# Exploit Title: Agnitum Outpost security suite privilege escalation - 0Day # Date: 2013-08-02 # Exploit Author: Ahmad Moghimi (http://mallocat.com , https://twitter.com/mall0cat) # Vendor Homepage: http://www.agnitum.com/ # Software Link: http://dl2.agnitum.com/OutpostSecuritySuiteProInstall.exe # Version: 8.1 Latest build # Tested on: windows # CVE : NO-CVE Reference: http://mallocat.com/a-journey-to-antivirus-escalation/ Demo: http://mallocat.com/wp-content/uploads/2013/08/win7.swf Exploit code: http://mallocat.com/wp-content/uploads/2013/08/escalate.7z https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/27282.7z Exploit-DB note: Open and read the reference supplied From low privileged account #1) Register Regsvr32.exe /s C:\Program Files\agnitum\Outpost Security Suite Pro\..\..\..\x.dll #2) Run exploit.exe