Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
10-question deep dive: root cause, exploitation, mitigation, urgency. Read summary free, full version requires login.
| # | POC Description | Source Link | Shenlong Link |
|---|---|---|---|
| 1 | None | https://github.com/tykawaii98/CVE-2024-30088 | POC Details |
| 2 | 🆘New Windows Kernel Priviledge Escalation Vulnerability | https://github.com/NextGenPentesters/CVE-2024-30088- | POC Details |
| 3 | 该漏洞存在于 NtQueryInformationToken 函数中,特别是在处理AuthzBasepCopyoutInternalSecurityAttributes 函数时,该漏洞源于内核在操作对象时对锁定机制的不当管理,这一失误可能导致恶意实体意外提升权限。 | https://github.com/Zombie-Kaiser/CVE-2024-30088-Windows-poc | POC Details |
| 4 | Kernel exploit for Xbox SystemOS using CVE-2024-30088 | https://github.com/exploits-forsale/collateral-damage | POC Details |
| 5 | Questa repository contiene una replica (tentativo di replica) scritto in Python per CVE-2024-30088. | https://github.com/Admin9961/CVE-2024-30088 | POC Details |
| 6 | Kernel exploit for Xbox SystemOS using CVE-2024-30088 | https://github.com/Justintroup85/exploits-forsale-collateral-damage | POC Details |
| 7 | Windows privilege escalation: Time-of-check Time-of-use (TOCTOU) Race Condition | https://github.com/l0n3m4n/CVE-2024-30088 | POC Details |
| 8 | compiled poc binary | https://github.com/ramzihafiz/cve-2024-30088-binary | POC Details |
No public POC found.
Login to generate AI POC| CVE-2024-30080 | 9.8 CRITICAL | Microsoft Message Queuing (MSMQ) Remote Code Execution Vulnerability |
| CVE-2024-30078 | 8.8 HIGH | Windows Wi-Fi Driver Remote Code Execution Vulnerability |
| CVE-2024-30068 | 8.8 HIGH | Windows Kernel Elevation of Privilege Vulnerability |
| CVE-2024-30097 | 8.8 HIGH | Microsoft Speech Application Programming Interface (SAPI) Remote Code Execution Vulnerabil |
| CVE-2024-35249 | 8.8 HIGH | Microsoft Dynamics 365 Business Central Remote Code Execution Vulnerability |
| CVE-2024-30064 | 8.8 HIGH | Windows Kernel Elevation of Privilege Vulnerability |
| CVE-2024-30103 | 8.8 HIGH | Microsoft Outlook Remote Code Execution Vulnerability |
| CVE-2024-37325 | 8.1 HIGH | Azure Science Virtual Machine (DSVM) Elevation of Privilege Vulnerability |
| CVE-2024-30074 | 8.0 HIGH | Windows Link Layer Topology Discovery Protocol Remote Code Execution Vulnerability |
| CVE-2024-30075 | 8.0 HIGH | Windows Link Layer Topology Discovery Protocol Remote Code Execution Vulnerability |
| CVE-2024-30077 | 8.0 HIGH | Windows OLE Remote Code Execution Vulnerability |
| CVE-2024-35250 | 7.8 HIGH | Windows Kernel-Mode Driver Elevation of Privilege Vulnerability |
| CVE-2024-30089 | 7.8 HIGH | Microsoft Streaming Service Elevation of Privilege Vulnerability |
| CVE-2024-30082 | 7.8 HIGH | Win32k Elevation of Privilege Vulnerability |
| CVE-2024-30095 | 7.8 HIGH | Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability |
| CVE-2024-30085 | 7.8 HIGH | Windows Cloud Files Mini Filter Driver Elevation of Privilege Vulnerability |
| CVE-2024-30094 | 7.8 HIGH | Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability |
| CVE-2024-30086 | 7.8 HIGH | Windows Win32 Kernel Subsystem Elevation of Privilege Vulnerability |
| CVE-2024-30087 | 7.8 HIGH | Win32k Elevation of Privilege Vulnerability |
| CVE-2024-30091 | 7.8 HIGH | Win32k Elevation of Privilege Vulnerability |
Showing top 20 of 49 CVEs. View all on vendor page → →
No comments yet