公开的隐秘:CVE-2024-30051在野提权漏洞研究 | CTF导航
Tags
attack-pattern: Direct
Common Information
Type Value
UUID f6fb9809-cc34-4628-801b-d30db6fa0fb0
Fingerprint 20757378bcc21b81
Analysis status DONE
Considered CTI value -2
Text language
Published Sept. 5, 2024, midnight
Added to db Sept. 6, 2024, 3:37 a.m.
Last updated Nov. 17, 2024, 7:44 p.m.
Headline 公开的隐秘:CVE-2024-30051在野提权漏洞研究
Title 公开的隐秘:CVE-2024-30051在野提权漏洞研究 | CTF导航
Detected Hints/Tags/Attributes 15/1/19
Source URLs
RSS Feed
Details Id Enabled Feed title Url Added to db
Details 426 CTF导航 https://www.ctfiot.com/feed 2024-08-30 22:08
Attributes
Details Type #Events CTI Value
Details CVE 17
cve-2024-30051
Details CVE 3
cve-2021-26900
Details Domain 4127
github.com
Details Domain 261
blog.talosintelligence.com
Details Domain 403
securelist.com
Details Domain 452
msrc.microsoft.com
Details File 14
dwmcore.dll
Details File 3
s1.dll
Details File 12
win32kbase.sys
Details File 7
s2.exe
Details File 3
s3.dll
Details File 14
consent.exe
Details File 409
c:\windows\system32\cmd.exe
Details Github username 3
progmboy
Details Url 3
https://www.zerodayinitiative.com/blog/2021/5/3/cve-2021-26900-privilege-escalation-via-a-use-after-free-vulnerability-in-win32k
Details Url 3
https://github.com/progmboy/cansecwest2017
Details Url 3
https://blog.talosintelligence.com/snapshot-fuzzing-direct-composition-with-wtf
Details Url 3
https://securelist.com/cve-2024-30051/112618
Details Url 3
https://msrc.microsoft.com/update-guide/vulnerability/cve-2024-30051