PoC-in-GitHub/2018/CVE-2018-4280.json
2019-12-27 00:30:02 +09:00

48 lines
No EOL
1.7 KiB
JSON

[
{
"id": 118415497,
"name": "launchd-portrep",
"full_name": "bazad\/launchd-portrep",
"owner": {
"login": "bazad",
"id": 3111637,
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/3111637?v=4",
"html_url": "https:\/\/github.com\/bazad"
},
"html_url": "https:\/\/github.com\/bazad\/launchd-portrep",
"description": "CVE-2018-4280: Mach port replacement vulnerability in launchd on macOS 10.13.5 leading to local privilege escalation and SIP bypass.",
"fork": false,
"created_at": "2018-01-22T06:22:59Z",
"updated_at": "2019-09-05T06:54:51Z",
"pushed_at": "2018-10-28T20:23:30Z",
"stargazers_count": 45,
"watchers_count": 45,
"forks_count": 3,
"forks": 3,
"watchers": 45,
"score": 0
},
{
"id": 122551718,
"name": "blanket",
"full_name": "bazad\/blanket",
"owner": {
"login": "bazad",
"id": 3111637,
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/3111637?v=4",
"html_url": "https:\/\/github.com\/bazad"
},
"html_url": "https:\/\/github.com\/bazad\/blanket",
"description": "CVE-2018-4280: Mach port replacement vulnerability in launchd on iOS 11.2.6 leading to sandbox escape, privilege escalation, and codesigning bypass.",
"fork": false,
"created_at": "2018-02-23T00:19:05Z",
"updated_at": "2019-10-17T23:24:05Z",
"pushed_at": "2018-11-13T00:26:18Z",
"stargazers_count": 200,
"watchers_count": 200,
"forks_count": 37,
"forks": 37,
"watchers": 200,
"score": 0
}
]