automatic module_metadata_base.json update
parent
c26d1c93e4
commit
af63663779
|
@ -113945,6 +113945,53 @@
|
|||
"notes": {
|
||||
}
|
||||
},
|
||||
"exploit_windows/local/ms18_8120_win32k_privesc": {
|
||||
"name": "Windows SetImeInfoEx Win32k NULL Pointer Dereference",
|
||||
"full_name": "exploit/windows/local/ms18_8120_win32k_privesc",
|
||||
"rank": 400,
|
||||
"disclosure_date": "2018-05-09",
|
||||
"type": "exploit",
|
||||
"author": [
|
||||
"unamer",
|
||||
"bigric3",
|
||||
"Anton Cherepanov",
|
||||
"Dhiraj Mishra <dhiraj@notsosecure.com>"
|
||||
],
|
||||
"description": "This module exploits elevation of privilege vulnerability that exists in Windows 7 and 2008 R2\n when the Win32k component fails to properly handle objects in memory. An attacker who\n successfully exploited this vulnerability could run arbitrary code in kernel mode. An\n attacker could then install programs; view, change, or delete data; or create new\n accounts with full user rights.\n\n This module is tested against windows 7 x86, windows 7 x64 and windows server 2008 R2 standard x64.",
|
||||
"references": [
|
||||
"BID-104034",
|
||||
"CVE-2018-8120",
|
||||
"URL-https://github.com/unamer/CVE-2018-8120",
|
||||
"URL-https://github.com/bigric3/cve-2018-8120",
|
||||
"URL-http://bigric3.blogspot.com/2018/05/cve-2018-8120-analysis-and-exploit.html",
|
||||
"URL-https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-8120"
|
||||
],
|
||||
"is_server": true,
|
||||
"is_client": false,
|
||||
"platform": "Windows",
|
||||
"arch": "",
|
||||
"rport": null,
|
||||
"autofilter_ports": [
|
||||
|
||||
],
|
||||
"autofilter_services": [
|
||||
|
||||
],
|
||||
"targets": [
|
||||
"Automatic",
|
||||
"Windows 7 x64",
|
||||
"Windows 7 x86"
|
||||
],
|
||||
"mod_time": "2018-10-18 14:30:20 +0000",
|
||||
"path": "/modules/exploits/windows/local/ms18_8120_win32k_privesc.rb",
|
||||
"is_install_path": true,
|
||||
"ref_name": "windows/local/ms18_8120_win32k_privesc",
|
||||
"check": false,
|
||||
"post_auth": false,
|
||||
"default_credential": false,
|
||||
"notes": {
|
||||
}
|
||||
},
|
||||
"exploit_windows/local/ms_ndproxy": {
|
||||
"name": "MS14-002 Microsoft Windows ndproxy.sys Local Privilege Escalation",
|
||||
"full_name": "exploit/windows/local/ms_ndproxy",
|
||||
|
|
Loading…
Reference in New Issue