CVE-2021-36934 – Microsoft Windows SAM Local Privilege Escalation Vulnerability
https://notcve.org/view.php?id=CVE-2021-36934
<p>An elevation of privilege vulnerability exists because of overly permissive Access Control Lists (ACLs) on multiple system files, including the Security Accounts Manager (SAM) database. An attacker who successfully exploited this vulnerability could run arbitrary code with SYSTEM privileges. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights.</p> <p>An attacker must have the ability to execute code on a victim system to exploit this vulnerability.</p> <p>After installing this security update, you <em>must</em> manually delete all shadow copies of system files, including the SAM database, to fully mitigate this vulnerabilty. • https://github.com/Preventions/CVE-2021-36934 https://github.com/JoranSlingerland/CVE-2021-36934 https://github.com/n3tsurge/CVE-2021-36934 https://github.com/exploitblizzard/CVE-2021-36934 https://github.com/tda90/CVE-2021-36934 https://github.com/websecnl/CVE-2021-36934 https://github.com/bytesizedalex/CVE-2021-36934 https://github.com/irissentinel/CVE-2021-36934 https://github.com/0x0D1n/CVE-2021-36934 https://github.com/VertigoRay/CVE-2021-36934 https://github.com/Oliv •
CVE-2020-0787 – Microsoft Windows Background Intelligent Transfer Service (BITS) Improper Privilege Management Vulnerability
https://notcve.org/view.php?id=CVE-2020-0787
An elevation of privilege vulnerability exists when the Windows Background Intelligent Transfer Service (BITS) improperly handles symbolic links, aka 'Windows Background Intelligent Transfer Service Elevation of Privilege Vulnerability'. Existe una vulnerabilidad de elevación de privilegios cuando el Windows Background Intelligent Transfer Service (BITS) maneja inapropiadamente los enlaces simbólicos, también se conoce como "Windows Background Intelligent Transfer Service Elevation of Privilege Vulnerability". Microsoft Windows BITS is vulnerable to to a privilege elevation vulnerability if it improperly handles symbolic links. An actor can exploit this vulnerability to execute arbitrary code with system-level privileges. • https://github.com/cbwang505/CVE-2020-0787-EXP-ALL-WINDOWS-VERSION https://github.com/yanghaoi/CVE-2020-0787 http://packetstormsecurity.com/files/158056/Background-Intelligent-Transfer-Service-Privilege-Escalation.html https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-0787 https://itm4n.github.io/cve-2020-0787-windows-bits-eop https://github.com/itm4n/BitsArbitraryFileMove https://attackerkb.com/assessments/e61cfec0-d766-4e7e-89f7-5aad2460afb8 https://googleprojectzero.blogspot.com/2018 • CWE-59: Improper Link Resolution Before File Access ('Link Following') •