mirror of
https://github.com/0xMarcio/cve.git
synced 2025-11-28 18:48:49 +00:00
34 lines
1.5 KiB
Markdown
34 lines
1.5 KiB
Markdown
### [CVE-2024-48990](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-48990)
|
|

|
|

|
|

|
|
|
|
### Description
|
|
|
|
Qualys discovered that needrestart, before version 3.8, allows local attackers to execute arbitrary code as root by tricking needrestart into running the Python interpreter with an attacker-controlled PYTHONPATH environment variable.
|
|
|
|
### POC
|
|
|
|
#### Reference
|
|
No PoCs from references.
|
|
|
|
#### Github
|
|
- https://github.com/Cyb3rFr0g/CVE-2024-48990-PoC
|
|
- https://github.com/CyberCrowCC/CVE-2024-48990
|
|
- https://github.com/NullByte-7w7/CVE-2024-48990
|
|
- https://github.com/R0XDEADBEEF/CVE-2024-48990
|
|
- https://github.com/ally-petitt/CVE-2024-48990-Exploit
|
|
- https://github.com/felmoltor/CVE-2024-48990
|
|
- https://github.com/makuga01/CVE-2024-48990-PoC
|
|
- https://github.com/nomi-sec/PoC-in-GitHub
|
|
- https://github.com/ns989/CVE-2024-48990
|
|
- https://github.com/pawan-shivarkar/List-of-CVE-s-
|
|
- https://github.com/pawan-shivarkar/pawan-shivarkar
|
|
- https://github.com/pentestfunctions/CVE-2024-48990-PoC-Testing
|
|
- https://github.com/plzheheplztrying/cve_monitor
|
|
- https://github.com/r0xDB/CVE-2024-48990
|
|
- https://github.com/r0xdeadbeef/CVE-2024-48990
|
|
- https://github.com/ten-ops/CVE-2024-48990_needrestart
|
|
- https://github.com/zhanpengliu-tencent/medium-cve
|
|
|