Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability.
Attack Vector (AV) | Network | Adjacent | Local | Physical |
---|---|---|---|---|
Attack Complexity (AC) | LOW | High | ||
Privileges Required (PR) | None | Low | High | |
User Interaction (UI) | None | Required | ||
Scope (S) | Unchange | Change | ||
Confidentiality (C) | None | Low | High | |
Integrity (I) | None | Low | High | |
Availability (A) | None | Low | High |
CVE Infomation | Exploits or more Infomation |
---|---|
mitre | EXPLOIT DATABASE |
NVD | 0day.today |
vulmon.com | github |
CVE Details | |
JVN ENG JPN | |
Reconshell |
Software Tag: Apache(1 tweets) Windows(34 tweets)
List of frequently cited URLs
URL | Num of Times Referred to |
---|---|
https://cvetrends.com | 50 |
https://github.com/xforcered/Windows_LPE_AFD_CVE-2023-21768 | 9 |
https://twitter.com/chompie1337/status/1633498392125997056 | 7 |
List of frequently cited URLs
URL | Num of Times Referred to |
---|---|
cvetrends.com | 50 |
github.com | 9 |
twitter.com | 7 |
Name | URL |
---|---|
chompie1337/Windows_LPE_AFD_CVE-2023-21768 | https://github.com/chompie1337/Windows_LPE_AFD_CVE-2023-21768 |
cl4ym0re/cve-2023-21768-compiled | https://github.com/cl4ym0re/cve-2023-21768-compiled |
Name | URL |
---|---|
chompie1337/Windows_LPE_AFD_CVE-2023-21768 | github.com |
cl4ym0re/cve-2023-21768-compiled | github.com |