尽管我们使用了先进的大模型技术,但其输出仍可能包含不准确或过时的信息。神龙努力确保数据的准确性,但请您根据实际情况进行核实和判断。
| 厂商 | 产品 | 影响版本 | CPE | 订阅 |
|---|---|---|---|---|
| Microsoft | Windows 10 Version 1809 | 10.0.17763.0 ~ 10.0.17763.8027 | - | |
| Microsoft | Windows 10 Version 21H2 | 10.0.19044.0 ~ 10.0.19044.6575 | - | |
| Microsoft | Windows 10 Version 22H2 | 10.0.19045.0 ~ 10.0.19045.6575 | - | |
| Microsoft | Windows 11 version 22H3 | 10.0.22631.0 ~ 10.0.22631.6199 | - | |
| Microsoft | Windows 11 Version 23H2 | 10.0.22631.0 ~ 10.0.22631.6199 | - | |
| Microsoft | Windows 11 Version 24H2 | 10.0.26100.0 ~ 10.0.26100.7171 | - | |
| Microsoft | Windows 11 Version 25H2 | 10.0.26200.0 ~ 10.0.26200.7171 | - | |
| Microsoft | Windows Server 2019 | 10.0.17763.0 ~ 10.0.17763.8027 | - | |
| Microsoft | Windows Server 2019 (Server Core installation) | 10.0.17763.0 ~ 10.0.17763.8027 | - | |
| Microsoft | Windows Server 2022 | 10.0.20348.0 ~ 10.0.20348.4405 | - | |
| Microsoft | Windows Server 2022, 23H2 Edition (Server Core installation) | 10.0.25398.0 ~ 10.0.25398.1965 | - | |
| Microsoft | Windows Server 2025 | 10.0.26100.0 ~ 10.0.26100.7171 | - | |
| Microsoft | Windows Server 2025 (Server Core installation) | 10.0.26100.0 ~ 10.0.26100.7171 | - |
| # | POC 描述 | 源链接 | 神龙链接 |
|---|---|---|---|
| 1 | CVE-2025-62215 is an Elevation of Privilege (EoP) vulnerability in the Windows Kernel, disclosed in November 2025 and confirmed to be actively exploited as a zero-day. | https://github.com/dexterm300/CVE-2025-62215-exploit-poc | POC详情 |
| 2 | Hands‑on analysis of CVE‑2025‑62215, a Windows Kernel race condition exploited in the wild. Demonstrates privilege escalation to SYSTEM, detection scripts, and patch validation strategies for enterprise defenders and red teamers. | https://github.com/mrk336/Kernel-Chaos-Weaponizing-CVE-2025-62215-for-SYSTEM-Privilege-Escalation | POC详情 |
| 3 | This PoC demonstrates a race condition in the Windows kernel leading to a double-free vulnerability, allowing local privilege escalation to SYSTEM. The exploit uses multithreaded handle manipulation and heap spraying to trigger the flaw under controlled conditions. | https://github.com/abrewer251/CVE-2025-62215_Windows_Kernel_PE | POC详情 |
| 4 | CVE-2025-62215: Windows Kernel Race Condition + Double-Free EoP | https://github.com/theman001/CVE-2025-62215 | POC详情 |
| 5 | CVE-2025-62215 exploit development using Claude Code Agent Team | https://github.com/uky007/CVE-2025-62215_analysis | POC详情 |
未找到公开 POC。
登录以生成 AI POC暂无评论