what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 76 - 100 of 129 RSS Feed

Files from James Forshaw

Email addressforshaw at google.com
First Active2011-08-11
Last Active2023-09-06
Microsoft Windows DSSVC DSOpenSharedFile Arbitrary File Open Privilege Escalation
Posted Jan 15, 2019
Authored by James Forshaw, Google Security Research

Microsoft Windows suffers from a DSSVC DSOpenSharedFile arbitrary file open privilege escalation vulnerability.

tags | exploit, arbitrary
systems | windows
advisories | CVE-2019-0572
SHA-256 | c5eccc0de65840657f3b064e8a499aec555038d027732cbd80257ce57a555d65
Microsoft Windows SSPI Network Authentication Session 0 Privilege Escalation
Posted Jan 15, 2019
Authored by James Forshaw, Google Security Research

Microsoft Windows suffers from an SSPI network authentication session 0 privilege escalation vulnerability.

tags | exploit
systems | windows
advisories | CVE-2019-0543
SHA-256 | d2023662dbf632128ec23c46add0fefaf4689155e6f37d5e051c9bbfa54f5809
Microsoft Windows DSSVC CheckFilePermission Arbitrary File Deletion
Posted Jan 8, 2019
Authored by James Forshaw, Google Security Research

Microsoft Windows suffers from a privilege escalation vulnerability. The Data Sharing Service does not has a TOCTOU in PolicyChecker::CheckFilePermission resulting in an arbitrary file deletion.

tags | exploit, arbitrary
systems | windows
advisories | CVE-2018-8584
SHA-256 | f54dc03a0548a0bf309514e8238a7332722ced26331dd750eae0f876a0ed3877
McAfee True Key 5.1.173.1 Privilege Escalation
Posted Dec 11, 2018
Authored by James Forshaw, Google Security Research

McAfee True Key version 5.1.173.1 on Windows 10 1809 has multiple issues in the implementation of the McAfee.TrueKey.Service which can result in privilege escalation through executing arbitrary processes or deleting files and directories.

tags | exploit, arbitrary
systems | windows
advisories | CVE-2018-6755, CVE-2018-6756, CVE-2018-6757
SHA-256 | 151bdbc1027a4dd096823f04bd5ea0feb97a274be2ebc6612084d92dc662776e
Microsoft Windows Unnamed Kernel Object Privilege Escalation
Posted Nov 20, 2018
Authored by James Forshaw, Google Security Research

Microsoft Windows 10 1803 and 1809 have an issue with unnamed kernel object creation. It's possible to default the security descriptor owner or mandatory label to the value from an Identification level impersonation token leading to elevation of privilege.

tags | exploit, kernel
systems | windows
SHA-256 | fb9584f4d9fbcd0538fdc2a5adb39ca01034b95d7ea2db9584cbde35e0f112ae
Microsoft Windows DfMarshal Unsafe Unmarshaling Privilege Escalation
Posted Nov 20, 2018
Authored by James Forshaw, Google Security Research

Microsoft Windows 10 1803 suffers from a DfMarshal unsafe unmarshaling elevation of privilege vulnerability.

tags | exploit
systems | windows
advisories | CVE-2018-8550
SHA-256 | f3d8b80ceebd239ef1a439cec5530651178de5ea0d7a4a0abe71c74e48185b64
Microsoft Windows FSCTL_FIND_FILES_BY_SID Information Disclosure
Posted Oct 16, 2018
Authored by James Forshaw, Google Security Research

On Microsoft Windows, the FSCTL_FIND_FILES_BY_SID control code does not check for permissions to list a directory leading to disclosure of file names when a user is not granted FILE_LIST_DIRECTORY access.

tags | exploit
systems | windows
advisories | CVE-2018-8411
SHA-256 | be5f41f514a5827a0f821f666b99bf1814733a5f65b5368d166452c4a0dca392
Microsoft Windows NtEnumerateKey Privilege Escalation
Posted Sep 19, 2018
Authored by James Forshaw, Google Security Research

Microsoft Windows suffers from a double dereference in NtEnumerateKey that leads to elevation of privilege.

tags | exploit
systems | windows
advisories | CVE-2018-8410
SHA-256 | db58dd019b911586330159149eda8b2dc64f11da97ac17f50b0f84104e699ecc
Microsoft Windows CiSetFileCache TOCTOU Security Feature Bypass
Posted Sep 19, 2018
Authored by James Forshaw, Google Security Research

Microsoft Windows suffers from a CiSetFileCache TOCTOU CVE-2017-11830 variant WDAC security feature bypass vulnerability.

tags | exploit, bypass
systems | windows
advisories | CVE-2017-11830, CVE-2018-8449
SHA-256 | eb52dc13fee602e4f4367c0eb42d933defb5c0336c73d90ce5236346a9ec00ba
Microsoft Windows Desktop Bridge Virtual Registry Incomplete Fix
Posted Jun 20, 2018
Authored by James Forshaw, Google Security Research

The handling of the virtual registry for desktop bridge applications can allow an application to create arbitrary files as system resulting in privilege escalation. This is because the fix for CVE-2018-0880 (MSRC case 42755) did not cover all similar cases which were reported at the same time in the issue.

tags | exploit, arbitrary, registry
SHA-256 | 7b7af078798b5964467bf7757383127c12dad481c4522e1f5ea6e8b1a37d710a
Microsoft Windows Desktop Bridge Activation Arbitrary Directory Creation
Posted Jun 19, 2018
Authored by James Forshaw, Google Security Research

The activator for Desktop Bridge applications calls CreateAppContainerToken while running as a privileged account leading to creation of arbitrary object directories leading to privilege escalation.

tags | exploit, arbitrary
advisories | CVE-2018-8208
SHA-256 | d0530f0109ea354da30e58c9f1b6f66e77d9f78611b21d45ab804256c40bfa35
Microsoft Windows 10 1709 Child Process Restriction Mitigation Bypass
Posted Jun 13, 2018
Authored by James Forshaw, Google Security Research

Microsoft Windows 10 version 1709 suffers from a child process restriction mitigation bypass vulnerability.

tags | exploit, bypass
systems | windows
advisories | CVE-2018-0982
SHA-256 | ba83b5baaedbe359d5e750eb4142eb1c4477928a4f8204e5566cbee1779eb0c2
Microsoft Windows Token Process Trust SID Access Check Bypass Privilege Escalation
Posted May 15, 2018
Authored by James Forshaw, Google Security Research

Microsoft Windows suffers from a token process trust SID access check bypass elevation of privilege vulnerability.

tags | exploit
systems | windows
advisories | CVE-2018-8134
SHA-256 | 2033addbbe5ebd84569983aa729d944003476f409e9a96a8424ceefbfbc9b13f
Microsoft Windows WLDP CLSID Policy .NET COM Instantiation UMCI Bypass
Posted Apr 19, 2018
Authored by James Forshaw, Google Security Research

The enlightened Windows Lockdown Policy check for COM Class instantiation can be bypassed by using a bug in .NET leading to arbitrary code execution on a system with UMCI enabled (e.g. Device Guard).

tags | exploit, arbitrary, code execution
systems | windows
SHA-256 | 6472ee6172948afddeda0672cf9b60975d9a244ee152920a06d2b4c956e58bbf
Microsoft Windows CiSetFileCache TOCTOU Incomplete Fix
Posted Apr 17, 2018
Authored by James Forshaw, Google Security Research

The fix for CVE-2017-11830 is insufficient to prevent a normal user application adding a cached signing level to an unsigned file by exploiting a TOCTOU in CI leading to circumventing Device Guard policies.

tags | exploit
advisories | CVE-2017-11830, CVE-2018-0966
SHA-256 | 8bf899b59331805e3565783c1df52349bae6d10f5374cb34ff520b4495773303
Microsoft Windows Desktop Bridge Privilege Escalation
Posted Mar 21, 2018
Authored by James Forshaw, Google Security Research

Microsoft Windows suffers from a Desktop Bridge Virtual Registry NtLoadKey arbitrary file read / write privilege escalation vulnerability.

tags | exploit, arbitrary, registry
systems | windows
advisories | CVE-2018-0882
SHA-256 | 8f2f9e0389c7548dbde759deeba68e5cd3a12fc66f9fb82eef907f69b1ca9eb7
Microsoft Windows Desktop Bridge Privilege Escalation
Posted Mar 21, 2018
Authored by James Forshaw, Google Security Research

Microsoft Windows suffers from a Desktop Bridge Virtual Registry arbitrary file read / write privilege escalation vulnerability.

tags | exploit, arbitrary, registry
systems | windows
advisories | CVE-2018-0880
SHA-256 | e524422547b177b8b51dff37c1fe898479cd8d33e5a29bcaa8940ba138b96b32
Microsoft Windows Desktop Bridge VFS Privilege Escalation
Posted Mar 21, 2018
Authored by James Forshaw, Google Security Research

The handling of the VFS for desktop bridge applications can allow an application to create virtual files in system folder which can result in elevation of privilege.

tags | exploit
advisories | CVE-2018-0877
SHA-256 | a19e1b19f8aafc317248316e6dedc0294e0aa633edb99ce6a44a6cd7d11f45c5
Windows Constrained Impersonation Capability Privilege Escalation
Posted Feb 22, 2018
Authored by James Forshaw, Google Security Research

Windows suffers from a Constrained Impersonation Capability privilege escalation vulnerability.

tags | exploit
systems | windows
advisories | CVE-2018-0821
SHA-256 | ed784628f28f7517017e042c1ef0ae076e0055b7540f2b38df01d9eb8b3f0cf9
Windows StorSvc SvcMoveFileInheritSecurity Arbitrary File Security Descriptor Overwrite
Posted Feb 22, 2018
Authored by James Forshaw, Google Security Research

Windows StorSvc SvcMoveFileInheritSecurity suffers from an arbitrary file security descriptor overwrite vulnerability that allows for privilege escalation.

tags | exploit, arbitrary
systems | windows
SHA-256 | 76ff500de37c611d2bfcf33767cff37b09da85a8307edfdee626783a4fb7a6df
Windows NPFS Symlink Security Feature Bypass / Privilege Escalation
Posted Feb 20, 2018
Authored by James Forshaw, Google Security Research

Windows suffers from NPFS Symlink security feature bypass and privilege escalation vulnerabilities.

tags | exploit, vulnerability
systems | windows
advisories | CVE-2018-0823
SHA-256 | 241a41e7b4c34606c5b8c38997e3a9919b21068375867365bd1daf381cc4f5dc
Windows Global Reparse Point Security Feature Bypass / Privilege Escalation
Posted Feb 20, 2018
Authored by James Forshaw, Google Security Research

Windows suffer from Global Reparse Point security feature bypass and privilege escalation vulnerabilities.

tags | exploit, vulnerability
systems | windows
advisories | CVE-2018-0822
SHA-256 | 817479ced9c55750d45cb5a0bd0abe3a085b6eb1f5c6e5bafd694e7961cbeb11
Windows StorSvc SvcMoveFileInheritSecurity Arbitrary File Creation
Posted Feb 20, 2018
Authored by James Forshaw, Google Security Research

StorSvc SvcMoveFileInheritSecurity suffers from an arbitrary file creation vulnerability that allows for privilege escalation.

tags | exploit, arbitrary
advisories | CVE-2018-0826
SHA-256 | da3cf612ba7cedad78f1b652e836abe760eadee6b6d179778393eb87b95624a5
Microsoft Windows SMB Server Mount Point Privilege Escalation
Posted Jan 11, 2018
Authored by James Forshaw, Google Security Research

On Microsoft Windows, the SMB server drivers (srv.sys and srv2.sys) do not check the destination of a NTFS mount point when manually handling a reparse operation leading to being able to locally open an arbitrary device via an SMB client which can result in privilege escalation.

tags | exploit, arbitrary
systems | windows
advisories | CVE-2018-0749
SHA-256 | 18c5e8b69488f509de251342dd3e47d18e57b85a83a80396d794f1f67e9b08c0
Microsoft Windows NtImpersonateAnonymousToken LPAC To Non-LPAC Privilege Escalation
Posted Jan 11, 2018
Authored by James Forshaw, Google Security Research

On Microsoft Windows, when impersonating the anonymous token in an LPAC the WIN://NOAPPALLPKG security attribute is ignored leading to impersonating a non-LPAC token leading to privilege escalation.

tags | exploit
systems | windows
advisories | CVE-2018-0752
SHA-256 | ea9947419e769dd9e18edeb304390de5704daee25ebd8b4d342bdc9bfc87ebea
Page 4 of 6
Back23456Next

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    8 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    11 Files
  • 23
    Apr 23rd
    68 Files
  • 24
    Apr 24th
    23 Files
  • 25
    Apr 25th
    16 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close