Browsing the "privilege" Tag

FiberHome HG6245D Disclosure / Bypass / Privilege Escalation / DoS ≈ Packet Storm

January 16th, 2021 📆 | 1540 Views ⚑

Hello, Please find a text-only version below sent to security mailing lists. The complete version on “Multiple vulnerabilities found in

Tagged with:




Cloud Filter Arbitrary File Creation / Privilege Escalation ≈ Packet Storm

January 13th, 2021 📆 | 3983 Views ⚑

### This module requires Metasploit: https://metasploit.com/download# Current source: https://github.com/rapid7/metasploit-framework## class MetasploitModule < Msf::Exploit::Localinclude Exploit::EXEinclude Msf::Post::Fileinclude Msf::Post::Windows::Privinclude Msf::Post::Windows::Processinclude Msf::Post::Windows::ReflectiveDLLInjectioninclude Msf::Post::Windows::Dotnetinclude Msf::Post::Windows::Servicesinclude

Tagged with:




EyesOfNetwork 5.3 Remote Code Execution / Privilege Escalation ≈ Packet Storm

January 12th, 2021 📆 | 7989 Views ⚑

# Exploit Title: EyesOfNetwork 5.3 – RCE & PrivEsc# Date: 10/01/2021# Exploit Author: Audencia Business SCHOOL Red Team# Vendor Homepage:

Tagged with:




Backdoor.Win32.Agent.dcbh Insecure Permissions / Privilege Escalation ≈ Packet Storm

January 8th, 2021 📆 | 4232 Views ⚑

Discovery / credits: malvuln – Malvuln.com (c) 2021Original source: https://malvuln.com/advisory/bba63df41adcf2cf80c74e4a62539d44.txtContact: [email protected]: twitter.com/malvuln Threat: Backdoor.Win32.Agent.dcbhVulnerability: Insecure Permissions EoPDescription: Drops an executable

Tagged with:




Backdoor.Win32.Xtreme.yvp Insecure Permissions / Privilege Escalation ≈ Packet Storm

January 8th, 2021 📆 | 4013 Views ⚑

Discovery / credits: malvuln – Malvuln.com (c) 2021Original source: https://malvuln.com/advisory/7bd93c10c9373cfc2bcc8eff712631f1.txtContact: [email protected]: twitter.com/malvuln Threat: Backdoor.Win32.Xtreme.yvpVulnerability: Insecure Permissions EoPDescription: Change permissions are

Tagged with:




Trojan.Win32.Bayrob.cgau Insecure Permissions / Privilege Escalation ≈ Packet Storm

January 5th, 2021 📆 | 1625 Views ⚑

Discovery / credits: malvuln – Malvuln.com (c) 2021Original source: http://malvuln.com/advisory/099a169f81089dc493ea300ef0309f70.txtContact: [email protected]: twitter.com/malvuln Threat: Trojan.Win32.Bayrob.cgauVulnerability: Insecure Permissions EoP (SYSTEM)Description: Change permissions

Tagged with:




Phorpiex Insecure Permissions / Privilege Escalation ≈ Packet Storm

January 4th, 2021 📆 | 7736 Views ⚑

Discovery / credits: malvuln – Malvuln.com (c) 2021Original source: http://malvuln.com/advisory/f4d7d721f68bc9a80aaf53bc184a3c58.txtContact: [email protected]: twitter.com/malvuln Threat: PhorpiexVulnerability: Insecure permissions EoPDescription: Change permissions are

Tagged with:




SUPREMO 4.1.3.2348 Privilege Escalation ≈ Packet Storm

December 23rd, 2020 📆 | 7137 Views ⚑

Details======= Subject: Local Privilege EscalationProduct: SUPREMO by Nanosystems S.r.l.Vendor Homepage: https://www.supremocontrol.com/Vendor Status: fixed version releasedVulnerable Version: 4.1.3.2348 (No other version

Tagged with:




Android Studio Privilege Escalation ≈ Packet Storm

December 23rd, 2020 📆 | 2448 Views ⚑

Video and POC here : https://www.youtube.com/watch?v=hAPkSGxh9H0 When you open a project in android studio, if gradle-wrapper.properties setdistributionUrl=https://services.gradle.org/distributions/gradle-2.6-all.zip,then android studio will

Tagged with:




Microsoft Windows DrawIconEx Local Privilege Escalation ≈ Packet Storm

December 16th, 2020 📆 | 3677 Views ⚑

### This module requires Metasploit: https://metasploit.com/download# Current source: https://github.com/rapid7/metasploit-framework## require ‘msf/core/post/file’require ‘msf/core/exploit/exe’require ‘msf/core/post/windows/priv’ class MetasploitModule < Msf::Exploit::LocalRank = NormalRanking include

Tagged with:




Microsoft Windows Cloud Filter Arbitrary File Creation / Privilege Escalation

December 10th, 2020 📆 | 7056 Views ⚑

The Microsoft Windows Cloud Filter driver can be abused to create arbitrary files and directories leading to elevation of privilege.

Tagged with: