尽管我们使用了先进的大模型技术,但其输出仍可能包含不准确或过时的信息。神龙努力确保数据的准确性,但请您根据实际情况进行核实和判断。
| 厂商 | 产品 | 影响版本 | CPE | 订阅 |
|---|---|---|---|---|
| Checkmk GmbH | Checkmk | 2.2.0 ~ 2.2.0p23 | - |
| # | POC 描述 | 源链接 | 神龙链接 |
|---|---|---|---|
| 1 | None | https://github.com/zhulin837/checkmk_cve-2024-0670 | POC详情 |
| 2 | PoC for CVE-2024-0670 | https://github.com/magicrc/CVE-2024-0670 | POC详情 |
| 3 | This repository contains an exploit demonstration for CVE-2024-0670, a local privilege escalation vulnerability affecting the CheckMK Agent for Windows. The vulnerability allows a low-privileged user to obtain SYSTEM privileges by abusing writable file paths processed by the MSI repair mechanism. | https://github.com/elsevar11/CVE-2024-0670-CheckMK-Agent-Local-Privilege-Escalation-Exploit | POC详情 |
| 4 | Hello friend. This is the key to the kingdom. Advanced LPE exploit for CheckMK (CVE-2024-0670). Abuses insecure file handling for SYSTEM access. Includes surgical persistence module. Written in C++. They thought they were safe. They were wrong. The 5/9 revolution starts with a root shell. > We Are Fsociety_ | https://github.com/fsoc-ghost-0x/Fsociety-CVE-2024-0670-CheckMK-LPE | POC详情 |
| 5 | 🔍 Exploit CVE-2024-0670 in CheckMK agents for local privilege escalation using a robust C++ tool designed for security professionals. | https://github.com/Nikopmpm/Fsociety-CVE-2024-0670-CheckMK-LPE | POC详情 |
| 6 | 🚀 Utilize this C++ tool for local privilege escalation on CheckMK agents, addressing the CVE-2024-0670 vulnerability effectively. | https://github.com/Nikopmpm/nikopmpm.github.io | POC详情 |
| 7 | CheckMK Agent Local Privilege Escalation (PoC) | https://github.com/tralsesec/CVE-2024-0670 | POC详情 |
未找到公开 POC。
登录以生成 AI POC暂无评论