Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
| # | POC Description | Source Link | Shenlong Link |
|---|---|---|---|
| 1 | None | https://github.com/tykawaii98/CVE-2024-30088 | POC Details |
| 2 | 🆘New Windows Kernel Priviledge Escalation Vulnerability | https://github.com/NextGenPentesters/CVE-2024-30088- | POC Details |
| 3 | 该漏洞存在于 NtQueryInformationToken 函数中,特别是在处理AuthzBasepCopyoutInternalSecurityAttributes 函数时,该漏洞源于内核在操作对象时对锁定机制的不当管理,这一失误可能导致恶意实体意外提升权限。 | https://github.com/Zombie-Kaiser/CVE-2024-30088-Windows-poc | POC Details |
| 4 | Kernel exploit for Xbox SystemOS using CVE-2024-30088 | https://github.com/exploits-forsale/collateral-damage | POC Details |
| 5 | Questa repository contiene una replica (tentativo di replica) scritto in Python per CVE-2024-30088. | https://github.com/Admin9961/CVE-2024-30088 | POC Details |
| 6 | Kernel exploit for Xbox SystemOS using CVE-2024-30088 | https://github.com/Justintroup85/exploits-forsale-collateral-damage | POC Details |
| 7 | Windows privilege escalation: Time-of-check Time-of-use (TOCTOU) Race Condition | https://github.com/l0n3m4n/CVE-2024-30088 | POC Details |
| 8 | compiled poc binary | https://github.com/ramzihafiz/cve-2024-30088-binary | POC Details |
No public POC found.
Login to generate AI POCNo comments yet