[ { "id": 785999615, "name": "CVE-2024-21338", "full_name": "hakaioffsec\/CVE-2024-21338", "owner": { "login": "hakaioffsec", "id": 99059183, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/99059183?v=4", "html_url": "https:\/\/github.com\/hakaioffsec" }, "html_url": "https:\/\/github.com\/hakaioffsec\/CVE-2024-21338", "description": "Local Privilege Escalation from Admin to Kernel vulnerability on Windows 10 and Windows 11 operating systems with HVCI enabled.", "fork": false, "created_at": "2024-04-13T05:53:02Z", "updated_at": "2024-10-14T09:23:03Z", "pushed_at": "2024-04-16T21:00:14Z", "stargazers_count": 277, "watchers_count": 277, "has_discussions": false, "forks_count": 60, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 60, "watchers": 277, "score": 0, "subscribers_count": 3 }, { "id": 787860602, "name": "CVE-2024-21338", "full_name": "UMU618\/CVE-2024-21338", "owner": { "login": "UMU618", "id": 1729732, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1729732?v=4", "html_url": "https:\/\/github.com\/UMU618" }, "html_url": "https:\/\/github.com\/UMU618\/CVE-2024-21338", "description": "Fork of https:\/\/github.com\/hakaioffsec\/CVE-2024-21338", "fork": false, "created_at": "2024-04-17T10:16:21Z", "updated_at": "2024-06-26T06:01:33Z", "pushed_at": "2024-04-17T10:33:05Z", "stargazers_count": 1, "watchers_count": 1, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 1, "score": 0, "subscribers_count": 1 }, { "id": 790920623, "name": "CVE-2024-21338", "full_name": "varwara\/CVE-2024-21338", "owner": { "login": "varwara", "id": 167913816, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/167913816?v=4", "html_url": "https:\/\/github.com\/varwara" }, "html_url": "https:\/\/github.com\/varwara\/CVE-2024-21338", "description": "PoC for the Untrusted Pointer Dereference in the appid.sys driver", "fork": false, "created_at": "2024-04-23T19:09:22Z", "updated_at": "2024-09-02T12:43:33Z", "pushed_at": "2024-04-23T19:13:53Z", "stargazers_count": 6, "watchers_count": 6, "has_discussions": false, "forks_count": 3, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 3, "watchers": 6, "score": 0, "subscribers_count": 1 }, { "id": 802543804, "name": "CVE-2024-21338-x64-build-", "full_name": "Zombie-Kaiser\/CVE-2024-21338-x64-build-", "owner": { "login": "Zombie-Kaiser", "id": 141570642, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/141570642?v=4", "html_url": "https:\/\/github.com\/Zombie-Kaiser" }, "html_url": "https:\/\/github.com\/Zombie-Kaiser\/CVE-2024-21338-x64-build-", "description": "Local Privilege Escalation from Admin to Kernel vulnerability on Windows 10 and Windows 11 operating systems with HVCI enabled.", "fork": false, "created_at": "2024-05-18T15:38:34Z", "updated_at": "2024-08-24T14:07:41Z", "pushed_at": "2024-05-22T17:06:06Z", "stargazers_count": 7, "watchers_count": 7, "has_discussions": false, "forks_count": 3, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 3, "watchers": 7, "score": 0, "subscribers_count": 1 }, { "id": 818876565, "name": "CVE-2024-21338_PoC", "full_name": "tykawaii98\/CVE-2024-21338_PoC", "owner": { "login": "tykawaii98", "id": 45362197, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/45362197?v=4", "html_url": "https:\/\/github.com\/tykawaii98" }, "html_url": "https:\/\/github.com\/tykawaii98\/CVE-2024-21338_PoC", "description": null, "fork": false, "created_at": "2024-06-23T06:03:44Z", "updated_at": "2024-09-01T12:14:21Z", "pushed_at": "2024-06-23T06:09:10Z", "stargazers_count": 38, "watchers_count": 38, "has_discussions": false, "forks_count": 13, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 13, "watchers": 38, "score": 0, "subscribers_count": 2 }, { "id": 835255581, "name": "CVE-2024-21338", "full_name": "Crowdfense\/CVE-2024-21338", "owner": { "login": "Crowdfense", "id": 176018566, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/176018566?v=4", "html_url": "https:\/\/github.com\/Crowdfense" }, "html_url": "https:\/\/github.com\/Crowdfense\/CVE-2024-21338", "description": "Windows AppLocker Driver (appid.sys) LPE", "fork": false, "created_at": "2024-07-29T13:18:06Z", "updated_at": "2024-10-11T01:34:12Z", "pushed_at": "2024-07-29T13:29:59Z", "stargazers_count": 34, "watchers_count": 34, "has_discussions": false, "forks_count": 14, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [ "exploit", "kernel", "lpe", "windowd" ], "visibility": "public", "forks": 14, "watchers": 34, "score": 0, "subscribers_count": 1 } ]