cve/2020/CVE-2020-1362.md

69 lines
4.0 KiB
Markdown
Raw Normal View History

2024-05-25 21:48:12 +02:00
### [CVE-2020-1362](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1362)
![](https://img.shields.io/static/v1?label=Product&message=Windows%2010%20Version%201903%20for%2032-bit%20Systems&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=Windows%2010%20Version%201903%20for%20ARM64-based%20Systems&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=Windows%2010%20Version%201903%20for%20x64-based%20Systems&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=Windows%2010%20Version%201909%20for%2032-bit%20Systems&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=Windows%2010%20Version%201909%20for%20ARM64-based%20Systems&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=Windows%2010%20Version%201909%20for%20x64-based%20Systems&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=Windows%2010%20Version%202004%20for%2032-bit%20Systems&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=Windows%2010%20Version%202004%20for%20ARM64-based%20Systems&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=Windows%2010%20Version%202004%20for%20x64-based%20Systems&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=Windows%20Server%2C%20version%201903%20(Server%20Core%20installation)&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=Windows%20Server%2C%20version%201909%20(Server%20Core%20installation)&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=Windows%20Server%2C%20version%202004%20(Server%20Core%20installation)&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=Windows%20Server&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=Windows&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=Elevation%20of%20Privilege&color=brighgreen)
### Description
An elevation of privilege vulnerability exists in the way that the Windows WalletService handles objects in memory, aka 'Windows WalletService Elevation of Privilege Vulnerability'. This CVE ID is unique from CVE-2020-1344, CVE-2020-1369.
### POC
#### Reference
No PoCs from references.
#### Github
- https://github.com/0xT11/CVE-POC
- https://github.com/ARPSyndicate/cvemon
- https://github.com/Al1ex/WindowsElevation
- https://github.com/Ascotbe/Kernelhub
- https://github.com/CnHack3r/Penetration_PoC
2024-05-27 13:12:02 +00:00
- https://github.com/Cruxer8Mech/Idk
2024-05-25 21:48:12 +02:00
- https://github.com/EchoGin404/-
- https://github.com/EchoGin404/gongkaishouji
- https://github.com/JERRY123S/all-poc
- https://github.com/Mr-xn/Penetration_Testing_POC
- https://github.com/NetW0rK1le3r/awesome-hacking-lists
- https://github.com/Q4n/CVE-2020-1362
2024-06-07 04:52:01 +00:00
- https://github.com/Tyro-Shan/gongkaishouji
2024-06-08 09:32:58 +00:00
- https://github.com/XTeam-Wing/RedTeaming2020
2024-05-25 21:48:12 +02:00
- https://github.com/YIXINSHUWU/Penetration_Testing_POC
2024-05-27 13:12:02 +00:00
- https://github.com/ZTK-009/Penetration_PoC
2024-05-25 21:48:12 +02:00
- https://github.com/cyberanand1337x/bug-bounty-2022
- https://github.com/developer3000S/PoC-in-GitHub
- https://github.com/drg3nz0/gpt-analyzer
- https://github.com/fei9747/WindowsElevation
- https://github.com/hasee2018/Penetration_Testing_POC
- https://github.com/hectorgie/PoC-in-GitHub
- https://github.com/hktalent/TOP
- https://github.com/huike007/penetration_poc
- https://github.com/jbmihoub/all-poc
- https://github.com/lions2012/Penetration_Testing_POC
- https://github.com/morpheuslord/GPT_Vuln-analyzer
- https://github.com/nomi-sec/PoC-in-GitHub
- https://github.com/password520/Penetration_PoC
- https://github.com/readloud/Awesome-Stars
- https://github.com/soosmile/POC
- https://github.com/taielab/awesome-hacking-lists
- https://github.com/weeka10/-hktalent-TOP
- https://github.com/winterwolf32/CVE-S---Penetration_Testing_POC-
- https://github.com/xbl2022/awesome-hacking-lists
- https://github.com/xuetusummer/Penetration_Testing_POC
- https://github.com/ycdxsb/WindowsPrivilegeEscalation
- https://github.com/yedada-wei/-
- https://github.com/yedada-wei/gongkaishouji