尽管我们使用了先进的大模型技术,但其输出仍可能包含不准确或过时的信息。神龙努力确保数据的准确性,但请您根据实际情况进行核实和判断。
| 厂商 | 产品 | 影响版本 | CPE | 订阅 |
|---|---|---|---|---|
| - | n/a | n/a | - |
| # | POC 描述 | 源链接 | 神龙链接 |
|---|---|---|---|
| 1 | Local privilege escalation PoC exploit for CVE-2019-16098 | https://github.com/Barakat/CVE-2019-16098 | POC详情 |
| 2 | None | https://github.com/0xDivyanshu-new/CVE-2019-16098 | POC详情 |
| 3 | Micro-Star MSI Afterburner 4.6.2.15658 exploit | https://github.com/houseofxyz/CVE-2019-16098 | POC详情 |
| 4 | This exploit rebuilds and exploit the CVE-2019-16098 which is in driver Micro-Star MSI Afterburner 4.6.2.15658 (aka RTCore64.sys and RTCore32.sys) allows any authenticated user to read and write to arbitrary memory, I/O ports, and MSRs. Instead of hardcoded base address of Ntoskrnl.exe, I calculated it dynamically and also calculated all offsets. | https://github.com/Offensive-Panda/NT-AUTHORITY-SYSTEM-CONTEXT-RTCORE | POC详情 |
| 5 | # VortexCry-Ransomware VortexCry is an advanced ransomware that utilizes multi-stage process injection (such as Process Hollowing and APC Injection) and kernel driver loading (via the CVE-2019-16098 vulnerability). It is capable of encrypting files, destroying system recovery functionalities, and demanding a ransom. | https://github.com/VortexCry-Organization/VortexCry-Ransomware-Release | POC详情 |
未找到公开 POC。
登录以生成 AI POC暂无评论