尽管我们使用了先进的大模型技术,但其输出仍可能包含不准确或过时的信息。神龙努力确保数据的准确性,但请您根据实际情况进行核实和判断。
| 厂商 | 产品 | 影响版本 | CPE | 订阅 |
|---|---|---|---|---|
| needrestart | needrestart | 0 ~ 3.8 | - |
| # | POC 描述 | 源链接 | 神龙链接 |
|---|---|---|---|
| 1 | PoC for CVE-2024-48990 | https://github.com/makuga01/CVE-2024-48990-PoC | POC详情 |
| 2 | Exploit for CVE-2024-48990 (Local Privilege Escalation in needrestart < 3.8) | https://github.com/ns989/CVE-2024-48990 | POC详情 |
| 3 | Qualys needsrestart vulnerability CVE-2024-48990 | https://github.com/felmoltor/CVE-2024-48990 | POC详情 |
| 4 | My take on the needrestart Python CVE-2024-48990 | https://github.com/Cyb3rFr0g/CVE-2024-48990-PoC | POC详情 |
| 5 | Testing POC for use cases | https://github.com/pentestfunctions/CVE-2024-48990-PoC-Testing | POC详情 |
| 6 | Qualys discovered that needrestart, before version 3.8, allows local attackers to execute arbitrary code as root by tricking needrestart into running the Python interpreter with an attacker-controlled PYTHONPATH environment variable. | https://github.com/r0xdeadbeef/CVE-2024-48990-exploit | POC详情 |
| 7 | A Local Privilege Escalation poc scipts for CVE-2024-48990, CVE-2024-48991, CVE-2024-48992, CVE-2024-10224, and CVE-2024-11003 | https://github.com/njeru-codes/needrestart-vulnerability-poc | POC详情 |
| 8 | My exploit for CVE-2024-48990. Full details of how I made this are on my blog. | https://github.com/ally-petitt/CVE-2024-48990-Exploit | POC详情 |
| 9 | Needrestart, prior to version 3.8, contains a vulnerability that allows local attackers to execute arbitrary code with root privileges. This is achieved by manipulating the PYTHONPATH environment variable to trick needrestart into running the Python interpreter in an unsafe context. | https://github.com/r0xdeadbeef/CVE-2024-48990 | POC详情 |
| 10 | None | https://github.com/CyberCrowCC/CVE-2024-48990 | POC详情 |
| 11 | None | https://github.com/NullByte-7w7/CVE-2024-48990 | POC详情 |
| 12 | Exploit for CVE-2024-48990 - Privilege Escalation in Needrestart 3.7-3. For eductional purposes only | https://github.com/ten-ops/CVE-2024-48990_needrestart | POC详情 |
| 13 | Needrestart, prior to version 3.8, contains a vulnerability that allows local attackers to execute arbitrary code with root privileges. This is achieved by manipulating the PYTHONPATH environment variable to trick needrestart into running the Python interpreter in an unsafe context. | https://github.com/r0xDB/CVE-2024-48990 | POC详情 |
| 14 | Needrestart, prior to version 3.8, contains a vulnerability that allows local attackers to execute arbitrary code with root privileges. This is achieved by manipulating the PYTHONPATH environment variable to trick needrestart into running the Python interpreter in an unsafe context. | https://github.com/R0XDEADBEEF/CVE-2024-48990 | POC详情 |
| 15 | Automated local privilege escalation exploit for CVE-2024-48990 (needrestart v3.7), leveraging PYTHONPATH hijacking to gain root access. | https://github.com/Serner77/CVE-2024-48990-Automatic-Exploit | POC详情 |
| 16 | Full exploit for needsrestart setuid root shell | https://github.com/mladicstefan/CVE-2024-48990 | POC详情 |
| 17 | PoC for CVE-2024-48990 | https://github.com/Mr-DJ/CVE-2024-48990 | POC详情 |
| 18 | None | https://github.com/Loaxert/CVE-2024-48990-PoC | POC详情 |
| 19 | i tried this in Conversor HTB machine | https://github.com/0x3bs/CVE-2024-48990 | POC详情 |
| 20 | an exploit for CVE-2024-48990 ( Local Privilege Escalation ) in needrestart | https://github.com/o-sec/CVE-2024-48990 | POC详情 |
| 21 | Local privilege escalation exploit for needrestart (CVE-2024-48990) | https://github.com/tahsinunluturk/needrestart-privesc-cve-2024-48990 | POC详情 |
| 22 | Simple poc for CVE-2024-48990 privilege escalation vulnerability with needrestart. | https://github.com/sobbing333/CVE-2024-48990-POC | POC详情 |
| 23 | PoC about CVE-2024-48990. Qualys discovered that needrestart, before version 3.8, allows local attackers to execute arbitrary code as root by tricking needrestart into running the Python interpreter with an attacker-controlled PYTHONPATH environment variable. (NIST) | https://github.com/grecosamuel/CVE-2024-48990 | POC详情 |
| 24 | needrestart < 3.8 Local Privilege Escalation via PYTHONPATH injection | https://github.com/BLUEBERRYP1LL/CVE-2024-48990 | POC详情 |
未找到公开 POC。
登录以生成 AI POC暂无评论