Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
| Vendor | Product | Affected Versions | CPE | Subscribe |
|---|---|---|---|---|
| - | n/a | n/a | - |
| # | POC Description | Source Link | Shenlong Link |
|---|---|---|---|
| 1 | Local privilege escalation PoC exploit for CVE-2019-16098 | https://github.com/Barakat/CVE-2019-16098 | POC Details |
| 2 | None | https://github.com/0xDivyanshu-new/CVE-2019-16098 | POC Details |
| 3 | Micro-Star MSI Afterburner 4.6.2.15658 exploit | https://github.com/houseofxyz/CVE-2019-16098 | POC Details |
| 4 | This exploit rebuilds and exploit the CVE-2019-16098 which is in driver Micro-Star MSI Afterburner 4.6.2.15658 (aka RTCore64.sys and RTCore32.sys) allows any authenticated user to read and write to arbitrary memory, I/O ports, and MSRs. Instead of hardcoded base address of Ntoskrnl.exe, I calculated it dynamically and also calculated all offsets. | https://github.com/Offensive-Panda/NT-AUTHORITY-SYSTEM-CONTEXT-RTCORE | POC Details |
| 5 | # VortexCry-Ransomware VortexCry is an advanced ransomware that utilizes multi-stage process injection (such as Process Hollowing and APC Injection) and kernel driver loading (via the CVE-2019-16098 vulnerability). It is capable of encrypting files, destroying system recovery functionalities, and demanding a ransom. | https://github.com/VortexCry-Organization/VortexCry-Ransomware-Release | POC Details |
No public POC found.
Login to generate AI POCNo comments yet