:36:03Z",
"updated_at": "2024-04-17T08:32:23Z",
"pushed_at": "2024-04-05T06:46:47Z",
"stargazers_count": 192,
"watchers_count": 192,
"stargazers_count": 193,
"watchers_count": 193,
"has_discussions": true,
"forks_count": 23,
"allow_forking": true,
@ -28,7 +28,7 @@
],
"visibility": "public",
"forks": 23,
"watchers": 192,
"watchers": 193,
"score": 0,
"subscribers_count": 6
}

View file

@ -133,7 +133,7 @@
"description": "A modification to fortra's CVE-2023-28252 exploit, compiled to exe",
"fork": false,
"created_at": "2024-01-22T10:38:02Z",
"updated_at": "2024-04-09T19:59:14Z",
"updated_at": "2024-04-17T07:51:48Z",
"pushed_at": "2024-01-24T13:45:56Z",
"stargazers_count": 47,
"watchers_count": 47,

View file

@ -43,10 +43,10 @@
"description": "Ubuntu Privilege Escalation bash one-liner using CVE-2023-32629 & CVE-2023-2640",
"fork": false,
"created_at": "2023-11-09T09:19:23Z",
"updated_at": "2024-03-07T08:21:48Z",
"updated_at": "2024-04-17T11:25:08Z",
"pushed_at": "2023-11-15T08:35:06Z",
"stargazers_count": 102,
"watchers_count": 102,
"stargazers_count": 103,
"watchers_count": 103,
"has_discussions": false,
"forks_count": 18,
"allow_forking": true,
@ -55,7 +55,7 @@
"topics": [],
"visibility": "public",
"forks": 18,
"watchers": 102,
"watchers": 103,
"score": 0,
"subscribers_count": 3
},

View file

@ -13,10 +13,10 @@
"description": "CVE-2023-42820",
"fork": false,
"created_at": "2023-10-10T06:32:51Z",
"updated_at": "2024-03-29T06:50:09Z",
"updated_at": "2024-04-17T08:12:08Z",
"pushed_at": "2024-04-03T09:57:07Z",
"stargazers_count": 56,
"watchers_count": 56,
"stargazers_count": 58,
"watchers_count": 58,
"has_discussions": false,
"forks_count": 10,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 10,
"watchers": 56,
"watchers": 58,
"score": 0,
"subscribers_count": 2
},

View file

@ -13,10 +13,10 @@
"description": "Example of how CVE-2023-43804 works with real python code.",
"fork": false,
"created_at": "2023-10-13T06:15:45Z",
"updated_at": "2023-10-13T07:44:32Z",
"updated_at": "2024-04-17T11:59:24Z",
"pushed_at": "2023-10-13T07:19:49Z",
"stargazers_count": 1,
"watchers_count": 1,
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"watchers": 2,
"score": 0,
"subscribers_count": 1
}

View file

@ -13,10 +13,10 @@
"description": "🚨 CVE-2023-45866 - BlueDucky Implementation (Using DuckyScript) 🔓 Unauthenticated Peering Leading to Code Execution (Using HID Keyboard)",
"fork": false,
"created_at": "2024-01-16T06:52:02Z",
"updated_at": "2024-04-17T05:58:39Z",
"updated_at": "2024-04-17T12:30:11Z",
"pushed_at": "2024-04-08T13:43:21Z",
"stargazers_count": 409,
"watchers_count": 409,
"stargazers_count": 411,
"watchers_count": 411,
"has_discussions": false,
"forks_count": 63,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 63,
"watchers": 409,
"watchers": 411,
"score": 0,
"subscribers_count": 7
},

View file

@ -13,10 +13,10 @@
"description": "Proof of conept to exploit vulnerable proxycommand configurations on ssh clients (CVE-2023-51385)",
"fork": false,
"created_at": "2023-09-28T13:48:17Z",
"updated_at": "2024-03-16T18:35:07Z",
"updated_at": "2024-04-17T11:59:45Z",
"pushed_at": "2023-10-12T19:06:26Z",
"stargazers_count": 44,
"watchers_count": 44,
"stargazers_count": 45,
"watchers_count": 45,
"has_discussions": false,
"forks_count": 38,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 38,
"watchers": 44,
"watchers": 45,
"score": 0,
"subscribers_count": 1
},

View file

@ -14,7 +14,7 @@
"fork": false,
"created_at": "2024-04-11T18:58:17Z",
"updated_at": "2024-04-17T01:22:23Z",
"pushed_at": "2024-04-13T10:31:33Z",
"pushed_at": "2024-04-17T09:20:01Z",
"stargazers_count": 14,
"watchers_count": 14,
"has_discussions": false,

View file

@ -13,12 +13,12 @@
"description": "Universal local privilege escalation Proof-of-Concept exploit for CVE-2024-1086, working on most Linux kernels between v5.14 and v6.6, including Debian, Ubuntu, and KernelCTF. The success rate is 99.4% in KernelCTF images.",
"fork": false,
"created_at": "2024-03-20T21:16:41Z",
"updated_at": "2024-04-17T06:18:53Z",
"updated_at": "2024-04-17T08:56:41Z",
"pushed_at": "2024-04-10T23:22:55Z",
"stargazers_count": 1847,
"watchers_count": 1847,
"stargazers_count": 1850,
"watchers_count": 1850,
"has_discussions": false,
"forks_count": 227,
"forks_count": 228,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -30,8 +30,8 @@
"poc"
],
"visibility": "public",
"forks": 227,
"watchers": 1847,
"forks": 228,
"watchers": 1850,
"score": 0,
"subscribers_count": 19
},

View file

@ -14,7 +14,7 @@
"fork": false,
"created_at": "2024-04-16T07:14:33Z",
"updated_at": "2024-04-16T07:14:33Z",
"pushed_at": "2024-04-16T15:03:05Z",
"pushed_at": "2024-04-17T08:00:02Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,

View file

@ -13,10 +13,10 @@
"description": "Oracle VM VirtualBox for Windows prior to 7.0.16 - Elevation of Privileges",
"fork": false,
"created_at": "2024-04-17T06:13:20Z",
"updated_at": "2024-04-17T06:13:20Z",
"updated_at": "2024-04-17T11:51:14Z",
"pushed_at": "2024-04-17T06:19:01Z",
"stargazers_count": 0,
"watchers_count": 0,
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 0
}

View file

@ -13,20 +13,50 @@
"description": "Local Privilege Escalation from Admin to Kernel vulnerability on Windows 10 and Windows 11 operating systems with HVCI enabled.",
"fork": false,
"created_at": "2024-04-13T05:53:02Z",
"updated_at": "2024-04-17T05:43:45Z",
"updated_at": "2024-04-17T12:31:55Z",
"pushed_at": "2024-04-16T21:00:14Z",
"stargazers_count": 97,
"watchers_count": 97,
"stargazers_count": 119,
"watchers_count": 119,
"has_discussions": false,
"forks_count": 25,
"forks_count": 28,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 25,
"watchers": 97,
"forks": 28,
"watchers": 119,
"score": 0,
"subscribers_count": 2
},
{
"id": 787860602,
"name": "CVE-2024-21338",
"full_name": "UMU618\/CVE-2024-21338",
"owner": {
"login": "UMU618",
"id": 1729732,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1729732?v=4",
"html_url": "https:\/\/github.com\/UMU618"
},
"html_url": "https:\/\/github.com\/UMU618\/CVE-2024-21338",
"description": "Fork of https:\/\/github.com\/hakaioffsec\/CVE-2024-21338",
"fork": false,
"created_at": "2024-04-17T10:16:21Z",
"updated_at": "2024-04-17T10:33:08Z",
"pushed_at": "2024-04-17T10:33:05Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -73,10 +73,10 @@
"description": "CVE-2024-23897",
"fork": false,
"created_at": "2024-01-26T09:44:32Z",
"updated_at": "2024-04-09T19:59:16Z",
"updated_at": "2024-04-17T06:32:26Z",
"pushed_at": "2024-01-28T06:47:28Z",
"stargazers_count": 164,
"watchers_count": 164,
"stargazers_count": 165,
"watchers_count": 165,
"has_discussions": false,
"forks_count": 32,
"allow_forking": true,
@ -85,7 +85,7 @@
"topics": [],
"visibility": "public",
"forks": 32,
"watchers": 164,
"watchers": 165,
"score": 0,
"subscribers_count": 2
},
@ -261,7 +261,7 @@
"stargazers_count": 51,
"watchers_count": 51,
"has_discussions": false,
"forks_count": 8,
"forks_count": 9,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -271,7 +271,7 @@
"jenkins"
],
"visibility": "public",
"forks": 8,
"forks": 9,
"watchers": 51,
"score": 0,
"subscribers_count": 2

View file

@ -13,10 +13,10 @@
"description": "Wondershare Filmora v.13.0.51 - Insecure Permissions Privilege Escalation",
"fork": false,
"created_at": "2024-04-04T13:44:08Z",
"updated_at": "2024-04-04T13:44:09Z",
"updated_at": "2024-04-17T11:50:47Z",
"pushed_at": "2024-04-04T13:49:34Z",
"stargazers_count": 0,
"watchers_count": 0,
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 1
}

View file

@ -13,10 +13,10 @@
"description": "Wondershare MobileTrans 4.5.6 - Unquoted Service Path",
"fork": false,
"created_at": "2024-04-13T06:27:28Z",
"updated_at": "2024-04-13T06:27:29Z",
"updated_at": "2024-04-17T11:52:07Z",
"pushed_at": "2024-04-13T06:34:00Z",
"stargazers_count": 0,
"watchers_count": 0,
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 1
}

View file

@ -13,10 +13,10 @@
"description": "ASUS Control Center Express =< 01.06.15 - Unquoted Service Path",
"fork": false,
"created_at": "2024-04-03T14:47:20Z",
"updated_at": "2024-04-03T14:47:20Z",
"updated_at": "2024-04-17T11:50:01Z",
"pushed_at": "2024-04-03T15:00:48Z",
"stargazers_count": 0,
"watchers_count": 0,
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 1
}

View file

@ -13,10 +13,10 @@
"description": "Macro Expert <= 4.9.4 - Insecure Permissions Privilege Escalation",
"fork": false,
"created_at": "2024-04-03T15:16:09Z",
"updated_at": "2024-04-03T15:16:10Z",
"updated_at": "2024-04-17T11:53:20Z",
"pushed_at": "2024-04-03T15:20:29Z",
"stargazers_count": 0,
"watchers_count": 0,
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 1
}

View file

@ -13,10 +13,10 @@
"description": "Local Privilege Escalation Vulnerability on Axigen for Windows",
"fork": false,
"created_at": "2024-04-03T15:31:02Z",
"updated_at": "2024-04-03T15:31:03Z",
"updated_at": "2024-04-17T11:47:56Z",
"pushed_at": "2024-04-03T15:38:03Z",
"stargazers_count": 0,
"watchers_count": 0,
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 1
}

View file

@ -43,10 +43,10 @@
"description": "Quick and dirty PoC for checking whether a vulnerable version of xz-utils is installed (CVE-2024-3094)",
"fork": false,
"created_at": "2024-03-29T20:28:17Z",
"updated_at": "2024-04-17T06:17:31Z",
"updated_at": "2024-04-17T09:55:28Z",
"pushed_at": "2024-03-31T00:13:39Z",
"stargazers_count": 68,
"watchers_count": 68,
"stargazers_count": 69,
"watchers_count": 69,
"has_discussions": false,
"forks_count": 13,
"allow_forking": true,
@ -55,7 +55,7 @@
"topics": [],
"visibility": "public",
"forks": 13,
"watchers": 68,
"watchers": 69,
"score": 0,
"subscribers_count": 3
},
@ -657,13 +657,13 @@
"stargazers_count": 28,
"watchers_count": 28,
"has_discussions": false,
"forks_count": 7,
"forks_count": 8,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 7,
"forks": 8,
"watchers": 28,
"score": 0,
"subscribers_count": 6
@ -1012,10 +1012,10 @@
"description": "notes, honeypot, and exploit demo for the xz backdoor (CVE-2024-3094)",
"fork": false,
"created_at": "2024-04-01T14:28:09Z",
"updated_at": "2024-04-17T06:19:49Z",
"updated_at": "2024-04-17T10:34:07Z",
"pushed_at": "2024-04-03T04:58:50Z",
"stargazers_count": 3382,
"watchers_count": 3382,
"stargazers_count": 3381,
"watchers_count": 3381,
"has_discussions": false,
"forks_count": 227,
"allow_forking": true,
@ -1024,7 +1024,7 @@
"topics": [],
"visibility": "public",
"forks": 227,
"watchers": 3382,
"watchers": 3381,
"score": 0,
"subscribers_count": 34
},

View file

@ -28,5 +28,35 @@
"watchers": 0,
"score": 0,
"subscribers_count": 0
},
{
"id": 787871319,
"name": "cve-2024-31497",
"full_name": "edutko\/cve-2024-31497",
"owner": {
"login": "edutko",
"id": 1013264,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1013264?v=4",
"html_url": "https:\/\/github.com\/edutko"
},
"html_url": "https:\/\/github.com\/edutko\/cve-2024-31497",
"description": null,
"fork": false,
"created_at": "2024-04-17T10:43:42Z",
"updated_at": "2024-04-17T10:44:23Z",
"pushed_at": "2024-04-17T10:44:19Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -14,7 +14,7 @@
"fork": false,
"created_at": "2024-04-15T07:19:10Z",
"updated_at": "2024-04-15T07:19:11Z",
"pushed_at": "2024-04-15T07:30:36Z",
"pushed_at": "2024-04-17T09:15:50Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,

View file

@ -13,10 +13,10 @@
"description": "D-Link NAS CVE-2024-3273 Exploit Tool",
"fork": false,
"created_at": "2024-04-07T03:09:13Z",
"updated_at": "2024-04-15T04:21:40Z",
"updated_at": "2024-04-17T09:15:59Z",
"pushed_at": "2024-04-07T04:41:26Z",
"stargazers_count": 39,
"watchers_count": 39,
"stargazers_count": 40,
"watchers_count": 40,
"has_discussions": false,
"forks_count": 9,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 9,
"watchers": 39,
"watchers": 40,
"score": 0,
"subscribers_count": 3
},

View file

@ -73,19 +73,19 @@
"description": null,
"fork": false,
"created_at": "2024-04-13T14:00:31Z",
"updated_at": "2024-04-17T05:58:34Z",
"updated_at": "2024-04-17T08:22:22Z",
"pushed_at": "2024-04-13T14:03:19Z",
"stargazers_count": 25,
"watchers_count": 25,
"stargazers_count": 26,
"watchers_count": 26,
"has_discussions": false,
"forks_count": 15,
"forks_count": 17,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 15,
"watchers": 25,
"forks": 17,
"watchers": 26,
"score": 0,
"subscribers_count": 2
},
@ -283,19 +283,19 @@
"description": "CVE-2024-3400 Palo Alto OS Command Injection",
"fork": false,
"created_at": "2024-04-16T14:18:08Z",
"updated_at": "2024-04-17T05:36:20Z",
"updated_at": "2024-04-17T11:46:54Z",
"pushed_at": "2024-04-16T22:35:43Z",
"stargazers_count": 24,
"watchers_count": 24,
"stargazers_count": 39,
"watchers_count": 39,
"has_discussions": false,
"forks_count": 3,
"forks_count": 6,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 3,
"watchers": 24,
"forks": 6,
"watchers": 39,
"score": 0,
"subscribers_count": 1
},
@ -313,19 +313,19 @@
"description": "CVE-2024-3400-RCE",
"fork": false,
"created_at": "2024-04-16T16:18:56Z",
"updated_at": "2024-04-17T05:13:29Z",
"updated_at": "2024-04-17T12:13:29Z",
"pushed_at": "2024-04-17T01:11:01Z",
"stargazers_count": 2,
"watchers_count": 2,
"stargazers_count": 8,
"watchers_count": 8,
"has_discussions": false,
"forks_count": 0,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 2,
"forks": 1,
"watchers": 8,
"score": 0,
"subscribers_count": 2
},
@ -360,7 +360,7 @@
"subscribers_count": 2
},
{
"id": 787606693,
"id": 787613969,
"name": "CVE-2024-3400",
"full_name": "Chocapikk\/CVE-2024-3400",
"owner": {
@ -372,9 +372,9 @@
"html_url": "https:\/\/github.com\/Chocapikk\/CVE-2024-3400",
"description": null,
"fork": false,
"created_at": "2024-04-16T21:00:32Z",
"updated_at": "2024-04-16T21:00:32Z",
"pushed_at": "2024-04-16T21:01:00Z",
"created_at": "2024-04-16T21:21:41Z",
"updated_at": "2024-04-17T11:18:58Z",
"pushed_at": "2024-04-17T11:47:36Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
@ -387,7 +387,7 @@
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
"subscribers_count": 0
},
{
"id": 787614808,
@ -404,7 +404,7 @@
"fork": false,
"created_at": "2024-04-16T21:24:15Z",
"updated_at": "2024-04-17T06:29:37Z",
"pushed_at": "2024-04-16T21:37:28Z",
"pushed_at": "2024-04-17T11:03:32Z",
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
@ -448,5 +448,65 @@
"watchers": 0,
"score": 0,
"subscribers_count": 0
},
{
"id": 787813638,
"name": "CVE-2024-3400-RCE-copy",
"full_name": "admi-n\/CVE-2024-3400-RCE-copy",
"owner": {
"login": "admi-n",
"id": 34176629,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/34176629?v=4",
"html_url": "https:\/\/github.com\/admi-n"
},
"html_url": "https:\/\/github.com\/admi-n\/CVE-2024-3400-RCE-copy",
"description": "CVE-2024-3400-RCE",
"fork": false,
"created_at": "2024-04-17T08:27:52Z",
"updated_at": "2024-04-17T08:32:03Z",
"pushed_at": "2024-04-17T08:31:59Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
},
{
"id": 787894337,
"name": "CVE-2024-3400-Canary",
"full_name": "ZephrFish\/CVE-2024-3400-Canary",
"owner": {
"login": "ZephrFish",
"id": 5783068,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/5783068?v=4",
"html_url": "https:\/\/github.com\/ZephrFish"
},
"html_url": "https:\/\/github.com\/ZephrFish\/CVE-2024-3400-Canary",
"description": "Have we not learnt from HoneyPoC?",
"fork": false,
"created_at": "2024-04-17T11:41:01Z",
"updated_at": "2024-04-17T12:29:29Z",
"pushed_at": "2024-04-17T12:04:33Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -380,6 +380,8 @@
- [Chocapikk/CVE-2024-3400](https://github.com/Chocapikk/CVE-2024-3400)
- [ihebski/CVE-2024-3400](https://github.com/ihebski/CVE-2024-3400)
- [index2014/CVE-2024-3400-Checker](https://github.com/index2014/CVE-2024-3400-Checker)
- [admi-n/CVE-2024-3400-RCE-copy](https://github.com/admi-n/CVE-2024-3400-RCE-copy)
- [ZephrFish/CVE-2024-3400-Canary](https://github.com/ZephrFish/CVE-2024-3400-Canary)
### CVE-2024-3867 (2024-04-16)
@ -474,6 +476,7 @@
</code>
- [hakaioffsec/CVE-2024-21338](https://github.com/hakaioffsec/CVE-2024-21338)
- [UMU618/CVE-2024-21338](https://github.com/UMU618/CVE-2024-21338)
### CVE-2024-21378 (2024-02-13)
@ -1498,6 +1501,7 @@
</code>
- [sh1k4ku/CVE-2024-31497](https://github.com/sh1k4ku/CVE-2024-31497)
- [edutko/cve-2024-31497](https://github.com/edutko/cve-2024-31497)
### CVE-2024-31719
- [VoltaireYoung/CVE-2024-31719----AMI-Aptio-5-Vulnerability](https://github.com/VoltaireYoung/CVE-2024-31719----AMI-Aptio-5-Vulnerability)
@ -28048,7 +28052,6 @@
- [ludy-dev/Oracle-WLS-Weblogic-RCE](https://github.com/ludy-dev/Oracle-WLS-Weblogic-RCE)
- [1stPeak/CVE-2019-2725-environment](https://github.com/1stPeak/CVE-2019-2725-environment)
- [CalegariMindSec/Exploit-CVE-2019-2725](https://github.com/CalegariMindSec/Exploit-CVE-2019-2725)
- [Kamiya767/CVE-2019-2725](https://github.com/Kamiya767/CVE-2019-2725)
### CVE-2019-2729 (2019-06-19)
@ -29766,7 +29769,7 @@
<code>apps/gsudo.c in gsudo in ToaruOS through 1.10.9 has a buffer overflow allowing local privilege escalation to the root user via the DISPLAY environment variable.
</code>
- [AkashicYiTai/CVE-2019-12937-ToaruOS-](https://github.com/AkashicYiTai/CVE-2019-12937-ToaruOS-)
- [AkashicYiTai/CVE-2019-12937-ToaruOS](https://github.com/AkashicYiTai/CVE-2019-12937-ToaruOS)
### CVE-2019-12949 (2019-06-25)