Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
| Vendor | Product | Affected Versions | CPE | Subscribe |
|---|---|---|---|---|
| needrestart | needrestart | 0 ~ 3.8 | - |
| # | POC Description | Source Link | Shenlong Link |
|---|---|---|---|
| 1 | PoC for CVE-2024-48990 | https://github.com/makuga01/CVE-2024-48990-PoC | POC Details |
| 2 | Exploit for CVE-2024-48990 (Local Privilege Escalation in needrestart < 3.8) | https://github.com/ns989/CVE-2024-48990 | POC Details |
| 3 | Qualys needsrestart vulnerability CVE-2024-48990 | https://github.com/felmoltor/CVE-2024-48990 | POC Details |
| 4 | My take on the needrestart Python CVE-2024-48990 | https://github.com/Cyb3rFr0g/CVE-2024-48990-PoC | POC Details |
| 5 | Testing POC for use cases | https://github.com/pentestfunctions/CVE-2024-48990-PoC-Testing | POC Details |
| 6 | Qualys discovered that needrestart, before version 3.8, allows local attackers to execute arbitrary code as root by tricking needrestart into running the Python interpreter with an attacker-controlled PYTHONPATH environment variable. | https://github.com/r0xdeadbeef/CVE-2024-48990-exploit | POC Details |
| 7 | A Local Privilege Escalation poc scipts for CVE-2024-48990, CVE-2024-48991, CVE-2024-48992, CVE-2024-10224, and CVE-2024-11003 | https://github.com/njeru-codes/needrestart-vulnerability-poc | POC Details |
| 8 | My exploit for CVE-2024-48990. Full details of how I made this are on my blog. | https://github.com/ally-petitt/CVE-2024-48990-Exploit | POC Details |
| 9 | Needrestart, prior to version 3.8, contains a vulnerability that allows local attackers to execute arbitrary code with root privileges. This is achieved by manipulating the PYTHONPATH environment variable to trick needrestart into running the Python interpreter in an unsafe context. | https://github.com/r0xdeadbeef/CVE-2024-48990 | POC Details |
| 10 | None | https://github.com/CyberCrowCC/CVE-2024-48990 | POC Details |
| 11 | None | https://github.com/NullByte-7w7/CVE-2024-48990 | POC Details |
| 12 | Exploit for CVE-2024-48990 - Privilege Escalation in Needrestart 3.7-3. For eductional purposes only | https://github.com/ten-ops/CVE-2024-48990_needrestart | POC Details |
| 13 | Needrestart, prior to version 3.8, contains a vulnerability that allows local attackers to execute arbitrary code with root privileges. This is achieved by manipulating the PYTHONPATH environment variable to trick needrestart into running the Python interpreter in an unsafe context. | https://github.com/r0xDB/CVE-2024-48990 | POC Details |
| 14 | Needrestart, prior to version 3.8, contains a vulnerability that allows local attackers to execute arbitrary code with root privileges. This is achieved by manipulating the PYTHONPATH environment variable to trick needrestart into running the Python interpreter in an unsafe context. | https://github.com/R0XDEADBEEF/CVE-2024-48990 | POC Details |
| 15 | Automated local privilege escalation exploit for CVE-2024-48990 (needrestart v3.7), leveraging PYTHONPATH hijacking to gain root access. | https://github.com/Serner77/CVE-2024-48990-Automatic-Exploit | POC Details |
| 16 | Full exploit for needsrestart setuid root shell | https://github.com/mladicstefan/CVE-2024-48990 | POC Details |
| 17 | PoC for CVE-2024-48990 | https://github.com/Mr-DJ/CVE-2024-48990 | POC Details |
| 18 | None | https://github.com/Loaxert/CVE-2024-48990-PoC | POC Details |
| 19 | i tried this in Conversor HTB machine | https://github.com/0x3bs/CVE-2024-48990 | POC Details |
| 20 | an exploit for CVE-2024-48990 ( Local Privilege Escalation ) in needrestart | https://github.com/o-sec/CVE-2024-48990 | POC Details |
| 21 | Local privilege escalation exploit for needrestart (CVE-2024-48990) | https://github.com/tahsinunluturk/needrestart-privesc-cve-2024-48990 | POC Details |
| 22 | Simple poc for CVE-2024-48990 privilege escalation vulnerability with needrestart. | https://github.com/sobbing333/CVE-2024-48990-POC | POC Details |
| 23 | PoC about CVE-2024-48990. Qualys discovered that needrestart, before version 3.8, allows local attackers to execute arbitrary code as root by tricking needrestart into running the Python interpreter with an attacker-controlled PYTHONPATH environment variable. (NIST) | https://github.com/grecosamuel/CVE-2024-48990 | POC Details |
| 24 | needrestart < 3.8 Local Privilege Escalation via PYTHONPATH injection | https://github.com/BLUEBERRYP1LL/CVE-2024-48990 | POC Details |
No public POC found.
Login to generate AI POCNo comments yet