Entreprise d'experts en Sécurité Informatique : Audits et conseils en cybersécurité
Entreprise française de cybersécurité depuis 2004
☎ 03 60 47 09 81 - info@securiteinfo.com


CVE-2019-1253

Description

An elevation of privilege vulnerability exists when the Windows AppX Deployment Server improperly handles junctions.To exploit this vulnerability, an attacker would first have to gain execution on the victim system, aka 'Windows Elevation of Privilege Vulnerability'. This CVE ID is unique from CVE-2019-1215, CVE-2019-1278, CVE-2019-1303.

POC

Reference

- http://packetstormsecurity.com/files/154488/AppXSvc-17763.1.amd64fre.rs5_release.180914-1434-Privilege-Escalation.html

Github

- https://github.com/0xT11/CVE-POC

- https://github.com/ARPSyndicate/cvemon

- https://github.com/Al1ex/WindowsElevation

- https://github.com/Ascotbe/Kernelhub

- https://github.com/BC-SECURITY/Moriarty

- https://github.com/CnHack3r/Penetration_PoC

- https://github.com/Cruxer8Mech/Idk

- https://github.com/EchoGin404/-

- https://github.com/EchoGin404/gongkaishouji

- https://github.com/Jalexander798/JA_Tools-0xsp-Mongoose

- https://github.com/Mr-xn/Penetration_Testing_POC

- https://github.com/Ostorlab/KEV

- https://github.com/Ostorlab/known_exploited_vulnerbilities_detectors

- https://github.com/S3cur3Th1sSh1t/My-starred-Repositories

- https://github.com/SexurityAnalyst/Watson

- https://github.com/SofianeHamlaoui/Conti-Clear

- https://github.com/TheJoyOfHacking/rasta-mouse-Watson

- https://github.com/Tyro-Shan/gongkaishouji

- https://github.com/YIXINSHUWU/Penetration_Testing_POC

- https://github.com/ZTK-009/Penetration_PoC

- https://github.com/deadjakk/patch-checker

- https://github.com/developer3000S/PoC-in-GitHub

- https://github.com/edsonjt81/Watson

- https://github.com/edsonjt81/dazzleUP

- https://github.com/fei9747/WindowsElevation

- https://github.com/hasee2018/Penetration_Testing_POC

- https://github.com/hectorgie/PoC-in-GitHub

- https://github.com/hlldz/dazzleUP

- https://github.com/huike007/penetration_poc

- https://github.com/huike007/poc

- https://github.com/huisetiankong478/penetration_poc

- https://github.com/huisetiankong478/poc

- https://github.com/index-login/watson

- https://github.com/k0imet/CVE-POCs

- https://github.com/lawrenceamer/0xsp-Mongoose

- https://github.com/likekabin/CVE-2019-1253

- https://github.com/likescam/CVE-2019-1253

- https://github.com/lions2012/Penetration_Testing_POC

- https://github.com/mikepitts25/watson

- https://github.com/mishmashclone/rasta-mouse-Watson

- https://github.com/netkid123/Watson

- https://github.com/nomi-sec/PoC-in-GitHub

- https://github.com/offsec-ttps/CVE2019-1253-Compiled

- https://github.com/padovah4ck/CVE-2019-1253

- https://github.com/paramint/Watson-Windows-check-KB

- https://github.com/password520/Penetration_PoC

- https://github.com/pentration/gongkaishouji

- https://github.com/pwninx/Watson

- https://github.com/rasta-mouse/Watson

- https://github.com/rnbochsr/Relevant

- https://github.com/rogue-kdc/CVE-2019-1253

- https://github.com/sgabe/CVE-2019-1253

- https://github.com/winterwolf32/CVE-S---Penetration_Testing_POC-

- https://github.com/xuetusummer/Penetration_Testing_POC

- https://github.com/ycdxsb/WindowsPrivilegeEscalation

- https://github.com/yedada-wei/-

- https://github.com/yedada-wei/gongkaishouji

- https://github.com/zux0x3a/0xsp-Mongoose