Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2019-1253 PoC — Microsoft Windows和Microsoft Windows Server 后置链接漏洞

Source
Associated Vulnerability
Title:Microsoft Windows和Microsoft Windows Server 后置链接漏洞 (CVE-2019-1253)
Description:Microsoft Windows和Microsoft Windows Server都是美国微软(Microsoft)公司的产品。Microsoft Windows是一套个人设备使用的操作系统。Microsoft Windows Server是一套服务器操作系统。 Microsoft Windows和Microsoft Windows Server中存在安全漏洞。攻击者可通过在用户系统上获取执行权并运行特制的应用程序利用该漏洞提升权限。以下产品及版本受到影响:Microsoft Windows 10版本1
File Snapshot

[4.0K] /data/pocs/b72aaea8cda908393e40ba28a412d4d7a3bb5988 ├── [ 525] exploit.ps1 ├── [4.0K] PrivilegedFileDelete │   ├── [ 189] App.config │   ├── [4.0K] bin │   │   ├── [4.0K] Debug │   │   │   ├── [8.0K] PrivilegedFileDelete.exe │   │   │   ├── [ 189] PrivilegedFileDelete.exe.config │   │   │   └── [ 18K] PrivilegedFileDelete.pdb │   │   └── [4.0K] Release │   │   ├── [8.0K] PrivilegedFileDelete.exe │   │   ├── [ 189] PrivilegedFileDelete.exe.config │   │   └── [ 18K] PrivilegedFileDelete.pdb │   ├── [4.0K] obj │   │   ├── [4.0K] Debug │   │   │   ├── [6.8K] DesignTimeResolveAssemblyReferencesInput.cache │   │   │   ├── [7.9K] PrivilegedFileDelete.csprojAssemblyReference.cache │   │   │   ├── [ 42] PrivilegedFileDelete.csproj.CoreCompileInputs.cache │   │   │   ├── [1.1K] PrivilegedFileDelete.csproj.FileListAbsolute.txt │   │   │   ├── [8.0K] PrivilegedFileDelete.exe │   │   │   └── [ 18K] PrivilegedFileDelete.pdb │   │   └── [4.0K] Release │   │   ├── [6.8K] DesignTimeResolveAssemblyReferencesInput.cache │   │   ├── [ 42] PrivilegedFileDelete.csproj.CoreCompileInputs.cache │   │   ├── [ 964] PrivilegedFileDelete.csproj.FileListAbsolute.txt │   │   ├── [8.0K] PrivilegedFileDelete.exe │   │   └── [ 18K] PrivilegedFileDelete.pdb │   ├── [2.3K] PrivilegedFileDelete.csproj │   ├── [5.7K] Program.cs │   └── [4.0K] Properties │   └── [1.4K] AssemblyInfo.cs └── [1.1K] PrivilegedFileDelete.sln 8 directories, 23 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.