mirror of
https://github.com/0xMarcio/cve.git
synced 2025-05-29 01:31:01 +00:00
58 lines
4.9 KiB
Markdown
58 lines
4.9 KiB
Markdown
### [CVE-2020-16939](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16939)
|
|

|
|

|
|

|
|

|
|

|
|

|
|

|
|

|
|

|
|

|
|

|
|

|
|

|
|

|
|

|
|
&color=blue)
|
|

|
|
&color=blue)
|
|

|
|
&color=blue)
|
|
&color=blue)
|
|

|
|

|
|
&color=blue)
|
|

|
|
&color=blue)
|
|

|
|

|
|
&color=blue)
|
|
&color=blue)
|
|

|
|

|
|

|
|

|
|

|
|

|
|
|
|
### Description
|
|
|
|
<p>An elevation of privilege vulnerability exists when Group Policy improperly checks access. An attacker who successfully exploited this vulnerability could run processes in an elevated context.</p><p>To exploit the vulnerability, an attacker would first have to log on to the system, and then run a specially crafted application to take control over the affected system.</p><p>The security update addresses the vulnerability by correcting how Group Policy checks access.</p>
|
|
|
|
### POC
|
|
|
|
#### Reference
|
|
No PoCs from references.
|
|
|
|
#### Github
|
|
- https://github.com/ARPSyndicate/cvemon
|
|
- https://github.com/XTeam-Wing/RedTeaming2020
|
|
- https://github.com/alphaSeclab/sec-daily-2020
|
|
- https://github.com/developer3000S/PoC-in-GitHub
|
|
- https://github.com/hectorgie/PoC-in-GitHub
|
|
- https://github.com/nomi-sec/PoC-in-GitHub
|
|
- https://github.com/rogue-kdc/CVE-2020-16939
|
|
- https://github.com/soosmile/POC
|
|
|