alpc_taskscheduler.md | 3.9 KB | |
anyconnect_lpe.md | 10.2 KB | |
appxsvc_hard_link_privesc.md | 2.8 KB | |
bits_ntlm_token_impersonation.md | 18.6 KB | |
bypassuac_comhijack.md | 4.7 KB | |
bypassuac_dotnet_profiler.md | 6.3 KB | |
bypassuac_fodhelper.md | 3.4 KB | |
bypassuac_injection_winsxs.md | 13.4 KB | |
bypassuac_sdclt.md | 3.2 KB | |
bypassuac_silentcleanup.md | 3.3 KB | |
bypassuac_sluihijack.md | 4.7 KB | |
bypassuac_windows_store_reg.md | 2.6 KB | |
canon_driver_privesc.md | 11.5 KB | |
comahawk.md | 4.6 KB | |
cve_2017_8464_lnk_lpe.md | 5.7 KB | |
cve_2018_8453_win32k_priv_esc.md | 2.1 KB | |
cve_2019_1458_wizardopium.md | 5.1 KB | |
cve_2020_0668_service_tracing.md | 10.9 KB | |
cve_2020_0787_bits_arbitrary_file_move.md | 15 KB | |
cve_2020_0796_smbghost.md | 3.5 KB | |
cve_2020_1048_printerdemon.md | 7.1 KB | |
cve_2020_1054_drawiconex_lpe.md | 2.5 KB | |
cve_2020_1313_system_orchestrator.md | 7.9 KB | |
cve_2020_1337_printerdemon.md | 39.4 KB | |
cve_2020_17136.md | 7.9 KB | |
cve_2021_21551_dbutil_memmove.md | 2.2 KB | |
cve_2021_40449.md | 6.1 KB | |
cve_2022_21882_win32k.md | 3.7 KB | |
cve_2022_21999_spoolfool_privesc.md | 8 KB | |
cve_2022_26904_superprofile.md | 11.5 KB | |
cve_2022_3699_lenovo_diagnostics_driver.md | 8.5 KB | |
cve_2023_21768_afd_lpe.md | 1.9 KB | |
cve_2023_28252_clfs_driver.md | 5.9 KB | |
cve_2024_30088_authz_basep.md | 2.5 KB | |
dnsadmin_serverlevelplugindll.md | 16.6 KB | |
docker_credential_wincred.md | 2.7 KB | |
druva_insync_insynccphwnet64_rcp_type_5_priv_esc.md | 2.2 KB | |
gog_galaxyclientservice_privesc.md | 3 KB | |
lexmark_driver_privesc.md | 11.3 KB | |
microfocus_operations_privesc.md | 2.5 KB | |
mov_ss.md | 4.8 KB | |
ms10_092_schelevator.md | 2.2 KB | |
ms16_014_wmi_recv_notif.md | 1.2 KB | |
ms16_016_webdav.md | 1.5 KB | |
ms16_075_reflection.md | 2.8 KB | |
ms16_075_reflection_juicy.md | 2.1 KB | |
ms16_reflection.md | 2.8 KB | |
ms18_8120_win32k_privesc.md | 2.2 KB | |
nscp_pe.md | 2.8 KB | |
ntusermndragover.md | 4.2 KB | |