Microsoft Windows AppX Deployment Service local privilege escalation exploit that bypasses CVE-2019-0841.
af562c39c5eded599da71b9d67500497398f715a41c963012aa2ae2f496664cc
Microsoft Windows suffers from a deployment service local privilege escalation vulnerability that bypasses the fix for CVE-2019-0841.
caaa2612710f8787fcf3720235ce07701e951b4de14708d2dd49578f5a204107
Microsoft Windows installer suffers from a race condition that can allow for privilege escalation.
e5943fac225d4d55b0fa4d7a1e4b21e8a597a5aa436c053cea39b3a02de897f9
Internet Explorer 11 exploit that allows attackers to execute JavaScript with higher system access than is normally permitted by the browser sandbox.
7201c91d0285dfceb33caf8cf4b721c934c72d5d2f45225ca7e38a1614207c23
Angry Polar Bear 2 is a Microsoft Windows error reporting privilege escalation exploit.
5acdfb34c398811a4f8c1dd9e52decb18e0d1a86ec622eba5000824ef62936ba
Microsoft Windows task scheduler .job import arbitrary DACL write proof of concept exploit.
0fa856233177fd157eb0c17568447c14846e7a88d108dd0d1cfae0edd06e078a
Angry Polar Bear is a Microsoft Windows error reporting privilege escalation exploit.
6ba1825663dc4af4d5138e171b80cce360a1ec36f1429feee694aefc93ee3e1b
Microsoft Data Sharing local privilege escalation proof of concept exploit.
da8c6406c1abcf27d99ca4b620356d083b3c9d9f3ce24c41c93b45e85d1ceb64
On vulnerable versions of Windows the alpc endpoint method SchRpcSetSecurity implemented by the task scheduler service can be used to write arbitrary DACLs to .job files located in c:\windows\tasks because the scheduler does not use impersonation when checking this location. Since users can create files in the c:\windows\tasks folder, a hardlink can be created to a file the user has read access to. After creating a hardlink, the vulnerability can be triggered to set the DACL on the linked file. WARNING: The PrintConfig.dll (%windir%\system32\driverstor\filerepository\prnms003*) on the target host will be overwritten when the exploit runs. This Metasploit module has been tested against Windows 10 Pro x64.
c95cd7c1a2ed4a550a27c66b7fcad45a1a61d5951227bc43830a853f611b7cd1
Microsoft Windows Advanced Local Procedure Call (ALPC) local privilege escalation exploit.
72b0e5a43d223478f7a486b1ed1b7acbdfb0c2859f77ebe2af32a9a113ac1f44