Browsing the "privilege" Tag

MSI Ambient Link Driver 1.0.0.8 Privilege Escalation ≈ Packet Storm

September 29th, 2020 📆 | 7745 Views ⚑

*]/**]Exploit Title: MSI Ambient Link Driver 1.0.0.8 – Local Privilege Escalation*]Date: 2020-09-24*]Exploit Author: Matteo Malvica*]Vendor Homepage: https://www.msi.com*]Software Link: https://msi.gm/ABLTMNB*]Driver: MSIO64.sys*]SHA256:

Tagged with:




VyOS restricted-shell Escape / Privilege Escalation ≈ Packet Storm

September 21st, 2020 📆 | 5479 Views ⚑

### This module requires Metasploit: https://metasploit.com/download# Current source: https://github.com/rapid7/metasploit-framework## require ‘net/ssh’require ‘net/ssh/command_stream’ class MetasploitModule < Msf::Exploit::RemoteRank = GreatRanking include Msf::Exploit::Remote::SSHinclude

Tagged with:




Microsoft Spooler Local Privilege Elevation ≈ Packet Storm

September 18th, 2020 📆 | 6738 Views ⚑

### This module requires Metasploit: https://metasploit.com/download# Current source: https://github.com/rapid7/metasploit-framework## class MetasploitModule < Msf::Exploit::LocalRank = ExcellentRanking include Msf::Post::Commoninclude Msf::Post::Fileinclude Msf::Post::Windows::Privinclude Msf::Exploit::EXE

Tagged with:




DnsAdmin ServerLevelPluginDll Feature Abuse Privilege Escalation ≈ Packet Storm

September 11th, 2020 📆 | 8455 Views ⚑

### This module requires Metasploit: https://metasploit.com/download# Current source: https://github.com/rapid7/metasploit-framework## require ‘metasploit/framework/compiler/windows’ class MetasploitModule < Msf::Exploit::LocalRank = NormalRanking include Msf::Post::Fileinclude Msf::Post::Windows::Privinclude

Tagged with:




Microsoft Windows StorageFolder Marshaled Object Access Check Bypass / Privilege Escalation

September 9th, 2020 📆 | 5367 Views ⚑

The StorageFolder class when used out of process can bypass security checks to read and write files not allowed to

Tagged with:




Critical Intel Active Management Technology Flaw Allows Privilege Escalation

September 9th, 2020 📆 | 6325 Views ⚑

Critical Intel Active Management Technology Flaw Allows Privilege Escalation Source link

Tagged with:




Rapid7 Nexpose Installer 6.6.39 Local Privilege Escalation ≈ Packet Storm

September 8th, 2020 📆 | 7105 Views ⚑

Rapid7 Nexpose Installer 6.6.39 Local Privilege Escalation Vendor: Rapid7Product web page: https://www.rapid7.comAffected version: < =6.6.39 Summary: Rapid7 Nexpose is a

Tagged with:




macOS cfprefsd Arbitrary File Write / Local Privilege Escalation ≈ Packet Storm

September 8th, 2020 📆 | 6016 Views ⚑

### This module requires Metasploit: https://metasploit.com/download# Current source: https://github.com/rapid7/metasploit-framework## class MetasploitModule < Msf::Exploit::LocalRank = ExcellentRanking prepend Msf::Exploit::Remote::AutoCheckinclude Msf::Post::Fileinclude Msf::Post::OSX::Privinclude Msf::Post::OSX::Systeminclude

Tagged with:




SUPERAntiSpyware Professional X Trial Privilege Escalation ≈ Packet Storm

August 28th, 2020 📆 | 6218 Views ⚑

# Exploit Title: SUPERAntiSpyware Professional X Trial < 10.0.1206 Local Privilege Escalation# Date: 2020-08-28# Exploit Author: b1nary# Vendor Homepage: https://www.superantispyware.com/#

Tagged with:




Microsoft Windows CmpDoReDoCreateKey Arbitrary Registry Key Creation Privilege Escalation

August 22nd, 2020 📆 | 8436 Views ⚑

The handling of KTM logs does not limit Registry Key operations to the loading hive leading to elevation of privilege.

Tagged with:




Microsoft Windows CmpDoReadTxRBigLogRecord Memory Corruption Privilege Escalation

August 22nd, 2020 📆 | 8065 Views ⚑

The handling of KTM logs when initializing a Registry Hive contains no bounds checks which results in privilege escalation. Source

Tagged with:




Eibiz i-Media Server Digital Signage 3.8.0 Remote Privilege Escalation / Account Takeover ≈ Packet Storm

August 22nd, 2020 📆 | 6108 Views ⚑

#!/usr/bin/env python3# -*- coding: utf-8 -*-### Eibiz i-Media Server Digital Signage 3.8.0 Remote Privilege Escalation / Account Takeover### Vendor: EIBIZ

Tagged with:




Gantt-Chart For Jira 5.5.3 Missing Privilege Check ≈ Packet Storm

August 5th, 2020 📆 | 7866 Views ⚑

—–BEGIN PGP SIGNED MESSAGE—–Hash: SHA512 Advisory ID: SYSS-2020-029Product: Jira module “Gantt-Chart for Jira”Manufacturer: Frank Polscheit – Solutions & IT-ConsultingAffected Version(s):

Tagged with:




Microsoft Windows Win32k Privilege Escalation ≈ Packet Storm

August 4th, 2020 📆 | 5325 Views ⚑

# Exploit Title: Elevation of Privilege# Author: nu11secur1ty# Date: 08.03.2020# Exploit Date: 01/14/2020# Vendor: Microsoft# Software Link:https://support.microsoft.com/en-us/help/3095649/win32k-sys-update-in-windows-october-2015# Exploit link:https://github.com/nu11secur1ty/Windows10Exploits/raw/master/Undefined/CVE-2020-0624/win32k/__32-win32k.sys5.1.2600.1330.zip# CVE:

Tagged with:




FreeBSD ip6_setpktopt Use-After-Free Privilege Escalation ≈ Packet Storm

August 1st, 2020 📆 | 4707 Views ⚑

### This module requires Metasploit: https://metasploit.com/download# Current source: https://github.com/rapid7/metasploit-framework## class MetasploitModule < Msf::Exploit::LocalRank = GreatRanking prepend Msf::Exploit::Remote::AutoCheckinclude Msf::Post::Fileinclude Msf::Post::Unixinclude Msf::Exploit::EXEinclude

Tagged with:




MAMP PRO 4.2.0 Local Privilege Escalation ≈ Packet Storm

July 30th, 2020 📆 | 7314 Views ⚑

# Exploit Title: MAMP PRO 4.2.0 Local Privilege Escalation# Date: 2020-07-08# Exploit Author: b1nary# Vendor Homepage: https://www.mamp.info/# Software Link: https://downloads.mamp.info/MAMP-PRO-WINDOWS/releases/4.2.0/MAMP_MAMP_PRO_4.2.0.exe#

Tagged with: