Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2024-35250 PoC — Windows Kernel-Mode Driver Elevation of Privilege Vulnerability

Source
Associated Vulnerability
Title:Windows Kernel-Mode Driver Elevation of Privilege Vulnerability (CVE-2024-35250)
Description:Windows Kernel-Mode Driver Elevation of Privilege Vulnerability
Description
PoC for the Untrusted Pointer Dereference in the ks.sys driver
Readme
# CVE-2024-35250
PoC for the Untrusted Pointer Dereference in the ks.sys driver

https://github.com/user-attachments/assets/79e8f3e6-91d5-4145-9a78-1d36248c7284

## Acknowledgements

Credits to the Devcore team and their [research](https://devco.re/blog/2024/08/23/streaming-vulnerabilities-from-windows-kernel-proxying-to-kernel-part1-en/)
File Snapshot

[4.0K] /data/pocs/5746d530e95fe629aae1add99ad06e22c0d9cdb4 ├── [3.7K] common.h ├── [ 13K] CVE-2024-35250.cpp └── [ 341] README.md 0 directories, 3 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. Local POC snapshots are reserved for subscribers — if the original source is unavailable, the local mirror is part of the paid plan.
    3. Mirroring, verifying, and maintaining this POC archive takes ongoing effort, so local snapshots are a paid feature. Your subscription keeps the archive online — thank you for the support. View subscription plans →