Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
10-question deep dive: root cause, exploitation, mitigation, urgency. Read summary free, full version requires login.
| # | POC Description | Source Link | Shenlong Link |
|---|---|---|---|
| 1 | POC exploit for CVE-2024-49138 | https://github.com/MrAle98/CVE-2024-49138-POC | POC Details |
| 2 | POC exploit for CVE-2024-49138 | https://github.com/aspire20x/CVE-2024-49138-POC | POC Details |
| 3 | None | https://github.com/bananoname/CVE-2024-49138-POC | POC Details |
| 4 | None | https://github.com/DeividasTerechovas/SOC335-CVE-2024-49138-Exploitation-Detected | POC Details |
| 5 | Hands-on SOC investigation of CVE-2024-49138 using LetsDefend, VirusTotal, Hybrid Analysis, TrueFort, and ChatGPT. | https://github.com/CyprianAtsyor/letsdefend-cve-2024-49138-investigation | POC Details |
| 6 | None | https://github.com/Glitch-ao/SOC335-CVE-2024-49138-Exploitation-Detected | POC Details |
| 7 | This is my biggest project yet: a DLang file encryptor that escalates privileges using CVE-2024-49138 and disables Windows Defender. | https://github.com/1rhino2/DLang-file-encryptor | POC Details |
| 8 | In this lab I walked through an end-to-end intrusion that began with an external RDP break-in, used a brand-new CLFS privilege-escalation exploit (CVE-2024–49138), and ended with SYSTEM-level cloud credential harvesting. Below is the story, the evidence, and the lessons I drew from it. | https://github.com/onixgod/SOC335-Event-ID-313-CVE-2024-49138-Exploitation-Detected--Lest-Defend-Writeup | POC Details |
| 9 | This is my biggest project yet: a DLang file encryptor that escalates privileges using CVE-2024-49138 and disables Windows Defender. | https://github.com/1rhino2/SCRAPPED | POC Details |
| 10 | None | https://github.com/codetronik/CVE-2024-49138 | POC Details |
| 11 | None | https://github.com/Bridg3Ops/SOC335-CVE-2024-49138-Exploitation-Detected | POC Details |
No public POC found.
Login to generate AI POC| CVE-2024-49112 | 9.8 CRITICAL | Windows Lightweight Directory Access Protocol (LDAP) Remote Code Execution Vulnerability |
| CVE-2024-49125 | 8.8 HIGH | Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability |
| CVE-2024-49080 | 8.8 HIGH | Windows IP Routing Management Snapin Remote Code Execution Vulnerability |
| CVE-2024-49117 | 8.8 HIGH | Windows Hyper-V Remote Code Execution Vulnerability |
| CVE-2024-49086 | 8.8 HIGH | Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability |
| CVE-2024-49085 | 8.8 HIGH | Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability |
| CVE-2024-49093 | 8.8 HIGH | Windows Resilient File System (ReFS) Elevation of Privilege Vulnerability |
| CVE-2024-49102 | 8.8 HIGH | Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability |
| CVE-2024-49104 | 8.8 HIGH | Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability |
| CVE-2024-49063 | 8.4 HIGH | Microsoft/Muzic Remote Code Execution Vulnerability |
| CVE-2024-49105 | 8.4 HIGH | Remote Desktop Client Remote Code Execution Vulnerability |
| CVE-2024-49068 | 8.2 HIGH | Microsoft SharePoint Elevation of Privilege Vulnerability |
| CVE-2024-49108 | 8.1 HIGH | Windows Remote Desktop Services Remote Code Execution Vulnerability |
| CVE-2024-49119 | 8.1 HIGH | Windows Remote Desktop Services Remote Code Execution Vulnerability |
| CVE-2024-49123 | 8.1 HIGH | Windows Remote Desktop Services Remote Code Execution Vulnerability |
| CVE-2024-49124 | 8.1 HIGH | Lightweight Directory Access Protocol (LDAP) Client Remote Code Execution Vulnerability |
| CVE-2024-49126 | 8.1 HIGH | Windows Local Security Authority Subsystem Service (LSASS) Remote Code Execution Vulnerabi |
| CVE-2024-49132 | 8.1 HIGH | Windows Remote Desktop Services Remote Code Execution Vulnerability |
| CVE-2024-49128 | 8.1 HIGH | Windows Remote Desktop Services Remote Code Execution Vulnerability |
| CVE-2024-49122 | 8.1 HIGH | Microsoft Message Queuing (MSMQ) Remote Code Execution Vulnerability |
Showing top 20 of 71 CVEs. View all on vendor page → →
No comments yet