尽管我们使用了先进的大模型技术,但其输出仍可能包含不准确或过时的信息。神龙努力确保数据的准确性,但请您根据实际情况进行核实和判断。
| # | POC 描述 | 源链接 | 神龙链接 |
|---|---|---|---|
| 1 | # CVE-2026-20805 PoC Prueba de concepto para la vulnerabilidad de divulgación de información en **Desktop Windows Manager (dwm.exe)** de Microsoft. ## 📋 Resumen de la Vulnerabilidad - **ID:** CVE-2026-20805 - **Producto:** Microsoft Windows | https://github.com/fevar54/CVE-2026-20805-POC | POC详情 |
| 2 | The PoC of information disclosure in Microsoft Desktop Windows Management. | https://github.com/Uzair-Baig0900/CVE-2026-20805-PoC | POC详情 |
| 3 | CVE‑2026‑20805: A Windows Desktop Window Manager flaw causing local information disclosure. Requires low privileges, no user interaction. Rated CVSS 5.5 (Medium). Actively exploited and listed in CISA KEV; patch released January 2026. | https://github.com/mrk336/Inside-CVE-2026-20805-How-a-Windows-DWM-Flaw-Exposed-Sensitive-Data | POC详情 |
| 4 | ### 📡 Theoretical Classification **ID:** SCTT-2026-33-0002 **Researcher:** Americo Simoes (SimoesCTT) **Physics:** Theorem 4.2 - Turbulent Phase Transition (TPT) **Constant:** α = 0.0302011 **Target:** Desktop Window Manager (dwm.exe) / Windows Graphics Component **Obsoletes:** CVE-2026-20805 & CVE-2026-20871 (Visual-Latch Patches) | https://github.com/SimoesCTT/-SCTT-2026-33-0002-DWM-Visual-Field-Singularity | POC详情 |
| 5 | Microsoft just patched CVE-2026-20805 and CVE-2026-20871 in January 2026 to stop "Information Disclosure" and "Use-After-Free" bugs in DWM. They think they've secured the "Visual Boundary." We are about to prove that a 33-layer resonance can turn those visual buffers into a liquid pipeline for SCTT-2026-33-0002. | https://github.com/SimoesCTT/SCTT-2026-33-0002-DWM-Visual-Field-Singularity | POC详情 |
未找到公开 POC。
登录以生成 AI POC暂无评论