https://www.activecyber.us/activelabs
ACTIVELabs believes that coordinated, responsible disclosure of security vulnerabilities is in the best interest of our clients and the public at large. ACTIVELabs regularly identifies security vulnerabilities in the course of our work, both during customer engagements and through our own independent security research. This stream contains the list of security advisories found by ACTIVELabs research team along with the proof-of-concept code if any.
[ACTIVE-2019-001] Fileless UAC Bypass in Windows Store Binary
[ACTIVE-2019-002] KioWare Server Privilege Escalation Vulnerability
[ACTIVE-2019-003] UAC Bypass in System Reset Binary via DLL Hijacking
[ACTIVE-2019-004] TeamSpeak 3 Client URI Handler Remote Command Execution
[ACTIVE-2019-005] SolarWinds Local Privilege Escalation
[ACTIVE-2019-006] Viber for Desktop URI Handler Remote Command Execution
[ACTIVE-2019-007] ManageEngine Local Privilege Escalation
[ACTIVE-2019-008] Pandora FMS Local Privilege Escalation
[ACTIVE-2019-009] join.me URI Handler Remote Command Execution
[ACTIVE-2019-010] Netwrix Auditor - Symbolic Link Privilege Escalation
[ACTIVE-2019-011] NVIDIA GeForce Experience Local Privilege Escalation
[ACTIVE-2019-012] Viper RGB Driver Local Privilege Escalation
[ACTIVE-2020-001] CORSAIR iCUE Driver Local Privilege Escalation
[ACTIVE-2020-002] Docker Desktop Local Privilege Escalation
[ACTIVE-2020-003] Trident Z Lighting Control Driver Local Privilege Escalation
[ACTIVE-2020-004] IDrive Local Privilege Escalation
[ACTIVE-2020-005] Overwolf Symbolic Link Privilege Escalation
[ACTIVE-2020-006] Windows AppX Deployment Service Local Privilege Escalation
[ACTIVE-2020-007] NVIDIA GeForce Experience Arbitrary File Creation
[ACTIVE-2020-008] NVIDIA GeForce Experience Local Privilege Escalation
[ACTIVE-2021-001] NoMachine for Windows Local Privilege Escalation
[ACTIVE-2019-001] Invoke-WSResetBypass.ps1 PoC
[ACTIVE-2019-003] FVEAPI.dll PoC