Skip to content

active-labs/Advisories

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

82 Commits
 
 
 
 
 
 
 
 
 
 

Repository files navigation

ACTIVELabs Security Advisories

https://www.activecyber.us/activelabs

ACTIVELabs believes that coordinated, responsible disclosure of security vulnerabilities is in the best interest of our clients and the public at large. ACTIVELabs regularly identifies security vulnerabilities in the course of our work, both during customer engagements and through our own independent security research. This stream contains the list of security advisories found by ACTIVELabs research team along with the proof-of-concept code if any.

Advisories

2019

[ACTIVE-2019-001] Fileless UAC Bypass in Windows Store Binary

[ACTIVE-2019-002] KioWare Server Privilege Escalation Vulnerability

[ACTIVE-2019-003] UAC Bypass in System Reset Binary via DLL Hijacking

[ACTIVE-2019-004] TeamSpeak 3 Client URI Handler Remote Command Execution

[ACTIVE-2019-005] SolarWinds Local Privilege Escalation

[ACTIVE-2019-006] Viber for Desktop URI Handler Remote Command Execution

[ACTIVE-2019-007] ManageEngine Local Privilege Escalation

[ACTIVE-2019-008] Pandora FMS Local Privilege Escalation

[ACTIVE-2019-009] join.me URI Handler Remote Command Execution

[ACTIVE-2019-010] Netwrix Auditor - Symbolic Link Privilege Escalation

[ACTIVE-2019-011] NVIDIA GeForce Experience Local Privilege Escalation

[ACTIVE-2019-012] Viper RGB Driver Local Privilege Escalation

2020

[ACTIVE-2020-001] CORSAIR iCUE Driver Local Privilege Escalation

[ACTIVE-2020-002] Docker Desktop Local Privilege Escalation

[ACTIVE-2020-003] Trident Z Lighting Control Driver Local Privilege Escalation

[ACTIVE-2020-004] IDrive Local Privilege Escalation

[ACTIVE-2020-005] Overwolf Symbolic Link Privilege Escalation

[ACTIVE-2020-006] Windows AppX Deployment Service Local Privilege Escalation

[ACTIVE-2020-007] NVIDIA GeForce Experience Arbitrary File Creation

[ACTIVE-2020-008] NVIDIA GeForce Experience Local Privilege Escalation

2021

[ACTIVE-2021-001] NoMachine for Windows Local Privilege Escalation

Proof of Concept

[ACTIVE-2019-001] Invoke-WSResetBypass.ps1 PoC

[ACTIVE-2019-003] FVEAPI.dll PoC

[ACTIVE-2019-004] Evil.dll & PoC.html PoC

[ACTIVE-2019-006] Evil.dll & PoC.html PoC

About

ACTIVELabs Security Advisories

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Contributors 2

  •  
  •