尽管我们使用了先进的大模型技术,但其输出仍可能包含不准确或过时的信息。神龙努力确保数据的准确性,但请您根据实际情况进行核实和判断。
| # | POC 描述 | 源链接 | 神龙链接 |
|---|---|---|---|
| 1 | None | https://github.com/tykawaii98/CVE-2024-30088 | POC详情 |
| 2 | 🆘New Windows Kernel Priviledge Escalation Vulnerability | https://github.com/NextGenPentesters/CVE-2024-30088- | POC详情 |
| 3 | 该漏洞存在于 NtQueryInformationToken 函数中,特别是在处理AuthzBasepCopyoutInternalSecurityAttributes 函数时,该漏洞源于内核在操作对象时对锁定机制的不当管理,这一失误可能导致恶意实体意外提升权限。 | https://github.com/Zombie-Kaiser/CVE-2024-30088-Windows-poc | POC详情 |
| 4 | Kernel exploit for Xbox SystemOS using CVE-2024-30088 | https://github.com/exploits-forsale/collateral-damage | POC详情 |
| 5 | Questa repository contiene una replica (tentativo di replica) scritto in Python per CVE-2024-30088. | https://github.com/Admin9961/CVE-2024-30088 | POC详情 |
| 6 | Kernel exploit for Xbox SystemOS using CVE-2024-30088 | https://github.com/Justintroup85/exploits-forsale-collateral-damage | POC详情 |
| 7 | Windows privilege escalation: Time-of-check Time-of-use (TOCTOU) Race Condition | https://github.com/l0n3m4n/CVE-2024-30088 | POC详情 |
| 8 | compiled poc binary | https://github.com/ramzihafiz/cve-2024-30088-binary | POC详情 |
未找到公开 POC。
登录以生成 AI POC暂无评论