mirror of
https://github.com/0xMarcio/cve.git
synced 2025-05-29 09:41:05 +00:00
36 lines
1.5 KiB
Markdown
36 lines
1.5 KiB
Markdown
![]() |
### [CVE-2015-4027](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4027)
|
||
|

|
||
|

|
||
|

|
||
|
|
||
|
### Description
|
||
|
|
||
|
The AcuWVSSchedulerv10 service in Acunetix Web Vulnerability Scanner (WVS) before 10 build 20151125 allows local users to gain privileges via a command parameter in the reporttemplate property in a params JSON object to api/addScan.
|
||
|
|
||
|
### POC
|
||
|
|
||
|
#### Reference
|
||
|
- http://packetstormsecurity.com/files/134602/Acunetix-WVS-10-Local-Privilege-Escalation.html
|
||
|
- https://www.exploit-db.com/exploits/38847/
|
||
|
|
||
|
#### Github
|
||
|
- https://github.com/1o24er/RedTeam
|
||
|
- https://github.com/ARPSyndicate/cvemon
|
||
|
- https://github.com/Al1ex/Red-Team
|
||
|
- https://github.com/Apri1y/Red-Team-links
|
||
|
- https://github.com/Echocipher/Resource-list
|
||
|
- https://github.com/Ondrik8/RED-Team
|
||
|
- https://github.com/dk47os3r/hongduiziliao
|
||
|
- https://github.com/hasee2018/Safety-net-information
|
||
|
- https://github.com/hudunkey/Red-Team-links
|
||
|
- https://github.com/john-80/-007
|
||
|
- https://github.com/landscape2024/RedTeam
|
||
|
- https://github.com/lp008/Hack-readme
|
||
|
- https://github.com/nobiusmallyu/kehai
|
||
|
- https://github.com/slimdaddy/RedTeam
|
||
|
- https://github.com/svbjdbk123/-
|
||
|
- https://github.com/twensoo/PersistentThreat
|
||
|
- https://github.com/xiaoZ-hc/redtool
|
||
|
- https://github.com/yut0u/RedTeam-BlackBox
|
||
|
|