Entreprise d'experts en Sécurité Informatique : Audits et conseils en cybersécurité
Entreprise française de cybersécurité depuis 2004
☎ 03 60 47 09 81 - info@securiteinfo.com


CVE-2019-1405

Description

An elevation of privilege vulnerability exists when the Windows Universal Plug and Play (UPnP) service improperly allows COM object creation, aka 'Windows UPnP Service Elevation of Privilege Vulnerability'.

POC

Reference

- http://packetstormsecurity.com/files/155723/Microsoft-UPnP-Local-Privilege-Elevation.html

Github

- https://github.com/0xT11/CVE-POC

- https://github.com/65df4s/Erebusw

- https://github.com/ARPSyndicate/cvemon

- https://github.com/AabyssZG/AWD-Guide

- https://github.com/Al1ex/WindowsElevation

- https://github.com/BC-SECURITY/Moriarty

- https://github.com/CVEDB/PoC-List

- https://github.com/CVEDB/awesome-cve-repo

- https://github.com/CVEDB/top

- https://github.com/CnHack3r/Penetration_PoC

- https://github.com/Cruxer8Mech/Idk

- https://github.com/DeEpinGh0st/Erebus

- https://github.com/EchoGin404/-

- https://github.com/EchoGin404/gongkaishouji

- https://github.com/GhostTroops/TOP

- https://github.com/JERRY123S/all-poc

- https://github.com/Jalexander798/JA_Tools-0xsp-Mongoose

- https://github.com/Mr-xn/Penetration_Testing_POC

- https://github.com/Ostorlab/KEV

- https://github.com/Ostorlab/known_exploited_vulnerbilities_detectors

- https://github.com/SofianeHamlaoui/Conti-Clear

- https://github.com/Tyro-Shan/gongkaishouji

- https://github.com/YIXINSHUWU/Penetration_Testing_POC

- https://github.com/ZTK-009/Penetration_PoC

- https://github.com/ZTK-009/RedTeamer

- https://github.com/alphaSeclab/sec-daily-2019

- https://github.com/apt69/COMahawk

- https://github.com/cyberanand1337x/bug-bounty-2022

- https://github.com/deadjakk/patch-checker

- https://github.com/developer3000S/PoC-in-GitHub

- https://github.com/edsonjt81/dazzleUP

- https://github.com/fei9747/WindowsElevation

- https://github.com/fengjixuchui/RedTeamer

- https://github.com/hasee2018/Penetration_Testing_POC

- https://github.com/hectorgie/PoC-in-GitHub

- https://github.com/hktalent/TOP

- https://github.com/hlldz/dazzleUP

- https://github.com/huike007/penetration_poc

- https://github.com/huike007/poc

- https://github.com/huisetiankong478/penetration_poc

- https://github.com/huisetiankong478/poc

- https://github.com/hungslab/awd-tools

- https://github.com/jbmihoub/all-poc

- https://github.com/k0imet/CVE-POCs

- https://github.com/lawrenceamer/0xsp-Mongoose

- https://github.com/lions2012/Penetration_Testing_POC

- https://github.com/nomi-sec/PoC-in-GitHub

- https://github.com/orgTestCodacy11KRepos110MB/repo-2974-Erebus

- https://github.com/password520/Penetration_PoC

- https://github.com/password520/RedTeamer

- https://github.com/pengusec/awesome-netsec-articles

- https://github.com/pentration/gongkaishouji

- https://github.com/rnbochsr/Relevant

- https://github.com/shubham0d/SymBlock

- https://github.com/weeka10/-hktalent-TOP

- https://github.com/winterwolf32/CVE-S---Penetration_Testing_POC-

- https://github.com/xuetusummer/Penetration_Testing_POC

- https://github.com/ycdxsb/WindowsPrivilegeEscalation

- https://github.com/yedada-wei/-

- https://github.com/yedada-wei/gongkaishouji

- https://github.com/zux0x3a/0xsp-Mongoose