PoC-in-GitHub/2024/CVE-2024-21338.json
2025-01-25 03:33:18 +09:00

224 lines
No EOL
7.7 KiB
JSON

[
{
"id": 785999615,
"name": "CVE-2024-21338",
"full_name": "hakaioffsec\/CVE-2024-21338",
"owner": {
"login": "hakaioffsec",
"id": 99059183,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/99059183?v=4",
"html_url": "https:\/\/github.com\/hakaioffsec",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/hakaioffsec\/CVE-2024-21338",
"description": "Local Privilege Escalation from Admin to Kernel vulnerability on Windows 10 and Windows 11 operating systems with HVCI enabled.",
"fork": false,
"created_at": "2024-04-13T05:53:02Z",
"updated_at": "2025-01-24T17:59:15Z",
"pushed_at": "2024-04-16T21:00:14Z",
"stargazers_count": 289,
"watchers_count": 289,
"has_discussions": false,
"forks_count": 60,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 60,
"watchers": 289,
"score": 0,
"subscribers_count": 3
},
{
"id": 787860602,
"name": "CVE-2024-21338",
"full_name": "UMU618\/CVE-2024-21338",
"owner": {
"login": "UMU618",
"id": 1729732,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1729732?v=4",
"html_url": "https:\/\/github.com\/UMU618",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/UMU618\/CVE-2024-21338",
"description": "Fork of https:\/\/github.com\/hakaioffsec\/CVE-2024-21338",
"fork": false,
"created_at": "2024-04-17T10:16:21Z",
"updated_at": "2024-06-26T06:01:33Z",
"pushed_at": "2024-04-17T10:33:05Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 1
},
{
"id": 790920623,
"name": "CVE-2024-21338",
"full_name": "varwara\/CVE-2024-21338",
"owner": {
"login": "varwara",
"id": 167913816,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/167913816?v=4",
"html_url": "https:\/\/github.com\/varwara",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/varwara\/CVE-2024-21338",
"description": "PoC for the Untrusted Pointer Dereference in the appid.sys driver",
"fork": false,
"created_at": "2024-04-23T19:09:22Z",
"updated_at": "2025-01-24T18:26:13Z",
"pushed_at": "2024-04-23T19:13:53Z",
"stargazers_count": 15,
"watchers_count": 15,
"has_discussions": false,
"forks_count": 6,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 6,
"watchers": 15,
"score": 0,
"subscribers_count": 2
},
{
"id": 802543804,
"name": "CVE-2024-21338-x64-build-",
"full_name": "Zombie-Kaiser\/CVE-2024-21338-x64-build-",
"owner": {
"login": "Zombie-Kaiser",
"id": 141570642,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/141570642?v=4",
"html_url": "https:\/\/github.com\/Zombie-Kaiser",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/Zombie-Kaiser\/CVE-2024-21338-x64-build-",
"description": "Local Privilege Escalation from Admin to Kernel vulnerability on Windows 10 and Windows 11 operating systems with HVCI enabled.",
"fork": false,
"created_at": "2024-05-18T15:38:34Z",
"updated_at": "2024-08-24T14:07:41Z",
"pushed_at": "2024-05-22T17:06:06Z",
"stargazers_count": 7,
"watchers_count": 7,
"has_discussions": false,
"forks_count": 3,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 3,
"watchers": 7,
"score": 0,
"subscribers_count": 1
},
{
"id": 818876565,
"name": "CVE-2024-21338_PoC",
"full_name": "tykawaii98\/CVE-2024-21338_PoC",
"owner": {
"login": "tykawaii98",
"id": 45362197,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/45362197?v=4",
"html_url": "https:\/\/github.com\/tykawaii98",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/tykawaii98\/CVE-2024-21338_PoC",
"description": null,
"fork": false,
"created_at": "2024-06-23T06:03:44Z",
"updated_at": "2024-12-24T15:11:57Z",
"pushed_at": "2024-06-23T06:09:10Z",
"stargazers_count": 38,
"watchers_count": 38,
"has_discussions": false,
"forks_count": 13,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 13,
"watchers": 38,
"score": 0,
"subscribers_count": 2
},
{
"id": 835255581,
"name": "CVE-2024-21338",
"full_name": "Crowdfense\/CVE-2024-21338",
"owner": {
"login": "Crowdfense",
"id": 176018566,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/176018566?v=4",
"html_url": "https:\/\/github.com\/Crowdfense",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/Crowdfense\/CVE-2024-21338",
"description": "Windows AppLocker Driver (appid.sys) LPE",
"fork": false,
"created_at": "2024-07-29T13:18:06Z",
"updated_at": "2025-01-12T09:27:29Z",
"pushed_at": "2024-07-29T13:29:59Z",
"stargazers_count": 47,
"watchers_count": 47,
"has_discussions": false,
"forks_count": 13,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"exploit",
"kernel",
"lpe",
"windowd"
],
"visibility": "public",
"forks": 13,
"watchers": 47,
"score": 0,
"subscribers_count": 1
},
{
"id": 915547586,
"name": "kcfg-bypass",
"full_name": "hackyboiz\/kcfg-bypass",
"owner": {
"login": "hackyboiz",
"id": 65108701,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/65108701?v=4",
"html_url": "https:\/\/github.com\/hackyboiz",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/hackyboiz\/kcfg-bypass",
"description": "kcfg bypass example - CVE-2024-21338",
"fork": false,
"created_at": "2025-01-12T06:16:30Z",
"updated_at": "2025-01-12T06:23:22Z",
"pushed_at": "2025-01-12T06:23:19Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 2
}
]