Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
| # | POC Description | Source Link | Shenlong Link |
|---|---|---|---|
| 1 | CWE-781: Improper Address Validation in IOCTL with METHOD_NEITHER I/O Control Code | https://github.com/varwara/CVE-2024-26229 | POC Details |
| 2 | Windows LPE | https://github.com/RalfHacker/CVE-2024-26229-exploit | POC Details |
| 3 | BOF implementations of CVE-2024-26229 for Cobalt Strike and BruteRatel | https://github.com/NVISOsecurity/CVE-2024-26229-BOF | POC Details |
| 4 | Windows CSC服务特权提升漏洞。 当程序向缓冲区写入的数据超出其处理能力时,就会发生基于堆的缓冲区溢出,从而导致多余的数据溢出到相邻的内存区域。这种溢出会损坏内存,并可能使攻击者能够执行任意代码或未经授权访问系统。本质上,攻击者可以编写触发溢出的恶意代码或输入,从而控制受影响的系统、执行任意命令、安装恶意软件或访问敏感数据。 微软已发出警告成功利用此漏洞的攻击者可以获得 SYSTEM 权限,这是 Windows 系统上的最高访问级别。这增加了与 CVE-2024-26229 相关的风险,使其成为恶意行为者的主要目标。 | https://github.com/team-MineDEV/CVE-2024-26229 | POC Details |
| 5 | BOF implementations of CVE-2024-26229 for Cobalt Strike and BruteRatel | https://github.com/apkc/CVE-2024-26229-BOF | POC Details |
| 6 | A PoC malware exploiting CVE-2024-26229 | https://github.com/0XJ175/DRive | POC Details |
| 7 | A firebeam plugin that exploits the CVE-2024-26229 vulnerability to perform elevation of privilege from a privileged user | https://github.com/Cracked5pider/eop24-26229 | POC Details |
| 8 | None | https://github.com/mqxmm/CVE-2024-26229 | POC Details |
| 9 | Nim touch up of CVE 2024 26229 | https://github.com/shinspace92/cve-2024-26229 | POC Details |
| 10 | CWE-781: Improper Address Validation in IOCTL with METHOD_NEITHER I/O Control Code | https://github.com/dkstar11q/CVE-2024-26229-lpe | POC Details |
No public POC found.
Login to generate AI POCNo comments yet