Watson : Enumerate Missing KBs & Suggest Exploits For Useful Privilege Escalation Vulnerabilities

Watson is a .NET tool designed to enumerate missing KBs and suggest exploits for Privilege Escalation vulnerabilities.

Supported Versions

  • Windows 10 1507, 1511, 1607, 1703, 1709, 1803, 1809, 1903, 1909, 2004
  • Server 2016 & 2019

Usage

OS Build Number: 14393
>>Enumerating installed KBs…

CVE-2019-0836 : VULNERABLE
>>https://exploit-db.com/exploits/46718
>>https://decoder.cloud/2019/04/29/combinig-luafv-postluafvpostreadwrite-race-condition-pe-with-diaghub-collector-exploit-from-standard-user-to-system/

CVE-2019-0841 : VULNERABLE
>>https://github.com/rogue-kdc/CVE-2019-0841
>>https://rastamouse.me/tags/cve-2019-0841/

CVE-2019-1064 : VULNERABLE
>>https://www.rythmstick.net/posts/cve-2019-1064/

CVE-2019-1130 : VULNERABLE
>>https://github.com/S3cur3Th1sSh1t/SharpByeBear

CVE-2019-1253 : VULNERABLE
>>https://github.com/padovah4ck/CVE-2019-1253

CVE-2019-1315 : VULNERABLE
>>https://offsec.almond.consulting/windows-error-reporting-arbitrary-file-move-eop.html
Finished. Found 6 potential vulnerabilities.

Issues

  • I try to update Watson after every Patch Tuesday, but for potential false positives check the latest supersedence information in the Windows Update Catalog. If you still think there’s an error, raise an Issue with the Bug label.
  • If there’s a particular vulnerability that you want to see in Watson that’s not already included, raise an Issue with the Vulnerability Request label and include the CVE number.
  • If you know of a good exploit for any of the vulnerabilities in Watson, raise an Issue with the Exploit Suggestion label and provide a URL to the exploit.
R K

Recent Posts

Cyberattack or Smoke and Mirrors? The Truth Behind the Alleged Dimona Nuclear Breach

In a recent cyber incident, a group named CARDINAL, associated with the label Russian Legion,…

9 hours ago

Admin Panel Dorks : A Complete List of Google Dorks

Introduction Google Dorking is a technique where advanced search operators are used to uncover information…

4 days ago

Best Linux Distros in 2026

Linux is renowned for its versatility, open-source nature, and security. Whether you're a beginner, developer,…

4 days ago

Top 10 Cyber Insurance Companies in 2026

Cyber insurance helps businesses and individuals mitigate financial losses from data breaches, ransomware, extortion, legal…

4 days ago

Ransomware Incident Response

Ransomware is one of the most dangerous and destructive forms of cybercrime today. With cybercriminals…

5 days ago

Best Social Media Search Engines and Tools for 2026

Social media is a key part of our daily lives, with millions of users sharing…

5 days ago