Browsing the "escalation" Tag

MSI Ambient Link Driver 1.0.0.8 Privilege Escalation ≈ Packet Storm

September 29th, 2020 📆 | 8469 Views ⚑

*]/**]Exploit Title: MSI Ambient Link Driver 1.0.0.8 – Local Privilege Escalation*]Date: 2020-09-24*]Exploit Author: Matteo Malvica*]Vendor Homepage: https://www.msi.com*]Software Link: https://msi.gm/ABLTMNB*]Driver: MSIO64.sys*]SHA256:

Tagged with:




U.S. restricts technology exports to China’s biggest semiconductor manufacturer in new escalation of trade tensions

September 27th, 2020 📆 | 6799 Views ⚑

By The Washington Post · Jeanne Whalen · NATIONAL, BUSINESS, WORLD, TECHNOLOGY, NATIONAL-SECURITY, US-GLOBAL-MARKETS, ASIA-PACIFIC The Trump administration has issued new restrictions on U.S. technology exports to China’s biggest

Tagged with:




VyOS restricted-shell Escape / Privilege Escalation ≈ Packet Storm

September 21st, 2020 📆 | 4157 Views ⚑

### This module requires Metasploit: https://metasploit.com/download# Current source: https://github.com/rapid7/metasploit-framework## require ‘net/ssh’require ‘net/ssh/command_stream’ class MetasploitModule < Msf::Exploit::RemoteRank = GreatRanking include Msf::Exploit::Remote::SSHinclude

Tagged with:




DnsAdmin ServerLevelPluginDll Feature Abuse Privilege Escalation ≈ Packet Storm

September 11th, 2020 📆 | 7446 Views ⚑

### This module requires Metasploit: https://metasploit.com/download# Current source: https://github.com/rapid7/metasploit-framework## require ‘metasploit/framework/compiler/windows’ class MetasploitModule < Msf::Exploit::LocalRank = NormalRanking include Msf::Post::Fileinclude Msf::Post::Windows::Privinclude

Tagged with:




Microsoft Windows StorageFolder Marshaled Object Access Check Bypass / Privilege Escalation

September 9th, 2020 📆 | 3548 Views ⚑

The StorageFolder class when used out of process can bypass security checks to read and write files not allowed to

Tagged with:




Critical Intel Active Management Technology Flaw Allows Privilege Escalation

September 9th, 2020 📆 | 7568 Views ⚑

Critical Intel Active Management Technology Flaw Allows Privilege Escalation Source link

Tagged with:




Rapid7 Nexpose Installer 6.6.39 Local Privilege Escalation ≈ Packet Storm

September 8th, 2020 📆 | 7225 Views ⚑

Rapid7 Nexpose Installer 6.6.39 Local Privilege Escalation Vendor: Rapid7Product web page: https://www.rapid7.comAffected version: < =6.6.39 Summary: Rapid7 Nexpose is a

Tagged with:




macOS cfprefsd Arbitrary File Write / Local Privilege Escalation ≈ Packet Storm

September 8th, 2020 📆 | 4451 Views ⚑

### This module requires Metasploit: https://metasploit.com/download# Current source: https://github.com/rapid7/metasploit-framework## class MetasploitModule < Msf::Exploit::LocalRank = ExcellentRanking prepend Msf::Exploit::Remote::AutoCheckinclude Msf::Post::Fileinclude Msf::Post::OSX::Privinclude Msf::Post::OSX::Systeminclude

Tagged with:




SUPERAntiSpyware Professional X Trial Privilege Escalation ≈ Packet Storm

August 28th, 2020 📆 | 7725 Views ⚑

# Exploit Title: SUPERAntiSpyware Professional X Trial < 10.0.1206 Local Privilege Escalation# Date: 2020-08-28# Exploit Author: b1nary# Vendor Homepage: https://www.superantispyware.com/#

Tagged with:




Microsoft Windows CmpDoReDoCreateKey Arbitrary Registry Key Creation Privilege Escalation

August 22nd, 2020 📆 | 3872 Views ⚑

The handling of KTM logs does not limit Registry Key operations to the loading hive leading to elevation of privilege.

Tagged with:




Microsoft Windows CmpDoReadTxRBigLogRecord Memory Corruption Privilege Escalation

August 22nd, 2020 📆 | 1761 Views ⚑

The handling of KTM logs when initializing a Registry Hive contains no bounds checks which results in privilege escalation. Source

Tagged with:




Eibiz i-Media Server Digital Signage 3.8.0 Remote Privilege Escalation / Account Takeover ≈ Packet Storm

August 22nd, 2020 📆 | 2466 Views ⚑

#!/usr/bin/env python3# -*- coding: utf-8 -*-### Eibiz i-Media Server Digital Signage 3.8.0 Remote Privilege Escalation / Account Takeover### Vendor: EIBIZ

Tagged with:




Microsoft Windows Win32k Privilege Escalation ≈ Packet Storm

August 4th, 2020 📆 | 5413 Views ⚑

# Exploit Title: Elevation of Privilege# Author: nu11secur1ty# Date: 08.03.2020# Exploit Date: 01/14/2020# Vendor: Microsoft# Software Link:https://support.microsoft.com/en-us/help/3095649/win32k-sys-update-in-windows-october-2015# Exploit link:https://github.com/nu11secur1ty/Windows10Exploits/raw/master/Undefined/CVE-2020-0624/win32k/__32-win32k.sys5.1.2600.1330.zip# CVE:

Tagged with:




FreeBSD ip6_setpktopt Use-After-Free Privilege Escalation ≈ Packet Storm

August 1st, 2020 📆 | 3755 Views ⚑

### This module requires Metasploit: https://metasploit.com/download# Current source: https://github.com/rapid7/metasploit-framework## class MetasploitModule < Msf::Exploit::LocalRank = GreatRanking prepend Msf::Exploit::Remote::AutoCheckinclude Msf::Post::Fileinclude Msf::Post::Unixinclude Msf::Exploit::EXEinclude

Tagged with:




MAMP PRO 4.2.0 Local Privilege Escalation ≈ Packet Storm

July 30th, 2020 📆 | 5921 Views ⚑

# Exploit Title: MAMP PRO 4.2.0 Local Privilege Escalation# Date: 2020-07-08# Exploit Author: b1nary# Vendor Homepage: https://www.mamp.info/# Software Link: https://downloads.mamp.info/MAMP-PRO-WINDOWS/releases/4.2.0/MAMP_MAMP_PRO_4.2.0.exe#

Tagged with:




SteelCentral Aternity Agent 11.0.0.120 Privilege Escalation ≈ Packet Storm

July 24th, 2020 📆 | 8557 Views ⚑

SEC Consult Vulnerability Lab Security Advisory < 20200724-0 >=======================================================================title: Privilege Escalation Vulnerabilityproduct: SteelCentral Aternity Agentvulnerable version: 11.0.0.120fixed version:CVE number: CVE-2020-15592,

Tagged with: