This module uses ioctls Write to IO Ports and generate a reboot
This module exploits a JSON deserialization vulnerability present in the test alert actions of SolarWinds Orion Network Performance Monitor. The deployed agent will run with the privileges of the "IIS Worker Process" process (NT AUTHORITY\NETWORK SERVICE).
The vulnerability has been dubbed PrintNightmare and is tracked as CVE-2021-34527. The flaw is due to the Windows Print Spooler service improperly performing privileged file operations. Microsoft says the flaw can be exploited by an authenticated user calling RpcAddPrinterDriverEx(). When exploited, an attacker gains SYSTEM privileges and can execute arbitrary code, install programs, view, change, or delete data or create new accounts with full user rights.
A Local Privilege Escalation vulnerability exists when the Windows Print Spooler service improperly performs privileged file operations. An attacker who successfully exploited this vulnerability could run arbitrary code with SYSTEM privileges.
An elevation of privilege vulnerability exists in the way the Windows Graphics Component handles objects in memory.
This module crashes the target machine producing a blue screen by sending a malformed HTTP packet.
This module first uses hard-coded credentials for the diagnostics user to authenticate in the UCMDB component. Then a java deserialization vulnerability present in several endpoints of the UCMDB service is used to execute commands. The deployed agent will run with the SYSTEM privileges on Windows and root on Linux.
An elevation of privilege vulnerability exists in the way the Windows Graphics Component handles objects in memory.
The Security Service of Cisco AnyConnect Posture (HostScan) for Windows incorrectly restricts access to internal IPC commands. This could enable low-privileged users to achieve NT AUTHORITY\SYSTEM privileges by sending crafted IPC commands. This module bypasses CVE-2021-1366 by abusing a Time-of-check Time-of-use (TOCTOU) Race Condition in the priv_file_copy command.
This module uses an unauthenticated remote PHP file upload vulnerability via File Manager (wp-file-manager) plugin in WordPress to upload and execute a PHP agent file to gain arbitrary code execution on the affected system.
Pagination
- Previous page
- Page 19
- Next page