{"uuid": "b17557d2-9186-4c80-bfa9-8f75be00cc0b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-30090", "type": "published-proof-of-concept", "source": "https://t.me/ZeroEthical_Course/1983", "content": "\ud83d\udda5 Exploiting Windows Kernel via Kernel Streaming Proxying\n\nAn in-depth look at CVE-2024-30090, a vulnerability in Kernel Streaming, allowing privilege escalation via malformed IOCTL requests. By leveraging KS Event mishandling during 32-bit to 64-bit conversions, can exploit the bug pattern to gain arbitrary kernel mode access.\n\n\ud83d\udd17 Research:\nProxying to Kernel - Part I\nProxying to Kernel - Part II\n\n\ud83d\udd17 Source:\nhttps://github.com/Dor00tkit/CVE-2024-30090\n\n#windows #streaming #kernel #cve #poc\n\ud83d\udd34 Share &amp; Support Us \ud83d\udd34\n\ud83c\udf10 Channel : @ZeroEthical_Course", "creation_timestamp": "2024-11-09T05:32:46.000000Z"}