exploit-db-mirror/exploits/windows/local/29125.txt
Offensive Security 36c084c351 DB: 2021-09-03
45419 changes to exploits/shellcodes

2 new exploits/shellcodes

Too many to list!
2021-09-03 13:39:06 +00:00

17 lines
No EOL
748 B
Text

# Exploit Title: Avira internet security avipbb.sys filter bypass and
privilege escalation - 0Day
# Date: 2013-10-17
# Exploit Author: Ahmad Moghimi (http://mallocat.com
<http://mallocat.com/>, https://twitter.com/mall0cat)
# Vendor Homepage: http://www.avira.com/
# Software Link:
http://premium.avira-update.com/package/webloader/win32/iss/avira_internet_security_suite.exe
# Version: Latest
# Tested on: Windows XPSP3
# CVE : NO-CVE
Reference : http://mallocat.com/another-journey-to-antivirus-escalation/
Demo: http://mallocat.com/wp-content/uploads/2013/10/avira0.swf
Exploit code:
http://mallocat.com/wp-content/uploads/2013/10/AviraAvipbbExploit.7z
https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/29125.7z