高度な大規模言語モデル技術を使用していますが、出力には不正確または古い情報が含まれる可能性があります。Shenlongはデータの正確性を確保するよう努めていますが、実際の状況に基づいて検証・判断してください。
| ベンダー | プロダクト | 影響を受けるバージョン | CPE | 購読 |
|---|---|---|---|---|
| Microsoft | Windows 10 Version 1809 | 10.0.17763.0 ~ 10.0.17763.4851 | - | |
| Microsoft | Windows 10 Version 1809 | 10.0.0 ~ 10.0.17763.4851 | - | |
| Microsoft | Windows Server 2019 | 10.0.17763.0 ~ 10.0.17763.4851 | - | |
| Microsoft | Windows Server 2019 (Server Core installation) | 10.0.17763.0 ~ 10.0.17763.4851 | - | |
| Microsoft | Windows Server 2022 | 10.0.20348.0 ~ 10.0.20348.1970 | - | |
| Microsoft | Windows 11 version 21H2 | 10.0.0 ~ 10.0.22000.2416 | - | |
| Microsoft | Windows 10 Version 21H2 | 10.0.19043.0 ~ 10.0.19044.3448 | - | |
| Microsoft | Windows 11 version 22H2 | 10.0.22621.0 ~ 10.0.22621.2283 | - | |
| Microsoft | Windows 10 Version 22H2 | 10.0.19045.0 ~ 10.0.19045.3448 | - |
| # | POC説明 | ソースリンク | Shenlongリンク |
|---|---|---|---|
| 1 | LPE exploit for CVE-2023-36802 | https://github.com/chompie1337/Windows_MSKSSRV_LPE_CVE-2023-36802 | POC詳細 |
| 2 | CVE-2023-36802 ITW case | https://github.com/4zur-0312/CVE-2023-36802 | POC詳細 |
| 3 | PoC for CVE-2023-36802 Microsoft Kernel Streaming Service Proxy | https://github.com/x0rb3l/CVE-2023-36802-MSKSSRV-LPE | POC詳細 |
| 4 | Exploit for CVE-2023-36802 targeting MSKSSRV.SYS driver | https://github.com/Nero22k/cve-2023-36802 | POC詳細 |
| 5 | Procedure to Recreate the Exploit for CVE-2023-36802 targeting MSKSSRV.SYS driver | https://github.com/ISH2YU/CVE-2023-36802 | POC詳細 |
| 6 | Lab Project analyzing CVE-2023-36802 (mskssrv.sys) - object type confusion bug | https://github.com/rahul0xkr/Reproducing-CVE-2023-36802 | POC詳細 |
公開POCは見つかりませんでした。
ログインしてAI POCを生成| CVE-2023-33136 | 8.8 HIGH | Azure DevOps Server Remote Code Execution Vulnerability |
| CVE-2023-38146 | 8.8 HIGH | Windows Themes Remote Code Execution Vulnerability |
| CVE-2023-38147 | 8.8 HIGH | Windows Miracast Wireless Display Remote Code Execution Vulnerability |
| CVE-2023-38148 | 8.8 HIGH | Internet Connection Sharing (ICS) Remote Code Execution Vulnerability |
| CVE-2023-36764 | 8.8 HIGH | Microsoft SharePoint Server Elevation of Privilege Vulnerability |
| CVE-2023-36756 | 8.0 HIGH | Microsoft Exchange Server Remote Code Execution Vulnerability |
| CVE-2023-36757 | 8.0 HIGH | Microsoft Exchange Server Spoofing Vulnerability |
| CVE-2023-36744 | 8.0 HIGH | Microsoft Exchange Server Remote Code Execution Vulnerability |
| CVE-2023-36745 | 8.0 HIGH | Microsoft Exchange Server Remote Code Execution Vulnerability |
| CVE-2023-36742 | 7.8 HIGH | Visual Studio Code Remote Code Execution Vulnerability |
| CVE-2023-38141 | 7.8 HIGH | Windows Kernel Elevation of Privilege Vulnerability |
| CVE-2023-36758 | 7.8 HIGH | Visual Studio Elevation of Privilege Vulnerability |
| CVE-2023-36766 | 7.8 HIGH | Microsoft Excel Information Disclosure Vulnerability |
| CVE-2023-36765 | 7.8 HIGH | Microsoft Office Elevation of Privilege Vulnerability |
| CVE-2023-38142 | 7.8 HIGH | Windows Kernel Elevation of Privilege Vulnerability |
| CVE-2023-36739 | 7.8 HIGH | 3D Viewer Remote Code Execution Vulnerability |
| CVE-2023-38161 | 7.8 HIGH | Windows GDI Elevation of Privilege Vulnerability |
| CVE-2023-38150 | 7.8 HIGH | Windows Kernel Elevation of Privilege Vulnerability |
| CVE-2023-38144 | 7.8 HIGH | Windows Common Log File System Driver Elevation of Privilege Vulnerability |
| CVE-2023-35355 | 7.8 HIGH | Windows Cloud Files Mini Filter Driver Elevation of Privilege Vulnerability |
Showing 20 of 59 CVEs. View all on vendor page →
まだコメントはありません