### [CVE-2015-4027](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4027) ![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen) ### Description The AcuWVSSchedulerv10 service in Acunetix Web Vulnerability Scanner (WVS) before 10 build 20151125 allows local users to gain privileges via a command parameter in the reporttemplate property in a params JSON object to api/addScan. ### POC #### Reference - http://packetstormsecurity.com/files/134602/Acunetix-WVS-10-Local-Privilege-Escalation.html - https://www.exploit-db.com/exploits/38847/ #### Github - https://github.com/1o24er/RedTeam - https://github.com/ARPSyndicate/cvemon - https://github.com/Al1ex/Red-Team - https://github.com/Apri1y/Red-Team-links - https://github.com/Echocipher/Resource-list - https://github.com/Ondrik8/RED-Team - https://github.com/dk47os3r/hongduiziliao - https://github.com/hasee2018/Safety-net-information - https://github.com/hudunkey/Red-Team-links - https://github.com/john-80/-007 - https://github.com/landscape2024/RedTeam - https://github.com/lp008/Hack-readme - https://github.com/nobiusmallyu/kehai - https://github.com/slimdaddy/RedTeam - https://github.com/svbjdbk123/- - https://github.com/twensoo/PersistentThreat - https://github.com/xiaoZ-hc/redtool - https://github.com/yut0u/RedTeam-BlackBox