Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
| Vendor | Product | Affected Versions | CPE | Subscribe |
|---|---|---|---|---|
| Microsoft | Windows 11 version 21H2 | 10.0.22000.0 ~ 10.0.22000.3019 | - | |
| Microsoft | Windows Server 2022 | 10.0.20348.0 ~ 10.0.20348.2527 | - | |
| Microsoft | Windows 10 Version 1809 | 10.0.17763.0 ~ 10.0.17763.5936 | - | |
| Microsoft | Windows 10 Version 1809 | 10.0.0 ~ 10.0.17763.5936 | - | |
| Microsoft | Windows Server 2019 (Server Core installation) | 10.0.17763.0 ~ 10.0.17763.5936 | - | |
| Microsoft | Windows Server 2019 | 10.0.17763.0 ~ 10.0.17763.5936 | - | |
| Microsoft | Windows 10 Version 21H2 | 10.0.19044.0 ~ 10.0.19044.4529 | - | |
| Microsoft | Windows 11 version 22H2 | 10.0.22621.0 ~ 10.0.22621.3737 | - | |
| Microsoft | Windows 11 version 22H3 | 10.0.22631.0 ~ 10.0.22631.3737 | - | |
| Microsoft | Windows 10 Version 22H2 | 10.0.19045.0 ~ 10.0.19045.4529 | - | |
| Microsoft | Windows 11 Version 23H2 | 10.0.22631.0 ~ 10.0.22631.3737 | - | |
| Microsoft | Windows Server 2022, 23H2 Edition (Server Core installation) | 10.0.25398.0 ~ 10.0.25398.950 | - |
| # | POC Description | Source Link | Shenlong Link |
|---|---|---|---|
| 1 | CVE-2024-30085 (Alex Birnberg) | https://github.com/Adamkadaban/CVE-2024-30085 | POC Details |
| 2 | Exploit en Python diseñado para aprovechar la vulnerabilidad de elevación de privilegios CVE-2024-30085 | https://github.com/murdok1982/Exploit-PoC-para-CVE-2024-30085 | POC Details |
No public POC found.
Login to generate AI POC| CVE-2024-30080 | 9.8 CRITICAL | Microsoft Message Queuing (MSMQ) Remote Code Execution Vulnerability |
| CVE-2024-30103 | 8.8 HIGH | Microsoft Outlook Remote Code Execution Vulnerability |
| CVE-2024-30068 | 8.8 HIGH | Windows Kernel Elevation of Privilege Vulnerability |
| CVE-2024-35249 | 8.8 HIGH | Microsoft Dynamics 365 Business Central Remote Code Execution Vulnerability |
| CVE-2024-30064 | 8.8 HIGH | Windows Kernel Elevation of Privilege Vulnerability |
| CVE-2024-30078 | 8.8 HIGH | Windows Wi-Fi Driver Remote Code Execution Vulnerability |
| CVE-2024-30097 | 8.8 HIGH | Microsoft Speech Application Programming Interface (SAPI) Remote Code Execution Vulnerabil |
| CVE-2024-37325 | 8.1 HIGH | Azure Science Virtual Machine (DSVM) Elevation of Privilege Vulnerability |
| CVE-2024-30077 | 8.0 HIGH | Windows OLE Remote Code Execution Vulnerability |
| CVE-2024-30074 | 8.0 HIGH | Windows Link Layer Topology Discovery Protocol Remote Code Execution Vulnerability |
| CVE-2024-30075 | 8.0 HIGH | Windows Link Layer Topology Discovery Protocol Remote Code Execution Vulnerability |
| CVE-2024-30095 | 7.8 HIGH | Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability |
| CVE-2024-30091 | 7.8 HIGH | Win32k Elevation of Privilege Vulnerability |
| CVE-2024-30100 | 7.8 HIGH | Microsoft SharePoint Server Remote Code Execution Vulnerability |
| CVE-2024-30072 | 7.8 HIGH | Microsoft Event Trace Log File Parsing Remote Code Execution Vulnerability |
| CVE-2024-30104 | 7.8 HIGH | Microsoft Office Remote Code Execution Vulnerability |
| CVE-2024-30089 | 7.8 HIGH | Microsoft Streaming Service Elevation of Privilege Vulnerability |
| CVE-2024-30086 | 7.8 HIGH | Windows Win32 Kernel Subsystem Elevation of Privilege Vulnerability |
| CVE-2024-30087 | 7.8 HIGH | Win32k Elevation of Privilege Vulnerability |
| CVE-2024-30082 | 7.8 HIGH | Win32k Elevation of Privilege Vulnerability |
Showing top 20 of 49 CVEs. View all on vendor page → →
No comments yet