Windows Privilege Escalation
A collection of Windows Privilege Escalation vulnerabilities (Analyse / PoC / Exp )
Based on:
- 2024
- 2023
- CVE-2023-38146
- CVE-2023-36900
- CVE-2023-36884
- CVE-2023-36874
- CVE-2023-36802
- CVE-2023-36723
- CVE-2023-36427
- CVE-2023-36424
- CVE-2023-36407
- CVE-2023-36025
- CVE-2023-29360
- CVE-2023-29336
- CVE-2023-28252
- CVE-2023-28244
- CVE-2023-28229
- CVE-2023-28218
- CVE-2023-24871
- CVE-2023-23388
- CVE-2023-21822
- CVE-2023-21817
- CVE-2023-21768
- CVE-2023-21766
- CVE-2023-21752
- CVE-2023-21746
- CVE-2023-21674
- CVE-2023-21554
- CVE-2023-21823
- 2022
- 2021
- 2020
- CVE-2020-17087
- CVE-2020-17057
- CVE-2020-16898
- CVE-2020-1362
- CVE-2020-1350
- CVE-2020-1337
- CVE-2020-1313
- CVE-2020-1301
- CVE-2020-1066
- CVE-2020-1054
- CVE-2020-1048
- CVE-2020-1034
- CVE-2020-1015
- CVE-2020-0883
- CVE-2020-0814
- CVE-2020-0796
- CVE-2020-0787
- CVE-2020-0754
- CVE-2020-0753
- CVE-2020-0683
- CVE-2020-0668
- CVE-2020-0624
- CVE-2020-0610
- CVE-2020-0609
- 2019
- 2018
- 2017
- 2016
- 2015
- 2014
- 2013
- 2012
- 2011
- 2010
- 2009
- 2008
- 2007
- 2006
- 2005
- 2003
- 2000
2024
CVE-2024-38100
Windows File Explorer Elevation of Privilege Vulnerability
- Exp
CVE-2024-38080
Windows Hyper-V Elevation of Privilege Vulnerability
CVE-2024-38054
Kernel Streaming WOW Thunk Service Driver Elevation of Privilege Vulnerability
- Analyse
- https://devco.re/blog/2024/08/23/streaming-vulnerabilities-from-windows-kernel-proxying-to-kernel-part1/
- https://devco.re/blog/2024/10/05/streaming-vulnerabilities-from-windows-kernel-proxying-to-kernel-part2/
- Exp
CVE-2024-35250
Windows Kernel-Mode Driver Elevation of Privilege Vulnerability
CVE-2024-30090
Microsoft Streaming Service Elevation of Privilege Vulnerability
- Analyse
- https://devco.re/blog/2024/08/23/streaming-vulnerabilities-from-windows-kernel-proxying-to-kernel-part1-en/
- https://devco.re/blog/2024/10/05/streaming-vulnerabilities-from-windows-kernel-proxying-to-kernel-part2-en/
- Exp
CVE-2024-30088
Windows Kernel Elevation of Privilege Vulnerability
- Exp
- https://github.com/exploits-forsale/collateral-damage :
- https://github.com/tykawaii98/CVE-2024-30088 :
- https://github.com/Zombie-Kaiser/CVE-2024-30088-Windows-poc :
- https://github.com/NextGenPentesters/CVE-2024-30088- :
- https://github.com/Admin9961/CVE-2024-30088 :
- https://github.com/Justintroup85/exploits-forsale-collateral-damage :
CVE-2024-30078
Windows Wi-Fi Driver Remote Code Execution Vulnerability
- PoC
CVE-2024-30051
Windows DWM Core Library Elevation of Privilege Vulnerability
- Analyse
- https://ti.qianxin.com/blog/articles/public-secret-research-on-the-cve-2024-30051-privilege-escalation-vulnerability-in-the-wild-en/
- https://github.com/fortra/CVE-2024-30051
- Exp
CVE-2024-29050
Windows Cryptographic Services Remote Code Execution Vulnerability
CVE-2024-26230
Windows Telephony Server Elevation of Privilege Vulnerability
- Analyse
- https://whereisk0shl.top/post/a-trick-the-story-of-cve-2024-26230
- Exp
CVE-2024-26229
Windows CSC Service Elevation of Privilege Vulnerability
- Exp
CVE-2024-26218
Windows Kernel Elevation of Privilege Vulnerability
CVE-2024-26160
Windows Cloud Files Mini Filter Driver Information Disclosure Vulnerability
CVE-2024-21447
Windows Authentication Elevation of Privilege Vulnerability
CVE-2024-21345
Windows Kernel Elevation of Privilege Vulnerability
CVE-2024-21338
Windows Kernel Elevation of Privilege Vulnerability
Analyse
- https://www.crowdfense.com/windows-applocker-driver-lpe-vulnerability-cve-2024-21338/
- https://hakaisecurity.io/cve-2024-21338-from-admin-to-kernel-through-token-manipulation-and-windows-kernel-exploitation/research-blog/
- Exp
CVE-2024-21320
Windows Themes Spoofing Vulnerability
- Analyse
- https://www.rbtsec.com/blog/cve-2024-21320-windows-themes-spoofing-vulnerability-walkthrough/
- https://www.akamai.com/blog/security-research/leaking-ntlm-credentials-through-windows-themes
- PoC
CVE-2024-20698
Windows Kernel Elevation of Privilege Vulnerability
CVE-2024-6768
A Denial of Service in CLFS.sys in Microsoft Windows 10, Windows 11, Windows Server 2016, Windows Server 2019, and Windows Server 2022 allows a malicious authenticated low-privilege user to cause a Blue Screen of Death via a forced call to the KeBugCheckEx function.
- Analyse
- https://github.com/fortra/CVE-2024-6768/
- PoC
2023
CVE-2023-38146
Windows Themes Remote Code Execution Vulnerability
- Exp
CVE-2023-36900
Windows Common Log File System Driver Elevation of Privilege Vulnerability
- Analyse
- https://github.com/RomanRybachek/CVE-2023-36900/blob/main/writeup/eng/writeup_eng.md
- PoC
CVE-2023-36884
Windows Search Remote Code Execution Vulnerability
- Analyse
- https://www.trellix.com/blogs/research/breaking-down-cve-2023-36884-and-the-infection-chain/
- Exp
CVE-2023-36874
Windows Error Reporting Service Elevation of Privilege Vulnerability
- Analyse
- https://www.crowdstrike.com/en-us/blog/falcon-complete-zero-day-exploit-cve-2023-36874/
- Exp
- PoC
CVE-2023-36802
Microsoft Streaming Service Proxy Elevation of Privilege Vulnerability
- Analyse
- https://securityintelligence.com/x-force/critically-close-to-zero-day-exploiting-microsoft-kernel-streaming-service/
- https://googleprojectzero.github.io/0days-in-the-wild/0day-RCAs/2023/CVE-2023-36802.html
- https://dev.to/tutorialboy/analysis-of-microsoft-streaming-agent-privilege-elevation-vulnerability-cve-2023-36802-757
- Exp
CVE-2023-36723
Windows Container Manager Service Elevation of Privilege Vulnerability
CVE-2023-36427
Windows Hyper-V Elevation of Privilege Vulnerability
- Analyse
- https://github.com/tandasat/CVE-2023-36427/blob/main/report.md
- PoC
CVE-2023-36424
Windows Common Log File System Driver Elevation of Privilege Vulnerability
CVE-2023-36407
Windows Hyper-V Elevation of Privilege Vulnerability
CVE-2023-36025
Windows SmartScreen Security Feature Bypass Vulnerability
- Analyse
- https://www.trendmicro.com/en_hk/research/24/a/cve-2023-36025-exploited-for-defense-evasion-in-phemedrone-steal.html
- Exp
- PoC
CVE-2023-29360
Microsoft Streaming Service Elevation of Privilege Vulnerability
- Analyse
- https://seg-fault.gitbook.io/researchs/windows-security-research/exploit-development/mskssrv.sys-cve-2023-29360
- https://big5-sec.github.io/posts/CVE-2023-29360-analysis/
- Exp
CVE-2023-29336
Win32k Elevation of Privilege Vulnerability
- Analyse
- https://www.numencyber.com/cve-2023-29336-win32k-analysis/
- Exp
CVE-2023-28252
Windows Common Log File System Driver Elevation of Privilege Vulnerability
- Analyse
- https://www.coresecurity.com/core-labs/articles/analysis-cve-2023-28252-clfs-vulnerability
- https://github.com/fortra/CVE-2023-28252
- https://ti.qianxin.com/blog/articles/CVE-2023-28252-Analysis-of-In-the-Wild-Exploit-Sample-of-CLFS-Privilege-Escalation-Vulnerability/
- Exp
CVE-2023-28244
Windows Kerberos Elevation of Privilege Vulnerability
CVE-2023-28229
Windows CNG Key Isolation Service Elevation of Privilege Vulnerability
- Analyse
- https://whereisk0shl.top/post/isolate-me-from-sandbox-explore-elevation-of-privilege-of-cng-key-isolation
- Exp
CVE-2023-28218
Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability
- Analyse
- https://blog.theori.io/exploiting-windows-kernel-wild-copy-with-user-fault-handling-cve-2023-28218-89f5189d0926
- PoC
CVE-2023-24871
Windows Bluetooth Service Remote Code Execution Vulnerability
- Analyse
- https://ynwarcs.github.io/w-cve-2023-24871-lpe
- https://ynwarcs.github.io/x-cve-2023-24871-rce
- Exp
CVE-2023-23388
Windows Bluetooth Driver Elevation of Privilege Vulnerability
- Analyse
- https://ynwarcs.github.io/v-cve-2023-23388
- PoC
CVE-2023-21822
Windows Graphics Component Elevation of Privilege Vulnerability
- Analyse
- https://www.zerodayinitiative.com/blog/2023/8/1/exploiting-a-flaw-in-bitmap-handling-in-windows-user-mode-printer-drivers
- Exp
CVE-2023-21817
Windows Kerberos Elevation of Privilege Vulnerability
- PoC
- https://gist.github.com/monoxgas/f615514fb51ebb55a7229f3cf79cf95b
CVE-2023-21768
Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability
- Analyse
- https://www.zoemurmure.top/posts/cve_2023_21768/
- https://securityintelligence.com/posts/patch-tuesday-exploit-wednesday-pwning-windows-ancillary-function-driver-winsock/
- https://mp.weixin.qq.com/s/9W9puJltbK-xto2A1duqgQ
- Exp
- https://github.com/chompie1337/Windows_LPE_AFD_CVE-2023-21768 :
- https://github.com/SamuelTulach/nullmap :
- https://github.com/Malwareman007/CVE-2023-21768 :
- https://github.com/3yujw7njai/CVE-2023-21768-POC :
- https://github.com/cl4ym0re/cve-2023-21768-compiled :
- https://github.com/zoemurmure/CVE-2023-21768-AFD-for-WinSock-EoP-exploit :
- https://github.com/xboxoneresearch/CVE-2023-21768-dotnet :
- https://github.com/HKxiaoli/Windows_AFD_LPE_CVE-2023-21768 :
- https://github.com/h1bAna/CVE-2023-21768 :
- https://github.com/Rosayxy/Recreate-cve-2023-21768 :
- https://github.com/ldrx30/CVE-2023-21768 :
CVE-2023-21766
Windows Overlay Filter Information Disclosure Vulnerability
CVE-2023-21752
Windows Backup Service Elevation of Privilege Vulnerability
- Analyse
- https://blog.0patch.com/2023/01/micropatching-arbitrary-file-delete.html
- Exp
CVE-2023-21746
Windows NTLM Elevation of Privilege Vulnerability
- Analyse
- https://securityonline.info/poc-exploit-for-windows-ntlm-privilege-escalation-flaw-cve-2023-21746-published/
- Exp
CVE-2023-21674
Windows Advanced Local Procedure Call (ALPC) Elevation of Privilege Vulnerability
- Analyse
- https://blog.theori.io/chaining-n-days-to-compromise-all-part-2-windows-kernel-lpe-a-k-a-chrome-sandbox-escape-44cb49d7a4f8
- PoC
CVE-2023-21554
Microsoft Message Queuing (MSMQ) Remote Code Execution Vulnerability
- Analyse
- https://www.zoemurmure.top/posts/cve_2023_21554/
- https://github.com/3tternp/CVE-2023-21554/blob/main/CVE-2023-21554%20Loophole%20Analysis.pdf
- PoC
CVE-2023-21823
Windows Graphics Component Remote Code Execution Vulnerability
2022
CVE-2022-37969
Windows Common Log File System Driver Elevation of Privilege Vulnerability
- Analyse
- https://www.coresecurity.com/core-labs/articles/understanding-cve-2022-37969-windows-clfs-lpe
- https://www.zscaler.com/blogs/security-research/technical-analysis-windows-clfs-zero-day-vulnerability-cve-2022-37969-part
- PoC
CVE-2022-37967
Windows Kerberos Elevation of Privilege Vulnerability
- Analyse
- https://geekmungus.co.uk/?p=3619
- PoC
CVE-2022-35841
Windows Enterprise App Management Service Remote Code Execution Vulnerability
- Analyse
CVE-2022-34718
Windows TCP/IP Remote Code Execution Vulnerability
- Analyse
- https://medium.com/numen-cyber-labs/analysis-and-summary-of-tcp-ip-protocol-remote-code-execution-vulnerability-cve-2022-34718-8fcc28538acf
- https://securityonline.info/researchers-release-poc-for-windows-tcp-ip-rce-flaw-cve-2022-34718/
- https://securityintelligence.com/posts/dissecting-exploiting-tcp-ip-rce-vulnerability-evilesp/
- PoC
CVE-2022-34715
Windows Network File System Remote Code Execution Vulnerability.
- Analyse
- https://www.thezdi.com/blog/2022/8/31/cve-2022-34715-more-microsoft-windows-nfs-v4-remote-code-execution
- PoC
CVE-2022-33679
Windows Kerberos Elevation of Privilege Vulnerability
- Analyse
- https://googleprojectzero.blogspot.com/2022/10/rc4-is-still-considered-harmful.html
- https://bugs.chromium.org/p/project-zero/issues/detail?id=2310
- https://www.silverfort.com/blog/technical-analysis-of-cve-2022-33679-and-cve-2022-33647-kerberos-vulnerabilities/
- https://www.horizon3.ai/from-cve-2022-33679-to-unauthenticated-kerberoasting/
- PoC
CVE-2022-30206
Windows Print Spooler Elevation of Privilege Vulnerability. This CVE ID is unique from CVE-2022-22022, CVE-2022-22041, CVE-2022-30226.
- PoC
CVE-2022-30136
Windows Network File System Remote Code Execution Vulnerability.
- Analyse
- https://www.coresecurity.com/core-labs/articles/analysis-cve-2022-30136-windows-network-file-system-vulnerability
- https://www.zerodayinitiative.com/blog/2022/7/13/cve-2022-30136-microsoft-windows-network-file-system-v4-remote-code-execution-vulnerability
- https://github.com/fortra/CVE-2022-30136 :
- PoC
CVE-2022-26937
Windows Network File System Remote Code Execution Vulnerability.
- Analyse
- https://www.zerodayinitiative.com/blog/2022/6/7/cve-2022-26937-microsoft-windows-network-file-system-nlm-portmap-stack-buffer-overflow
- PoC
CVE-2022-26923
Active Directory Domain Services Elevation of Privilege Vulnerability.
- Analyse
- https://research.ifcr.dk/certifried-active-directory-domain-privilege-escalation-cve-2022-26923-9e098fe298f4
- PoC
CVE-2022-26809
Remote Procedure Call Runtime Remote Code Execution Vulnerability. This CVE ID is unique from CVE-2022-24492, CVE-2022-24528.
- Analyse
- https://medium.com/@knownsec404team/recurrence-and-analysis-of-rpc-high-risk-vulnerability-cve-2022-26809-7851cc88f81c
- https://s1ckb017.github.io/2022/06/17/CVE-2022-26809-Server-Side-vulnerable-point-reachability.html
- https://www.linkedin.com/pulse/cve-2022-26809-dynamics-around-security-community-microsoft-analyzing-?trk=organization-update-content_share-article
- PoC
CVE-2022-24494
Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability.
CVE-2022-24483
Windows Kernel Information Disclosure Vulnerability.
2021
CVE-2021-43893
Windows Encrypting File System (EFS) Elevation of Privilege Vulnerability
- Analyse
- https://www.rapid7.com/blog/post/2022/02/14/dropping-files-on-a-domain-controller-using-cve-2021-43893/
- Exp
CVE-2021-43883/CVE-2021-41379
Windows Installer Elevation of Privilege Vulnerability
- Analyse
- https://attackerkb.com/topics/7LstI2clmF/cve-2021-41379/rapid7-analysis
- Exp
CVE-2021-43224
Windows Common Log File System Driver Information Disclosure Vulnerability
CVE-2021-42287/CVE-2021-42278
Active Directory Domain Services Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2021-42282, CVE-2021-42287, CVE-2021-42291.
- Analyse
- https://xz.aliyun.com/t/10666
- Exp
CVE-2021-40449
Win32k Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2021-40450, CVE-2021-41357.
- Analyse
- https://www.secrss.com/articles/35266
- https://bbs.pediy.com/thread-269930.htm
- https://www.freebuf.com/articles/paper/292528.html
- PoC
- Exp
CVE-2021-40444
Microsoft MSHTML Remote Code Execution Vulnerability
- Analyse
- https://paper.seebug.org/1718/
- https://bbs.pediy.com/thread-270017.htm
- Exp
CVE-2021-38639
Win32k Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2021-36975.
CVE-2021-36934
Windows Elevation of Privilege Vulnerability
- Analyse
- https://www.jianshu.com/p/979ea7a93531
- Exp
CVE-2021-34527
Windows Print Spooler Remote Code Execution Vulnerability
- Analyse
- PoC
- Exp
CVE-2021-34486
Windows Event Tracing Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2021-26425, CVE-2021-34487.
- Analyse
- https://www.pixiepointsecurity.com/blog/advisory-cve-2021-34486.html
- Exp
CVE-2021-33739
Microsoft DWM Core Library Elevation of Privilege Vulnerability
- Analyse
- https://www.cnblogs.com/zUotTe0/p/15227947.html
- https://zhuanlan.zhihu.com/p/384636717
- Exp
CVE-2021-31956
Windows NTFS Elevation of Privilege Vulnerability
- Analyse
- https://research.nccgroup.com/2021/07/15/cve-2021-31956-exploiting-the-windows-kernel-ntfs-with-wnf-part-1/
- https://research.nccgroup.com/2021/08/17/cve-2021-31956-exploiting-the-windows-kernel-ntfs-with-wnf-part-2/
CVE-2021-28310
Win32k Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2021-27072
- Analyse
- https://securelist.com/zero-day-vulnerability-in-desktop-window-manager-cve-2021-28310-used-in-the-wild/101898/
CVE-2021-26868
Windows Graphics Component Elevation of Privilege Vulnerability
- Analyse
- https://zhuanlan.zhihu.com/p/384636717
- Exp
CVE-2021-24096
Windows Kernel Elevation of Privilege Vulnerability
CVE-2021-21551
Dell dbutil_2_3.sys driver contains an insufficient access control vulnerability which may lead to escalation of privileges, denial of service, or information disclosure. Local authenticated user access is required.
- Analyse
- https://labs.sentinelone.com/cve-2021-21551-hundreds-of-millions-of-dell-computers-at-risk-due-to-multiple-bios-driver-privilege-escalation-flaws/
- Exp
CVE-2021-1732
Windows Win32k Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2021-1698
- Analyse
- https://www.freebuf.com/vuls/270295.html
- https://021w.github.io/2021/03/12/CVE-2021-1732Win32kfull-sys%E5%86%85%E6%A0%B8%E6%BC%8F%E6%B4%9E%E5%88%86%E6%9E%90/
- https://laptrinhx.com/shen-ru-pou-xicve-2021-1732lou-dong-1153028117/
- https://bbs.pediy.com/thread-266362.htm
- https://www.secrss.com/articles/29758
- Exp
- https://github.com/Ascotbe/Kernelhub/tree/master/CVE-2021-1732 :
- https://github.com/KaLendsi/CVE-2021-1732-Exploit :
- https://github.com/Al1ex/WindowsElevation/tree/master/CVE-2021-1732 :
- https://github.com/k-k-k-k-k/CVE-2021-1732 :
- https://github.com/jessica0f0116/cve_2021_1732 :
- https://github.com/oneoy/CVE-2021-1732-Exploit :
2020
CVE-2020-17087
Windows Kernel Local Elevation of Privilege Vulnerability
- Analyse
- https://blog.csdn.net/weixin_43815930/article/details/114123728
- https://www.anquanke.com/post/id/221964
- PoC
CVE-2020-17057
Windows Win32k Elevation of Privilege Vulnerability
- Analyse
- https://blogs.360.cn/post/CVE-2020-17057%20detail%20and%20exploit.html
- PoC
CVE-2020-16898
A remote code execution vulnerability exists when the Windows TCP/IP stack improperly handles ICMPv6 Router Advertisement packets, aka 'Windows TCP/IP Remote Code Execution Vulnerability'.
- Analyse
- https://www.anquanke.com/post/id/220862
- https://bestwing.me/CVE-2020-15898-analysis.html
- http://www.v4ler1an.com/2020/10/cve-2020-16898/
- https://cert.360.cn/report/detail?id=771d8ddc2d703071d5761b6a2b139793
- PoC
- https://github.com/Ascotbe/Kernelhub/tree/master/CVE-2020-16898 :
- https://github.com/advanced-threat-research/CVE-2020-16898 :
- https://github.com/0xeb-bp/cve-2020-16898 :
- https://github.com/ZephrFish/CVE-2020-16898 :
- https://github.com/momika233/CVE-2020-16898-exp :
- https://github.com/corelight/CVE-2020-16898 :
- https://github.com/komomon/CVE-2020-16898--EXP-POC :
- https://github.com/jiansiting/cve-2020-16898 :
- https://github.com/komomon/CVE-2020-16898-EXP-POC :
- https://github.com/Maliek/CVE-2020-16898_Check :
- https://github.com/initconf/CVE-2020-16898-Bad-Neighbor :
- https://github.com/CPO-EH/CVE-2020-16898_Checker :
- https://github.com/esnet-security/cve-2020-16898 :
- https://github.com/Q1984/CVE-2020-16898 :
CVE-2020-1362
An elevation of privilege vulnerability exists in the way that the Windows WalletService handles objects in memory, aka 'Windows WalletService Elevation of Privilege Vulnerability'. This CVE ID is unique from CVE-2020-1344, CVE-2020-1369.
- Analyse
- https://paper.seebug.org/1276/
- https://www.023niu.com/show-62-811-1.html
- https://blog.csdn.net/gental_z/article/details/107937110
- Exp
CVE-2020-1350
A remote code execution vulnerability exists in Windows Domain Name System servers when they fail to properly handle requests, aka 'Windows DNS Server Remote Code Execution Vulnerability'.
- Analyse
- https://saturn35.com/2020/07/24/20200724-1/
- https://www.anquanke.com/post/id/210812
- https://cert.360.cn/report/detail?id=5b7082dae4756f361d43a5efde233ed
- PoC
- https://github.com/ZephrFish/CVE-2020-1350 :
- https://github.com/maxpl0it/CVE-2020-1350-DoS :
- https://github.com/tinkersec/cve-2020-1350 :
- https://github.com/psc4re/NSE-scripts :
- https://github.com/captainGeech42/CVE-2020-1350 :
- https://github.com/T13nn3s/CVE-2020-1350 :
- https://github.com/corelight/SIGRed :
- https://github.com/connormcgarr/CVE-2020-1350 :
- https://github.com/zoomerxsec/Fake_CVE-2020-1350 :
- https://github.com/graph-inc/CVE-2020-1350 :
- https://github.com/Plazmaz/CVE-2020-1350-poc :
- https://github.com/simeononsecurity/CVE-2020-1350-Fix :
- https://github.com/CVEmaster/CVE-2020-1350 :
- https://github.com/gdwnet/cve-2020-1350 :
- https://github.com/Secuora-Org/CVE-2020-1350-checker.ps1 :
- https://github.com/jmaddington/dRMM-CVE-2020-1350-response :
CVE-2020-1337
An elevation of privilege vulnerability exists when the Windows Print Spooler service improperly allows arbitrary writing to the file system, aka 'Windows Print Spooler Elevation of Privilege Vulnerability'.
- Analyse
- https://bbs.pediy.com/thread-261557.htm
- Exp
CVE-2020-1313
An elevation of privilege vulnerability exists when the Windows Update Orchestrator Service improperly handles file operations, aka 'Windows Update Orchestrator Service Elevation of Privilege Vulnerability'.
- Analyse
- https://cloud.tencent.com/developer/article/1683124
- PoC
CVE-2020-1301
A remote code execution vulnerability exists in the way that the Microsoft Server Message Block 1.0 (SMBv1) server handles certain requests, aka 'Windows SMB Remote Code Execution Vulnerability'.
- Analyse
- https://bbs.pediy.com/thread-260339.htm
- https://s.tencent.com/research/bsafe/1007.html
- https://airbus-cyber-security.com/diving-into-the-smblost-vulnerability-cve-2020-1301/
- PoC
CVE-2020-1066
An elevation of privilege vulnerability exists in .NET Framework which could allow an attacker to elevate their privilege level.To exploit the vulnerability, an attacker would first have to access the local machine, and then run a malicious program.The update addresses the vulnerability by correcting how .NET Framework activates COM objects., aka '.NET Framework Elevation of Privilege Vulnerability'.
- Analyse
- https://www.anquanke.com/post/id/205105
- https://blog.csdn.net/qq_37353105/article/details/114481214
- Exp
CVE-2020-1054
An elevation of privilege vulnerability exists in Windows when the Windows kernel-mode driver fails to properly handle objects in memory, aka 'Win32k Elevation of Privilege Vulnerability'. This CVE ID is unique from CVE-2020-1143.
- Analyse
- https://www.anquanke.com/post/id/209329
- https://mp.weixin.qq.com/s?__biz=MjM5NTc2MDYxMw==&mid=2458334073&idx=1&sn=d8ffd415a148aac507b0173eb906badb&chksm=b18003f386f78ae5c76971e993f42409a0c22fd52468949bf08436469e7456f4cc836ab9ba71&scene=21
- https://bbs.pediy.com/thread-260884.htm
- Exp
CVE-2020-1048
An elevation of privilege vulnerability exists when the Windows Print Spooler service improperly allows arbitrary writing to the file system, aka 'Windows Print Spooler Elevation of Privilege Vulnerability'. This CVE ID is unique from CVE-2020-1070.
- Analyse
- https://zhuanlan.kanxue.com/article-11214.htm
- https://www.anquanke.com/post/id/222730
- https://bbs.pediy.com/thread-261557.htm
- Exp
CVE-2020-1034
An elevation of privilege vulnerability exists in the way that the Windows Kernel handles objects in memory, aka 'Windows Kernel Elevation of Privilege Vulnerability'.
- Analyse
- https://windows-internals.com/exploiting-a-simple-vulnerability-in-35-easy-steps-or-less
- https://windows-internals.com/exploiting-a-simple-vulnerability-part-1-5-the-info-leak/
- https://windows-internals.com/exploiting-a-simple-vulnerability-part-2-what-if-we-made-exploitation-harder/
- https://cloud.tencent.com/developer/article/1750818
- https://www.4hou.com/posts/Np4N
- https://www.anquanke.com/post/id/223724
- PoC
CVE-2020-1015
An elevation of privilege vulnerability exists in the way that the User-Mode Power Service (UMPS) handles objects in memory, aka 'Windows Elevation of Privilege Vulnerability'. This CVE ID is unique from CVE-2020-0934, CVE-2020-0983, CVE-2020-1009, CVE-2020-1011.
- Analyse
- https://0xeb-bp.com/blog/2020/05/12/cve-2020-1015-analysis.html
- https://www.anquanke.com/post/id/217526
- PoC
CVE-2020-0883
A remote code execution vulnerability exists in the way that the Windows Graphics Device Interface (GDI) handles objects in the memory, aka 'GDI+ Remote Code Execution Vulnerability'. This CVE ID is unique from CVE-2020-0881.
CVE-2020-0814
An elevation of privilege vulnerability exists in Windows Installer because of the way Windows Installer handles certain filesystem operations.To exploit the vulnerability, an attacker would require unprivileged execution on the victim system, aka 'Windows Installer Elevation of Privilege Vulnerability'. This CVE ID is unique from CVE-2020-0779, CVE-2020-0798, CVE-2020-0842, CVE-2020-0843.
CVE-2020-0796
A remote code execution vulnerability exists in the way that the Microsoft Server Message Block 3.1.1 (SMBv3) protocol handles certain requests, aka 'Windows SMBv3 Client/Server Remote Code Execution Vulnerability'.
- Analyse
- https://paper.seebug.org/1168/
- https://www.freebuf.com/column/230770.html
- https://jcxp.github.io/2020/03/31/CVE-2020-0796-SMB%E6%BC%8F%E6%B4%9E%E5%88%86%E6%9E%90/
- https://www.cnblogs.com/potatsoSec/p/12484973.html
- https://blog.csdn.net/RatOnSea/article/details/106399450
- https://blogs.360.cn/post/CVE-2020-0796.html
- https://zhuanlan.zhihu.com/p/133460472
- PoC
- https://github.com/eerykitty/CVE-2020-0796-PoC :
- https://github.com/psc4re/NSE-scripts :
- https://github.com/claroty/CVE2020-0796 :
- https://github.com/ioncodes/SMBGhost :
- https://github.com/jiansiting/CVE-2020-0796 :
- https://github.com/k8gege/PyLadon :
- https://github.com/T13nn3s/CVE-2020-0796 :
- https://github.com/ZecOps/SMBGhost-SMBleed-scanner :
- https://github.com/maxpl0it/Unauthenticated-CVE-2020-0796-PoC :
- https://github.com/Aekras1a/CVE-2020-0796-PoC :
- https://github.com/GuoKerS/aioScan_CVE-2020-0796 :
- https://github.com/joaozietolie/CVE-2020-0796-Checker :
- https://github.com/gabimarti/SMBScanner :
- https://github.com/w1ld3r/SMBGhost_Scanner :
- https://github.com/dickens88/cve-2020-0796-scanner :
- https://github.com/jiansiting/CVE-2020-0796-Scanner :
- Exp
- https://github.com/Ascotbe/Kernelhub/tree/master/CVE-2020-0796 :
- https://github.com/danigargu/CVE-2020-0796 :
- https://github.com/ollypwn/SMBGhost :
- https://github.com/ZecOps/CVE-2020-0796-RCE-POC :
- https://github.com/ZecOps/CVE-2020-0796-LPE-POC :
- https://github.com/Barriuso/SMBGhost_AutomateExploitation :
- https://github.com/Rvn0xsy/CVE_2020_0796_CNA :
- https://github.com/rsmudge/CVE-2020-0796-BOF :
- https://github.com/eastmountyxz/CVE-2020-0796-SMB :
- https://github.com/Almorabea/SMBGhost-LPE-Metasploit-Module :
- https://github.com/f1tz/CVE-2020-0796-LPE-EXP :
- https://github.com/thelostworldFree/CVE-2020-0796 :
CVE-2020-0787
An elevation of privilege vulnerability exists when the Windows Background Intelligent Transfer Service (BITS) improperly handles symbolic links, aka 'Windows Background Intelligent Transfer Service Elevation of Privilege Vulnerability'.
- Analyse
- https://f5.pm/go-28382.html
- https://itm4n.github.io/cve-2020-0787-windows-bits-eop/
- https://xz.aliyun.com/t/7935
- Exp
CVE-2020-0754
An elevation of privilege vulnerability exists in Windows Error Reporting (WER) when WER handles and executes files, aka 'Windows Error Reporting Elevation of Privilege Vulnerability'. This CVE ID is unique from CVE-2020-0753.
CVE-2020-0753
An elevation of privilege vulnerability exists in Windows Error Reporting (WER) when WER handles and executes files, aka 'Windows Error Reporting Elevation of Privilege Vulnerability'. This CVE ID is unique from CVE-2020-0754.
CVE-2020-0683
An elevation of privilege vulnerability exists in the Windows Installer when MSI packages process symbolic links, aka 'Windows Installer Elevation of Privilege Vulnerability'. This CVE ID is unique from CVE-2020-0686.
- Exp
CVE-2020-0668
An elevation of privilege vulnerability exists in the way that the Windows Kernel handles objects in memory, aka 'Windows Kernel Elevation of Privilege Vulnerability'. This CVE ID is unique from CVE-2020-0669, CVE-2020-0670, CVE-2020-0671, CVE-2020-0672.
- Analyse
- https://www.anquanke.com/post/id/199011
- https://www.freebuf.com/vuls/227557.html
- https://itm4n.github.io/cve-2020-0668-windows-service-tracing-eop/
- PoC
- Exp
CVE-2020-0624
An elevation of privilege vulnerability exists in Windows when the Win32k component fails to properly handle objects in memory, aka 'Win32k Elevation of Privilege Vulnerability'. This CVE ID is unique from CVE-2020-0642.
- Analyse
- https://bbs.pediy.com/thread-260605.htm
- https://www.sec-wiki.com/news/28042
- https://mp.weixin.qq.com/s/GHiTqWlxisyVWxVHcACpvg
- PoC
CVE-2020-0610
A remote code execution vulnerability exists in Windows Remote Desktop Gateway (RD Gateway) when an unauthenticated attacker connects to the target system using RDP and sends specially crafted requests, aka 'Windows Remote Desktop Gateway (RD Gateway) Remote Code Execution Vulnerability'. This CVE ID is unique from CVE-2020-0609.
- Analyse
- https://www.4hou.com/posts/mMpn
- https://www.023niu.com/show-62-552-1.html
- PoC
CVE-2020-0609
A remote code execution vulnerability exists in Windows Remote Desktop Gateway (RD Gateway) when an unauthenticated attacker connects to the target system using RDP and sends specially crafted requests, aka 'Windows Remote Desktop Gateway (RD Gateway) Remote Code Execution Vulnerability'. This CVE ID is unique from CVE-2020-0610.
- Analyse
- https://www.4hou.com/posts/mMpn
- https://www.023niu.com/show-62-552-1.html
- PoC
2019
CVE-2019-1477
An elevation of privilege vulnerability exists when the Windows Printer Service improperly validates file paths while loading printer drivers, aka 'Windows Printer Service Elevation of Privilege Vulnerability'.
CVE-2019-1476
An elevation of privilege vulnerability exists when Windows AppX Deployment Service (AppXSVC) improperly handles hard links, aka 'Windows Elevation of Privilege Vulnerability'. This CVE ID is unique from CVE-2019-1483.
CVE-2019-1458
An elevation of privilege vulnerability exists in Windows when the Win32k component fails to properly handle objects in memory, aka 'Win32k Elevation of Privilege Vulnerability'.
- Analyse
- github https://github.com/piotrflorczyk/cve-2019-1458_POC
- https://bbs.pediy.com/thread-260268.htm
- https://thunderjie.github.io/2020/03/21/CVE-2019-1458-%E4%BB%8E-%E6%BC%8F%E6%B4%9E%E6%8A%A5%E5%91%8A-%E5%88%B0POC%E7%9A%84%E7%BC%96%E5%86%99%E8%BF%87%E7%A8%8B/
- PoC
- Exp
CVE-2019-1422
An elevation of privilege vulnerability exists in the way that the iphlpsvc.dll handles file creation allowing for a file overwrite, aka 'Windows Elevation of Privilege Vulnerability'. This CVE ID is unique from CVE-2019-1420, CVE-2019-1423.
CVE-2019-1405
An elevation of privilege vulnerability exists when the Windows Universal Plug and Play (UPnP) service improperly allows COM object creation, aka 'Windows UPnP Service Elevation of Privilege Vulnerability'.
- Analyse
- https://www.nccgroup.trust/uk/about-us/newsroom-and-events/blogs/2019/november/cve-2019-1405-and-cve-2019-1322-elevation-to-system-via-the-upnp-device-host-service-and-the-update-orchestrator-service/
- https://www.anquanke.com/post/id/193022
- https://nosec.org/m/share/3177.html
- Exp
CVE-2019-1388
An elevation of privilege vulnerability exists in the Windows Certificate Dialog when it does not properly enforce user privileges, aka 'Windows Certificate Dialog Elevation of Privilege Vulnerability'.
- Analyse
- http://blog.leanote.com/post/snowming/38069f423c76
- https://mp.weixin.qq.com/s/q4UICIVwC4HX-ytvWo8Dvw
- Exp
CVE-2019-1385
An elevation of privilege vulnerability exists when the Windows AppX Deployment Extensions improperly performs privilege management, resulting in access to system files.To exploit this vulnerability, an authenticated attacker would need to run a specially crafted application to elevate privileges.The security update addresses the vulnerability by correcting how AppX Deployment Extensions manages privileges., aka 'Windows AppX Deployment Extensions Elevation of Privilege Vulnerability'.
CVE-2019-1322
An elevation of privilege vulnerability exists when Windows improperly handles authentication requests, aka 'Microsoft Windows Elevation of Privilege Vulnerability'. This CVE ID is unique from CVE-2019-1320, CVE-2019-1340.
- Analyse
- https://www.nccgroup.trust/uk/about-us/newsroom-and-events/blogs/2019/november/cve-2019-1405-and-cve-2019-1322-elevation-to-system-via-the-upnp-device-host-service-and-the-update-orchestrator-service/
- https://www.anquanke.com/post/id/193022
- https://nosec.org/m/share/3177.html
- Exp
CVE-2019-1315
An elevation of privilege vulnerability exists when Windows Error Reporting manager improperly handles hard links, aka 'Windows Error Reporting Manager Elevation of Privilege Vulnerability'. This CVE ID is unique from CVE-2019-1339, CVE-2019-1342.
- Analyse
- https://offsec.almond.consulting/windows-error-reporting-arbitrary-file-move-eop.html
- https://nosec.org/home/detail/3027.html
- PoC
CVE-2019-1253
An elevation of privilege vulnerability exists when the Windows AppX Deployment Server improperly handles junctions.To exploit this vulnerability, an attacker would first have to gain execution on the victim system, aka 'Windows Elevation of Privilege Vulnerability'. This CVE ID is unique from CVE-2019-1215, CVE-2019-1278, CVE-2019-1303.
- Exp
CVE-2019-1215
An elevation of privilege vulnerability exists in the way that ws2ifsl.sys (Winsock) handles objects in memory, aka 'Windows Elevation of Privilege Vulnerability'. This CVE ID is unique from CVE-2019-1253, CVE-2019-1278, CVE-2019-1303.
- Analyse
- https://labs.bluefrostsecurity.de/blog/2020/01/07/cve-2019-1215-analysis-of-a-use-after-free-in-ws2ifsl/
- https://bbs.pediy.com/thread-257435.htm
- https://www.freebuf.com/vuls/226167.html
- https://www.163.com/dy/article/FQBEHKLS0511CJ6O.html
- https://saturn35.com/2020/01/09/20200109-1/
- https://day.fujieace.com/security-research/600.html
- Exp
CVE-2019-1132
An elevation of privilege vulnerability exists in Windows when the Win32k component fails to properly handle objects in memory, aka 'Win32k Elevation of Privilege Vulnerability'.
- Analyse
- https://zhuanlan.zhihu.com/p/335166796
- https://ti.qianxin.com/blog/articles/buhtrap-cve-2019-1132-attack-event-related-vulnerability-sample-analysis/
- https://www.welivesecurity.com/2019/07/10/windows-zero-day-cve-2019-1132-exploit/
- https://www.anquanke.com/post/id/181794
- Exp
CVE-2019-1129/1130
An elevation of privilege vulnerability exists when Windows AppX Deployment Service (AppXSVC) improperly handles hard links, aka 'Windows Elevation of Privilege Vulnerability'. This CVE ID is unique from CVE-2019-1130.
CVE-2019-1064
An elevation of privilege vulnerability exists when Windows AppX Deployment Service (AppXSVC) improperly handles hard links, aka 'Windows Elevation of Privilege Vulnerability'.
- Analyse
- http://cn-sec.com/archives/74164.html
- PoC
CVE-2019-1040
A tampering vulnerability exists in Microsoft Windows when a man-in-the-middle attacker is able to successfully bypass the NTLM MIC (Message Integrity Check) protection, aka 'Windows NTLM Tampering Vulnerability'.
- Analyse
- https://bbs.pediy.com/thread-252018.htm
- https://zhuanlan.zhihu.com/p/345406848
- PoC
- Exp
CVE-2019-0986
An elevation of privilege vulnerability exists when the Windows User Profile Service (ProfSvc) improperly handles symlinks, aka 'Windows User Profile Service Elevation of Privilege Vulnerability'.
CVE-2019-0863
An elevation of privilege vulnerability exists in the way Windows Error Reporting (WER) handles files, aka 'Windows Error Reporting Elevation of Privilege Vulnerability'.
- Analyse
- https://xz.aliyun.com/t/5571
- https://unit42.paloaltonetworks.com/tale-of-a-windows-error-reporting-zero-day-cve-2019-0863/
- https://www.anquanke.com/post/id/181457
- Exp
CVE-2019-0859
An elevation of privilege vulnerability exists in Windows when the Win32k component fails to properly handle objects in memory, aka 'Win32k Elevation of Privilege Vulnerability'. This CVE ID is unique from CVE-2019-0685, CVE-2019-0803.
- Analyse
- https://www.secrss.com/articles/9942
- https://blog.csdn.net/blackorbird/article/details/102462546
- https://www.4hou.com/posts/3jRO
- https://nosec.org/home/detail/2490.html
- Exp
CVE-2019-0803
An elevation of privilege vulnerability exists in Windows when the Win32k component fails to properly handle objects in memory, aka 'Win32k Elevation of Privilege Vulnerability'. This CVE ID is unique from CVE-2019-0685, CVE-2019-0859.
- Analyse
- https://bbs.pediy.com/thread-260289.htm
- https://www.jianshu.com/p/91e0f79f36eb
- https://zhuanlan.zhihu.com/p/62520006
- Exp
CVE-2019-0708
A remote code execution vulnerability exists in Remote Desktop Services formerly known as Terminal Services when an unauthenticated attacker connects to the target system using RDP and sends specially crafted requests, aka 'Remote Desktop Services Remote Code Execution Vulnerability'.
- Analyse
- https://xz.aliyun.com/t/5243
- https://bbs.pediy.com/thread-256734.htm
- https://www.anquanke.com/post/id/178964
- https://www.cnblogs.com/backlion/p/11482322.html
- PoC
- https://github.com/Ekultek/BlueKeep :
- https://github.com/zerosum0x0/CVE-2019-0708 :
- https://github.com/robertdavidgraham/rdpscan :
- https://github.com/n1xbyte/CVE-2019-0708 :
- https://github.com/k8gege/CVE-2019-0708 :
- https://github.com/0xeb-bp/bluekeep :
- https://github.com/nccgroup/BKScan :
- https://github.com/Leoid/CVE-2019-0708 :
- https://github.com/worawit/CVE-2019-0708 :
- https://github.com/biggerwing/CVE-2019-0708-poc :
- https://github.com/umarfarook882/CVE-2019-0708 :
- https://github.com/Jaky5155/cve-2019-0708-exp :
- Exp
- https://www.rapid7.com/blog/post/2019/09/06/initial-metasploit-exploit-module-for-bluekeep-cve-2019-0708/
- https://github.com/algo7/bluekeep_CVE-2019-0708_poc_to_exploit :
- https://github.com/cbwang505/CVE-2019-0708-EXP-Windows :
- https://github.com/Cyb0r9/ispy :
- https://github.com/NAXG/cve_2019_0708_bluekeep_rce :
- https://github.com/dorkerdevil/Remote-Desktop-Services-Remote-Code-Execution-Vulnerability-CVE-2019-0708- :
- https://github.com/TinToSer/bluekeep-exploit :
- https://github.com/coolboy4me/cve-2019-0708_bluekeep_rce :
- https://github.com/mai-lang-chai/CVE-2019-0708-RCE :
- https://github.com/rockmelodies/CVE-2019-0708-Exploit :
- to more on github...
CVE-2019-0623
An elevation of privilege vulnerability exists in Windows when the Win32k component fails to properly handle objects in memory, aka 'Win32k Elevation of Privilege Vulnerability'.
- Analyse
- https://paper.seebug.org/832/
- Exp
2018
CVE-2018-8639
An elevation of privilege vulnerability exists in Windows when the Win32k component fails to properly handle objects in memory, aka "Win32k Elevation of Privilege Vulnerability." This affects Windows 7, Windows Server 2012 R2, Windows RT 8.1, Windows Server 2008, Windows Server 2019, Windows Server 2012, Windows 8.1, Windows Server 2016, Windows Server 2008 R2, Windows 10, Windows 10 Servers. This CVE ID is unique from CVE-2018-8641.
- Analyse
- https://www.anquanke.com/post/id/183358
- https://bbs.pediy.com/thread-251400.htm
- https://bbs.pediy.com/thread-254305.htm
- Exp
CVE-2018-8453
An elevation of privilege vulnerability exists in Windows when the Win32k component fails to properly handle objects in memory, aka "Win32k Elevation of Privilege Vulnerability." This affects Windows 7, Windows Server 2012 R2, Windows RT 8.1, Windows Server 2008, Windows Server 2019, Windows Server 2012, Windows 8.1, Windows Server 2016, Windows Server 2008 R2, Windows 10, Windows 10 Servers.
- Analyse
- github https://github.com/thepwnrip/leHACK-Analysis-of-CVE-2018-8453
- https://www.anquanke.com/post/id/162894
- https://paper.seebug.org/784/
- https://paper.seebug.org/798/
- https://bbs.pediy.com/thread-249021.htm
- https://www.jianshu.com/p/082bd9992b57
- https://www.whsgwl.net/blog/CVE-2018-8453_0.html
- https://www.whsgwl.net/blog/CVE-2018-8453_1.html
- Exp
CVE-2018-8440
An elevation of privilege vulnerability exists when Windows improperly handles calls to Advanced Local Procedure Call (ALPC), aka "Windows ALPC Elevation of Privilege Vulnerability." This affects Windows 7, Windows Server 2012 R2, Windows RT 8.1, Windows Server 2008, Windows Server 2012, Windows 8.1, Windows Server 2016, Windows Server 2008 R2, Windows 10, Windows 10 Servers.
- Analyse
- https://blog.0patch.com/2018/08/how-we-micropatched-publicly-dropped.html
- https://blog.0patch.com/2018/09/comparing-our-micropatch-with.html
- https://www.anquanke.com/post/id/169382
- Exp
CVE-2018-8414
A remote code execution vulnerability exists when the Windows Shell does not properly validate file paths, aka "Windows Shell Remote Code Execution Vulnerability." This affects Windows 10 Servers, Windows 10.
- Analyse
- https://www.anquanke.com/post/id/157782
- https://www.cnblogs.com/backlion/p/9642241.html
- Exp
CVE-2018-8120
An elevation of privilege vulnerability exists in Windows when the Win32k component fails to properly handle objects in memory, aka "Win32k Elevation of Privilege Vulnerability." This affects Windows Server 2008, Windows 7, Windows Server 2008 R2. This CVE ID is unique from CVE-2018-8124, CVE-2018-8164, CVE-2018-8166.
- Analyse
- github https://github.com/EVOL4/CVE-2018-8120/blob/master/CVE-2018-8120.md
- https://b2ahex.github.io/blog/2018/05/15/8120%E5%88%86%E6%9E%90/index.html
- https://paper.seebug.org/614/
- https://xz.aliyun.com/t/8667
- http://xz.aliyun.com/t/5966
- PoC
- Exp
- https://github.com/Al1ex/WindowsElevation/tree/master/CVE-2018-8120 :
- https://github.com/unamer/CVE-2018-8120 :
- https://github.com/alpha1ab/CVE-2018-8120 :
- https://github.com/bigric3/cve-2018-8120 :
- https://github.com/ne1llee/cve-2018-8120 :
- https://github.com/ozkanbilge/CVE-2018-8120 :
- https://github.com/EVOL4/CVE-2018-8120 :
- https://github.com/qiantu88/CVE-2018-8120 :
- https://github.com/Y0n0Y/cve-2018-8120-exp :
- https://github.com/DreamoneOnly/CVE-2018-8120 :
- https://github.com/wikiZ/cve-2018-8120 :
CVE-2018-7249
An issue was discovered in secdrv.sys as shipped in Microsoft Windows Vista, Windows 7, Windows 8, and Windows 8.1 before KB3086255, and as shipped in Macrovision SafeDisc. Two carefully timed calls to IOCTL 0xCA002813 can cause a race condition that leads to a use-after-free. When exploited, an unprivileged attacker can run arbitrary code in the kernel.
CVE-2018-1038
The Windows kernel in Windows 7 SP1 and Windows Server 2008 R2 SP1 allows an elevation of privilege vulnerability due to the way it handles objects in memory, aka "Windows Kernel Elevation of Privilege Vulnerability."
- Analyse
- https://blog.xpnsec.com/total-meltdown-cve-2018-1038/
- https://www.anquanke.com/post/id/106156
- https://de4dcr0w.github.io/%E6%BC%8F%E6%B4%9E%E5%88%86%E6%9E%90/CVE-2018-1038-TotalMeltdown%E6%BC%8F%E6%B4%9E%E5%88%86%E6%9E%90%E7%9A%84%E4%B8%80%E7%82%B9%E8%AE%B0%E5%BD%95.html
- Exp
- https://gist.github.com/xpn/3792ec34d712425a5c47caf5677de5fe
- https://www.exploit-db.com/exploits/44581
CVE-2018-0886
The Credential Security Support Provider protocol (CredSSP) in Microsoft Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1 and RT 8.1, Windows Server 2012 and R2, Windows 10 Gold, 1511, 1607, 1703, and 1709 Windows Server 2016 and Windows Server, version 1709 allows a remote code execution vulnerability due to how CredSSP validates request during the authentication process, aka "CredSSP Remote Code Execution Vulnerability".
- Analyse
- https://www.anquanke.com/post/id/101158
- Exp
CVE-2018-0824
A remote code execution vulnerability exists in "Microsoft COM for Windows" when it fails to properly handle serialized objects, aka "Microsoft COM for Windows Remote Code Execution Vulnerability." This affects Windows 7, Windows Server 2012 R2, Windows RT 8.1, Windows Server 2008, Windows Server 2012, Windows 8.1, Windows Server 2016, Windows Server 2008 R2, Windows 10, Windows 10 Servers.
- Analyse
- https://codewhitesec.blogspot.com/2018/06/cve-2018-0624.html
- https://www.anquanke.com/post/id/148749
- Exp
- https://www.exploit-db.com/exploits/44906
- https://github.com/codewhitesec/UnmarshalPwn :
2017
CVE-2017-11783
Microsoft Windows 8.1, Windows Server 2012 R2, Windows RT 8.1, Windows 10 Gold, 1511, 1607, and 1703, and Windows Server 2016 allows an elevation of privilege vulnerability in the way it handles calls to Advanced Local Procedure Call (ALPC), aka "Windows Elevation of Privilege Vulnerability".
CVE-2017-8543
Microsoft Windows XP SP3, Windows XP x64 XP2, Windows Server 2003 SP2, Windows Vista, Windows 7 SP1, Windows Server 2008 SP2 and R2 SP1, Windows 8, Windows 8.1 and Windows RT 8.1, Windows Server 2012 and R2, Windows 10 Gold, 1511, 1607, and 1703, and Windows Server 2016 allow an attacker to take control of the affected system when Windows Search fails to handle objects in memory, aka "Windows Search Remote Code Execution Vulnerability".
- Analyse
- https://paper.seebug.org/355/
CVE-2017-8465
Microsoft Windows 8.1 and Windows RT 8.1, Windows Server 2012 R2, Windows 10 Gold, 1511, 1607, and 1703, and Windows Server 2016 allow an attacker to run processes in an elevated context when the Windows kernel improperly handles objects in memory, aka "Win32k Elevation of Privilege Vulnerability." This CVE ID is unique from CVE-2017-8468.
CVE-2017-8464
Windows Shell in Microsoft Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, Windows 10 Gold, 1511, 1607, 1703, and Windows Server 2016 allows local users or remote attackers to execute arbitrary code via a crafted .LNK file, which is not properly handled during icon display in Windows Explorer or any other application that parses the icon of the shortcut. aka "LNK Remote Code Execution Vulnerability."
- Analyse
- https://my.oschina.net/u/4310658/blog/3695267
- https://www.anquanke.com/post/id/202705
- https://wohin.me/0dayan-quan-external-stuxnet-cve-2017-8464/
- https://blog.csdn.net/baidu_41647119/article/details/103875396
- http://www.vxjump.net/files/vuln_analysis/cve-2017-8464.txt
- PoC
- Exp
- https://www.exploit-db.com/exploits/42382/
- https://www.exploit-db.com/exploits/42429/
- https://github.com/Ascotbe/Kernelhub/tree/master/CVE-2017-8464 :
- https://github.com/3gstudent/CVE-2017-8464-EXP :
- https://github.com/Securitykid/CVE-2017-8464-exp-generator :
- https://github.com/xssfile/CVE-2017-8464-EXP :
- https://github.com/X-Vector/usbhijacking :
CVE-2017-7269
Buffer overflow in the ScStoragePathFromUrl function in the WebDAV service in Internet Information Services (IIS) 6.0 in Microsoft Windows Server 2003 R2 allows remote attackers to execute arbitrary code via a long header beginning with "If: <http://" in a PROPFIND request, as exploited in the wild in July or August 2016.
- Analyse
- https://paper.seebug.org/259/
- PoC
- Exp
- https://github.com/zcgonvh/cve-2017-7269 :
- https://github.com/zcgonvh/cve-2017-7269-tool :
- https://github.com/g0rx/iis6-exploit-2017-CVE-2017-7269 :
- https://github.com/eliuha/webdav_exploit :
- https://github.com/Al1ex/CVE-2017-7269 :
- https://github.com/slimpagey/IIS_6.0_WebDAV_Ruby :
- https://github.com/caicai1355/CVE-2017-7269-exploit :
CVE-2017-0290
The Microsoft Malware Protection Engine running on Microsoft Forefront and Microsoft Defender on Microsoft Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, Windows 10 Gold, 1511, 1607, and 1703, and Windows Server 2016 does not properly scan a specially crafted file leading to memory corruption, aka "Microsoft Malware Protection Engine Remote Code Execution Vulnerability."
- Analyse
- https://0patch.blogspot.jp/2017/05/0patching-worst-windows-remote-code.html
- https://www.anquanke.com/post/id/86136
- https://arstechnica.com/information-technology/2017/05/windows-defender-nscript-remote-vulnerability/
- Exp
- https://www.exploit-db.com/exploits/41975/
- https://github.com/homjxi0e/CVE-2017-0290- :
CVE-2017-0263
The kernel-mode drivers in Microsoft Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, Windows 10 Gold, 1511, 1607, 1703, and Windows Server 2016 allow local users to gain privileges via a crafted application, aka "Win32k Elevation of Privilege Vulnerability."
- Analyse
- https://www.anquanke.com/post/id/102377
- https://www.anquanke.com/post/id/102378
- https://xz.aliyun.com/t/9287
- https://50u1w4y.github.io/site/recurrence/CVE-2017-0263/
- PoC
- https://www.exploit-db.com/exploits/44478
CVE-2017-0213
Windows COM Aggregate Marshaler in Microsoft Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, Windows 10 Gold, 1511, 1607, and 1703, and Windows Server 2016 allows an elevation privilege vulnerability when an attacker runs a specially crafted application, aka "Windows COM Elevation of Privilege Vulnerability". This CVE ID is unique from CVE-2017-0214.
- Analyse
- https://cloud.tencent.com/developer/article/1045805
- Exp
- https://www.exploit-db.com/exploits/42020/
- https://github.com/Ascotbe/Kernelhub/tree/master/CVE-2017-0213 :
- https://github.com/zcgonvh/CVE-2017-0213 :
- https://github.com/eonrickity/CVE-2017-0213 :
- https://github.com/jbooz1/CVE-2017-0213 :
- https://github.com/Jos675/CVE-2017-0213-Exploit :
- https://github.com/shaheemirza/CVE-2017-0213- :
CVE-2017-0143 (MS17-010)
The SMBv1 server in Microsoft Windows Vista SP2; Windows Server 2008 SP2 and R2 SP1; Windows 7 SP1; Windows 8.1; Windows Server 2012 Gold and R2; Windows RT 8.1; and Windows 10 Gold, 1511, and 1607; and Windows Server 2016 allows remote attackers to execute arbitrary code via crafted packets, aka "Windows SMB Remote Code Execution Vulnerability." This vulnerability is different from those described in CVE-2017-0143, CVE-2017-0144, CVE-2017-0146, and CVE-2017-0148.
- Analyse
- https://www.anquanke.com/post/id/86270
- github https://github.com/worawit/MS17-010/blob/master/BUG.txt
- https://yi0934.github.io/2019/04/08/CVE%E6%BC%8F%E6%B4%9E%E5%88%86%E6%9E%90/ms17-010/
- https://cy2cs.top/2020/08/22/%E3%80%90owva%E3%80%91%E6%B0%B8%E6%81%92%E4%B9%8B%E8%93%9D%E6%BC%8F%E6%B4%9E%E5%88%86%E6%9E%90/
- https://paper.seebug.org/280/
- PoC
- Exp
- https://github.com/SecWiki/windows-kernel-exploits/tree/master/MS17-010 :
- https://github.com/worawit/MS17-010 :
- https://github.com/Ascotbe/Kernelhub/tree/master/CVE-2017-0143 :
- https://github.com/3ndG4me/AutoBlue-MS17-010 :
- https://github.com/bhassani/EternalBlueC :
- https://github.com/mez-0/MS17-010-Python :
- https://github.com/hanshaze/MS17-010-EternalBlue-WinXP-Win10 :
- https://github.com/povlteksttv/Eternalblue :
- https://github.com/pythonone/MS17-010 :
- https://github.com/d4t4s3c/SMBploit :
- too more on github...
CVE-2017-0101 (MS17-017)
The kernel-mode drivers in Transaction Manager in Microsoft Windows Vista SP2; Windows Server 2008 SP2 and R2; Windows 7 SP1; Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1; Windows 10 Gold, 1511, and 1607; and Windows Server 2016 allow local users to gain privileges via a crafted application, aka "Windows Elevation of Privilege Vulnerability."
- Analyse
- https://paper.seebug.org/586/
- https://bbs.pediy.com/thread-256949.htm
- Exp
- https://www.exploit-db.com/exploits/44479/
- https://github.com/Ascotbe/Kernelhub/tree/master/CVE-2017-0101 :
- https://github.com/kuteminh11/MS17-017-Microsoft-Windows-7-SP1-x86-Privilege-Escalation-Vulnerability :
CVE-2017-0100 (MS17-012)
A DCOM object in Helppane.exe in Microsoft Windows 7 SP1; Windows Server 2008 R2; Windows 8.1; Windows Server 2012 Gold and R2; Windows RT 8.1; Windows 10 Gold, 1511, and 1607; and Windows Server 2016 allows local users to gain privileges via a crafted application, aka "Windows HelpPane Elevation of Privilege Vulnerability."
- Analyse
- https://ha.cker.in/index.php/Article/22608
- Exp
CVE-2017-0005 (MS17-013)
The Graphics Device Interface (GDI) in Microsoft Windows Vista SP2; Windows Server 2008 SP2 and R2 SP1; Windows 7 SP1; Windows 8.1; Windows Server 2012 Gold and R2; Windows RT 8.1; and Windows 10 Gold, 1511, and 1607 allows local users to gain privileges via a crafted application, aka "Windows GDI Elevation of Privilege Vulnerability." This vulnerability is different from those described in CVE-2017-0001, CVE-2017-0025, and CVE-2017-0047.
- Analyse
- https://www.anquanke.com/post/id/86669
- https://www.microsoft.com/security/blog/2017/03/27/detecting-and-mitigating-elevation-of-privilege-exploit-for-cve-2017-0005/?source=mmpc
- PoC
2016
CVE-2016-7255 (MS16-135)
The kernel-mode drivers in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, Windows 10 Gold, 1511, and 1607, and Windows Server 2016 allow local users to gain privileges via a crafted application, aka "Win32k Elevation of Privilege Vulnerability."
- Analyse
- https://www.anquanke.com/post/id/85232
- PoC
- Exp
- https://github.com/SecWiki/windows-kernel-exploits/tree/master/MS16-135 :
- https://github.com/Ascotbe/Kernelhub/tree/master/CVE-2016-7255 :
- https://github.com/heh3/CVE-2016-7255 :
- https://github.com/yuvatia/page-table-exploitation :
- https://github.com/bbolmin/cve-2016-7255_x86_x64 :
- https://github.com/homjxi0e/CVE-2016-7255 :
CVE-2016-3371 (MS16-111)
The kernel API in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, and Windows 10 Gold, 1511, and 1607 does not properly enforce permissions, which allows local users to obtain sensitive information via a crafted application, aka "Windows Kernel Elevation of Privilege Vulnerability."
- Exp
- https://www.exploit-db.com/exploits/40429/
- https://github.com/SecWiki/windows-kernel-exploits/tree/master/MS16-111 :
- https://github.com/Ascotbe/Kernelhub/tree/master/CVE-2016-3371 :
CVE-2016-3308/3309 (MS16-098)
The kernel-mode drivers in Microsoft Windows Vista SP2; Windows Server 2008 SP2 and R2 SP1; Windows 7 SP1; Windows 8.1; Windows Server 2012 Gold and R2; Windows RT 8.1; and Windows 10 Gold, 1511, and 1607 allow local users to gain privileges via a crafted application, aka "Win32k Elevation of Privilege Vulnerability," a different vulnerability than CVE-2016-3309, CVE-2016-3310, and CVE-2016-3311.
- Analyse
- https://paper.seebug.org/37/
- https://xz.aliyun.com/t/4543
- github https://github.com/55-AA/CVE-2016-3308/blob/master/CVE-2016-3308.md
- https://xz.aliyun.com/t/2919
- https://paper.seebug.org/320/
- https://security.tencent.com/index.php/blog/msg/117
- https://www.anquanke.com/post/id/85302
- Exp
CVE-2016-3225 (MS16-075)
The SMB server component in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, and Windows 10 Gold and 1511 allows local users to gain privileges via a crafted application that forwards an authentication request to an unintended service, aka "Windows SMB Server Elevation of Privilege Vulnerability."
- Exp
- https://www.exploit-db.com/exploits/45562/
- https://github.com/SecWiki/windows-kernel-exploits/tree/master/MS16-075 :
- https://github.com/Ascotbe/Kernelhub/tree/master/CVE-2016-3225 :
- https://www.secpulse.com/archives/72798.html
CVE-2016-0099 (MS16-032)
The Secondary Logon Service in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, and Windows 10 Gold and 1511 does not properly process request handles, which allows local users to gain privileges via a crafted application, aka "Secondary Logon Elevation of Privilege Vulnerability."
- Exp
CVE-2016-0095 (MS16-034)
The kernel-mode driver in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, and Windows 10 Gold and 1511 allows local users to gain privileges via a crafted application, aka "Win32k Elevation of Privilege Vulnerability," a different vulnerability than CVE-2016-0093, CVE-2016-0094, and CVE-2016-0096.
- Analyse
- https://xz.aliyun.com/t/6008
- http://weaponx.site/2017/08/11/CVE-2016-0095%E4%BB%8EPoC%E5%88%B0Exploit/
- https://whereisk0shl.top/ssctf_pwn450_windows_kernel_exploitation_writeup.html
- github https://github.com/k0keoyo/SSCTF-pwn450-ms16-034-writeup
- Exp
CVE-2016-0051 (MS16-016)
The WebDAV client in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, and Windows 10 Gold and 1511 allows local users to gain privileges via a crafted application, aka "WebDAV Elevation of Privilege Vulnerability."
- Exp
- https://www.exploit-db.com/exploits/39788/
- https://www.exploit-db.com/exploits/39432/
- https://www.exploit-db.com/exploits/40085/
- https://github.com/SecWiki/windows-kernel-exploits/tree/master/MS16-016 :
- https://github.com/Ascotbe/Kernelhub/tree/master/CVE-2016-0051 :
- https://github.com/koczkatamas/CVE-2016-0051 :
- https://github.com/hexx0r/CVE-2016-0051 :
CVE-2016-0041 (MS16-014)
Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, Windows 10 Gold and 1511, and Internet Explorer 10 and 11 mishandle DLL loading, which allows local users to gain privileges via a crafted application, aka "DLL Loading Remote Code Execution Vulnerability."
- Exp
2015
CVE-2015-2546 (MS15-097)
The kernel-mode driver in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT Gold and 8.1, and Windows 10 allows local users to gain privileges via a crafted application, aka "Win32k Memory Corruption Elevation of Privilege Vulnerability," a different vulnerability than CVE-2015-2511, CVE-2015-2517, and CVE-2015-2518.
- Analyse
- http://drops.xmd5.com/static/drops/papers-9276.html
- https://bbs.pediy.com/thread-263673.htm
- Exp
CVE-2015-2387 (MS15-077)
ATMFD.DLL in the Adobe Type Manager Font Driver in Microsoft Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, and Windows RT Gold and 8.1 allows local users to gain privileges via a crafted application, aka "ATMFD.DLL Memory Corruption Vulnerability."
- Exp
- https://www.exploit-db.com/exploits/37098/
- https://github.com/SecWiki/windows-kernel-exploits/tree/master/MS15-077 :
- https://github.com/Ascotbe/Kernelhub/tree/master/CVE-2015-2387 :
CVE-2015-2370 (MS15-076)
The authentication implementation in the RPC subsystem in Microsoft Windows Server 2003 SP2 and R2 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, and Windows RT Gold and 8.1 does not prevent DCE/RPC connection reflection, which allows local users to gain privileges via a crafted application, aka "Windows RPC Elevation of Privilege Vulnerability."
- Analyse
- http://bobao.360.cn/learning/detail/584.html
- https://blog.csdn.net/oShuangYue12/article/details/84677607
- Exp
CVE-2015-1726 (MS15-061)
Use-after-free vulnerability in the kernel-mode drivers in Microsoft Windows Server 2003 SP2 and R2 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, and Windows RT Gold and 8.1 allows local users to gain privileges via a crafted application, aka "Microsoft Windows Kernel Brush Object Use After Free Vulnerability."
- Analyse
- github https://github.com/LibreCrops/translation-zh_CN/blob/master/source/ms-15-061.rst
- https://translation-zh-cn.readthedocs.io/zh_CN/latest/ms-15-061.html
- Exp
CVE-2015-1701 (MS15-051)
Win32k.sys in the kernel-mode drivers in Microsoft Windows Server 2003 SP2, Vista SP2, and Server 2008 SP2 allows local users to gain privileges via a crafted application, as exploited in the wild in April 2015, aka "Win32k Elevation of Privilege Vulnerability."
- Exp
CVE-2015-0062 (MS15-015)
Microsoft Windows Server 2008 R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, and Windows RT Gold and 8.1 allow local users to gain privileges via a crafted application that leverages incorrect impersonation handling in a process that uses the SeAssignPrimaryTokenPrivilege privilege, aka "Windows Create Process Elevation of Privilege Vulnerability."
- Exp
CVE-2015-0057 (MS15-010)
win32k.sys in the kernel-mode drivers in Microsoft Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, and Windows RT Gold and 8.1 allows local users to gain privileges via a crafted application, aka "Win32k Elevation of Privilege Vulnerability."
- Analyse
- https://xz.aliyun.com/t/4549
- https://paper.seebug.org/1439/
- https://www.anquanke.com/post/id/163973
- https://blog.csdn.net/qq_35713009/article/details/102921859
- PoC
- https://www.exploit-db.com/exploits/39035
- Exp
- https://www.exploit-db.com/exploits/37098
- https://github.com/Ascotbe/Kernelhub/tree/master/CVE-2015-0057 :
- https://github.com/55-AA/CVE-2015-0057 :
CVE-2015-0003 (MS15-010)
win32k.sys in the kernel-mode drivers in Microsoft Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, and Windows RT Gold and 8.1 allows local users to gain privileges or cause a denial of service (NULL pointer dereference) via a crafted application, aka "Win32k Elevation of Privilege Vulnerability."
- Analyse
- https://www.shuzhiduo.com/A/Vx5M1WrL5N/
- https://www.cnblogs.com/flycat-2016/p/5452929.html
- https://www.fireeye.com/blog/threat-research/2015/07/dyre_banking_trojan.html
- Exp
CVE-2015-0002 (MS15-001)
The AhcVerifyAdminContext function in ahcache.sys in the Application Compatibility component in Microsoft Windows 7 SP1, Windows Server 2008 R2 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, and Windows RT Gold and 8.1 does not verify that an impersonation token is associated with an administrative account, which allows local users to gain privileges by running AppCompatCache.exe with a crafted DLL file, aka MSRC ID 20544 or "Microsoft Application Compatibility Infrastructure Elevation of Privilege Vulnerability."
- Analyse
- https://googleprojectzero.blogspot.com/2015/02/a-tokens-tale_9.html
- http://www.vuln.cn/6702
- Exp
2014
CVE-2014-6324 (MS14-068)
The Kerberos Key Distribution Center (KDC) in Microsoft Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, and Windows Server 2012 Gold and R2 allows remote authenticated domain users to obtain domain administrator privileges via a forged signature in a ticket, as exploited in the wild in November 2014, aka "Kerberos Checksum Vulnerability."
- Analyse
- https://naykcin.top/2020/01/12/ms14068/
- https://www.cnblogs.com/feizianquan/p/11760564.html
- Exp
CVE-2014-6321 (MS14-066)
Schannel in Microsoft Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, and Windows RT Gold and 8.1 allows remote attackers to execute arbitrary code via crafted packets, aka "Microsoft Schannel Remote Code Execution Vulnerability."
- Analyse
- http://bobao.360.cn/learning/detail/114.html
- https://wooyun.js.org/drops/CVE-2014-6321%20schannel%E5%A0%86%E6%BA%A2%E5%87%BA%E6%BC%8F%E6%B4%9E%E5%88%86%E6%9E%90.html
- https://www.freebuf.com/vuls/52110.html
- Exp
CVE-2014-4113 (MS14-058)
win32k.sys in the kernel-mode drivers in Microsoft Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, and Windows RT Gold and 8.1 allows local users to gain privileges via a crafted application, as exploited in the wild in October 2014, aka "Win32k.sys Elevation of Privilege Vulnerability."
- Analyse
- https://xz.aliyun.com/t/4456
- https://b2ahex.github.io/blog/2017/06/13/4113%E5%88%86%E6%9E%90/index.html
- https://www.anquanke.com/post/id/84477
- https://bbs.pediy.com/thread-198194.htm
- https://wooyun.js.org/drops/CVE-2014-4113%E6%BC%8F%E6%B4%9E%E5%88%A9%E7%94%A8%E8%BF%87%E7%A8%8B%E5%88%86%E6%9E%90.html
- http://www.netfairy.net/?post=209
- Exp
CVE-2014-4076 (MS14-070)
Microsoft Windows Server 2003 SP2 allows local users to gain privileges via a crafted IOCTL call to (1) tcpip.sys or (2) tcpip6.sys, aka "TCP/IP Elevation of Privilege Vulnerability."
- Analyse
- https://bbs.pediy.com/thread-198600.htm
- Exp
CVE-2014-1767 (MS14-040)
Double free vulnerability in the Ancillary Function Driver (AFD) in afd.sys in the kernel-mode drivers in Microsoft Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, and Windows RT Gold and 8.1 allows local users to gain privileges via a crafted application, aka "Ancillary Function Driver Elevation of Privilege Vulnerability."
- Analyse
- https://xz.aliyun.com/t/6770
- https://www.bbsmax.com/A/E35p6R28zv/
- Exp
- https://www.exploit-db.com/exploits/39446/
- https://www.exploit-db.com/exploits/39525/
- https://github.com/SecWiki/windows-kernel-exploits/tree/master/MS14-040 :
- https://github.com/Ascotbe/Kernelhub/tree/master/CVE-2014-1767 :
2013
CVE-2013-5065 (MS14-002)
NDProxy.sys in the kernel in Microsoft Windows XP SP2 and SP3 and Server 2003 SP2 allows local users to gain privileges via a crafted application, as exploited in the wild in November 2013.
- Analyse
- https://bbs.pediy.com/thread-182135.htm
- Exp
- https://www.exploit-db.com/exploits/37732/
- https://github.com/dev-zzo/exploits-nt-privesc/tree/master/MS14-002 :
- https://github.com/Friarfukd/RobbinHood :
CVE-2013-1345 (MS13-053)
win32k.sys in the kernel-mode drivers in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows Server 2012, and Windows RT does not properly handle objects in memory, which allows local users to gain privileges via a crafted application, aka "Win32k Vulnerability."
- Exp
CVE-2013-1332 (MS13-046)
dxgkrnl.sys (aka the DirectX graphics kernel subsystem) in the kernel-mode drivers in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows Server 2012, and Windows RT does not properly handle objects in memory, which allows local users to gain privileges via a crafted application, aka "DirectX Graphics Kernel Subsystem Double Fetch Vulnerability."
- Analyse
- https://www.anquanke.com/vul/id/1045064
- http://www.91ri.org/6708.html
- Exp
CVE-2013-1300 (MS13-053)
win32k.sys in the kernel-mode drivers in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows Server 2012, and Windows RT does not properly handle objects in memory, which allows local users to gain privileges via a crafted application, aka "Win32k Memory Allocation Vulnerability."
- Analyse
- https://labs.mwrinfosecurity.com/blog/2013/09/06/mwr-labs-pwn2own-2013-write-up---kernel-exploit/
- Exp
CVE-2013-0008 (MS13-005)
win32k.sys in the kernel-mode drivers in Microsoft Windows Vista SP2, Windows Server 2008 SP2, R2, and R2 SP1, Windows 7 Gold and SP1, Windows 8, Windows Server 2012, and Windows RT does not properly handle window broadcast messages, which allows local users to gain privileges via a crafted application, aka "Win32k Improper Message Handling Vulnerability."
- Exp
2012
CVE-2012-0217 (MS12-042)
The x86-64 kernel system-call functionality in Xen 4.1.2 and earlier, as used in Citrix XenServer 6.0.2 and earlier and other products; Oracle Solaris 11 and earlier; illumos before r13724; Joyent SmartOS before 20120614T184600Z; FreeBSD before 9.0-RELEASE-p3; NetBSD 6.0 Beta and earlier; Microsoft Windows Server 2008 R2 and R2 SP1 and Windows 7 Gold and SP1; and possibly other operating systems, when running on an Intel processor, incorrectly uses the sysret path in cases where a certain address is not a canonical address, which allows local users to gain privileges via a crafted application. NOTE: because this issue is due to incorrect use of the Intel specification, it should have been split into separate identifiers; however, there was some value in preserving the original mapping of the multi-codebase coordinated-disclosure effort to a single identifier.
- Exp
CVE-2012-0152 (MS12-020)
The Remote Desktop Protocol (RDP) service in Microsoft Windows Server 2008 R2 and R2 SP1 and Windows 7 Gold and SP1 allows remote attackers to cause a denial of service (application hang) via a series of crafted packets, aka "Terminal Server Denial of Service Vulnerability."
- Exp
CVE-2012-0002 (MS12-020)
The Remote Desktop Protocol (RDP) implementation in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2, R2, and R2 SP1, and Windows 7 Gold and SP1 does not properly process packets in memory, which allows remote attackers to execute arbitrary code by sending crafted RDP packets triggering access to an object that (1) was not properly initialized or (2) is deleted, aka "Remote Desktop Protocol Vulnerability."
2011
CVE-2011-2005 (MS11-080)
afd.sys in the Ancillary Function Driver in Microsoft Windows XP SP2 and SP3 and Server 2003 SP2 does not properly validate user-mode input passed to kernel mode, which allows local users to gain privileges via a crafted application, aka "Ancillary Function Driver Elevation of Privilege Vulnerability."
- Analyse
- http://qq53.github.io/1500623869.html
- Exp
CVE-2011-1974 (MS11-062)
NDISTAPI.sys in the NDISTAPI driver in Remote Access Service (RAS) in Microsoft Windows XP SP2 and SP3 and Windows Server 2003 SP2 does not properly validate user-mode input, which allows local users to gain privileges via a crafted application, aka "NDISTAPI Elevation of Privilege Vulnerability."
- Exp
CVE-2011-1249 (MS11-046)
The Ancillary Function Driver (AFD) in afd.sys in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP1 and SP2, Windows Server 2008 Gold, SP2, R2, and R2 SP1, and Windows 7 Gold and SP1 does not properly validate user-mode input, which allows local users to gain privileges via a crafted application, aka "Ancillary Function Driver Elevation of Privilege Vulnerability."
- Analyse
- github https://github.com/Madusanka99/OHTS/blob/master/IT16075504%20-OHTS%20Report.pdf
- Exp
CVE-2011-1237 (MS11-034)
Use-after-free vulnerability in win32k.sys in the kernel-mode drivers in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP1 and SP2, Windows Server 2008 Gold, SP2, R2, and R2 SP1, and Windows 7 Gold and SP1 allows local users to gain privileges via a crafted application that leverages incorrect driver object management, a different vulnerability than other "Vulnerability Type 1" CVEs listed in MS11-034, aka "Win32k Use After Free Vulnerability."
- Analyse
- https://lse.epita.fr/lse-summer-week-2013/slides/lse-summer-week-2013-26-Bruno%20Pujos-A%20Look%20into%20the%20Windows%20Kernel.pdf
- Exp
CVE-2011-0045 (MS11-011)
The Trace Events functionality in the kernel in Microsoft Windows XP SP3 does not properly perform type conversion, which causes integer truncation and insufficient memory allocation and triggers a buffer overflow, which allows local users to gain privileges via a crafted application, related to WmiTraceMessageVa, aka "Windows Kernel Integer Truncation Vulnerability."
- Analyse
- https://blog.csdn.net/QEver/article/details/6227415
- https://www.geek-share.com/detail/2510409740.html
- https://bbs.pediy.com/thread-130487.htm
- Exp
2010
CVE-2010-3338 (MS10-092)
The Windows Task Scheduler in Microsoft Windows Vista SP1 and SP2, Windows Server 2008 Gold, SP2, and R2, and Windows 7 does not properly determine the security context of scheduled tasks, which allows local users to gain privileges via a crafted application, aka "Task Scheduler Vulnerability." NOTE: this might overlap CVE-2010-3888.
- Exp
CVE-2010-2730 (MS10-065)
Buffer overflow in Microsoft Internet Information Services (IIS) 7.5, when FastCGI is enabled, allows remote attackers to execute arbitrary code via crafted headers in a request, aka "Request Header Buffer Overflow Vulnerability."
- Analyse
- https://blog.51cto.com/gnaw0725/1635204
- https://www.youtube.com/watch?v=23Mtx1F_CM0
- Exp
CVE-2010-2554 (MS10-059)
The Tracing Feature for Services in Microsoft Windows Vista SP1 and SP2, Windows Server 2008 Gold, SP2, and R2, and Windows 7 has incorrect ACLs on its registry keys, which allows local users to gain privileges via vectors involving a named pipe and impersonation, aka "Tracing Registry Key ACL Vulnerability."
CVE-2010-1897 (MS10-048)
The Windows kernel-mode drivers in win32k.sys in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP1 and SP2, Windows Server 2008 Gold, SP2, and R2, and Windows 7 do not properly validate pseudo-handle values in callback parameters during window creation, which allows local users to gain privileges via a crafted application, aka "Win32k Window Creation Vulnerability."
CVE-2010-1887 (MS10-048)
The Windows kernel-mode drivers in win32k.sys in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP1 and SP2, Windows Server 2008 Gold, SP2, and R2, and Windows 7 do not properly validate an unspecified system-call argument, which allows local users to cause a denial of service (system hang) via a crafted application, aka "Win32k Bounds Checking Vulnerability."
CVE-2010-0270 (MS10-020)
he SMB client in Microsoft Windows Server 2008 R2 and Windows 7 does not properly validate fields in SMB transaction responses, which allows remote SMB servers and man-in-the-middle attackers to execute arbitrary code or cause a denial of service (memory corruption and reboot) via a crafted (1) SMBv1 or (2) SMBv2 response, aka "SMB Client Transaction Vulnerability."
- Exp
CVE-2010-0233 (MS10-015)
Double free vulnerability in the kernel in Microsoft Windows 2000 SP4, XP SP2 and SP3, Server 2003 SP2, Vista Gold, SP1, and SP2, and Server 2008 Gold and SP2 allows local users to gain privileges via a crafted application, aka "Windows Kernel Double Free Vulnerability."
- Exp
CVE-2010-0020 (MS10-012)
The SMB implementation in the Server service in Microsoft Windows 2000 SP4, Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista Gold, SP1, and SP2, Windows Server 2008 Gold, SP2, and R2, and Windows 7 does not properly validate request fields, which allows remote authenticated users to execute arbitrary code via a malformed request, aka "SMB Pathname Overflow Vulnerability."
2009
CVE-2009-2532 (MS09-050)
Microsoft Windows Vista Gold, SP1, and SP2, Windows Server 2008 Gold and SP2, and Windows 7 RC do not properly process the command value in an SMB Multi-Protocol Negotiate Request packet, which allows remote attackers to execute arbitrary code via a crafted SMBv2 packet to the Server service, aka "SMBv2 Command Value Vulnerability."
- Analyse
- https://www.giantbranch.cn/2017/08/26/Educatedscholar%E5%88%A9%E7%94%A8%E7%9A%84%E6%BC%8F%E6%B4%9Ems09-050%E5%88%86%E6%9E%90%E5%8F%8A%E5%85%B6%E5%88%A9%E7%94%A8%E7%9A%84shellcode%E5%88%86%E6%9E%90%E5%8F%8A%E4%B8%8Emsf%E5%88%A9%E7%94%A8%E5%AF%B9%E6%AF%94/
- https://zhuanlan.zhihu.com/p/27155431
- Exp
CVE-2009-1535 (MS09-020)
The WebDAV extension in Microsoft Internet Information Services (IIS) 5.1 and 6.0 allows remote attackers to bypass URI-based protection mechanisms, and list folders or read, create, or modify files, via a %c0%af (Unicode / character) at an arbitrary position in the URI, as demonstrated by inserting %c0%af into a "/protected/" initial pathname component to bypass the password protection on the protected\ folder, aka "IIS 5.1 and 6.0 WebDAV Authentication Bypass Vulnerability," a different vulnerability than CVE-2009-1122.
- Analyse
- https://www.twblogs.net/a/5b96d7fd2b717750bda69ce9
- Exp
CVE-2009-0229 (MS09-022)
The Windows Printing Service in Microsoft Windows 2000 SP4, XP SP2 and SP3, Server 2003 SP2, Vista Gold, SP1, and SP2, and Server 2008 SP2 allows local users to read arbitrary files via a crafted separator page, aka "Print Spooler Read File Vulnerability."
CVE-2009-0079 (MS09-012)
The RPCSS service in Microsoft Windows XP SP2 and SP3 and Server 2003 SP1 and SP2 does not properly implement isolation among a set of distinct processes that (1) all run under the NetworkService account or (2) all run under the LocalService account, which allows local users to gain privileges by accessing the resources of one of the processes, aka "Windows RPCSS Service Isolation Vulnerability."
- Analyse
- https://xz.aliyun.com/t/8091
- Exp
2008
CVE-2008-4250 (MS08-067)
The Server service in Microsoft Windows 2000 SP4, XP SP2 and SP3, Server 2003 SP1 and SP2, Vista Gold and SP1, Server 2008, and 7 Pre-Beta allows remote attackers to execute arbitrary code via a crafted RPC request that triggers the overflow during path canonicalization, as exploited in the wild by Gimmiv.A in October 2008, aka "Server Service Vulnerability."
- Analyse
- https://bbs.pediy.com/thread-251219.htm
- https://www.jianshu.com/p/d086eb1ab0a6
- Exp
CVE-2008-4037 (MS08-068)
Microsoft Windows 2000 Gold through SP4, XP Gold through SP3, Server 2003 SP1 and SP2, Vista Gold and SP1, and Server 2008 allows remote SMB servers to execute arbitrary code on a client machine by replaying the NTLM credentials of a client user, as demonstrated by backrush, aka "SMB Credential Reflection Vulnerability." NOTE: some reliable sources report that this vulnerability exists because of an insufficient fix for CVE-2000-0834.
- Exp
CVE-2008-3464 (MS08-066)
afd.sys in the Ancillary Function Driver (AFD) component in Microsoft Windows XP SP2 and SP3 and Windows Server 2003 SP1 and SP2 does not properly validate input sent from user mode to the kernel, which allows local users to gain privileges via a crafted application, as demonstrated using crafted pointers and lengths that bypass intended ProbeForRead and ProbeForWrite restrictions, aka "AFD Kernel Overwrite Vulnerability."
- Analyse
- https://bbs.pediy.com/thread-74811.htm
- Exp
CVE-2008-1084 (MS08-025)
Unspecified vulnerability in the kernel in Microsoft Windows 2000 SP4, XP SP2, Server 2003 SP1 and SP2, through Vista SP1, and Server 2008 allows local users to execute arbitrary code via unknown vectors related to improper input validation. NOTE: it was later reported that one affected function is NtUserFnOUTSTRING in win32k.sys.
- Analyse
- github https://github.com/lyshark/Windows-exploits/blob/master/Windows%20%E5%86%85%E6%A0%B8%E6%BC%8F%E6%B4%9E%20ms08025%20%E5%88%86%E6%9E%90.7z
- https://bbs.pediy.com/thread-63099.htm
- Exp
2007
CVE-2007-0843
The ReadDirectoryChangesW API function on Microsoft Windows 2000, XP, Server 2003, and Vista does not check permissions for child objects, which allows local users to bypass permissions by opening a directory with LIST (READ) access and using ReadDirectoryChangesW to monitor changes of files that do not have LIST permissions, which can be leveraged to determine filenames, access times, and other sensitive information.
CVE-2007-0038
Stack-based buffer overflow in the animated cursor code in Microsoft Windows 2000 SP4 through Vista allows remote attackers to execute arbitrary code or cause a denial of service (persistent reboot) via a large length value in the second (or later) anih block of a RIFF .ANI, cur, or .ico file, which results in memory corruption when processing cursors, animated cursors, and icons, a variant of CVE-2005-0416, as originally demonstrated using Internet Explorer 6 and 7. NOTE: this might be a duplicate of CVE-2007-1765; if so, then CVE-2007-0038 should be preferred.
2006
CVE-2006-3439 (MS06-040)
Buffer overflow in the Server Service in Microsoft Windows 2000 SP4, XP SP1 and SP2, and Server 2003 SP1 allows remote attackers, including anonymous users, to execute arbitrary code via a crafted RPC message, a different vulnerability than CVE-2006-1314.
- Analyse
- http://www.atomsec.org/%E5%AE%89%E5%85%A8/ms06-040cve-2006-3439%E9%9D%99%E6%80%81%E5%88%86%E6%9E%90/
- https://bbs.pediy.com/thread-266157.htm
- Exp
2005
CVE-2005-1983 (MS05-039)
Stack-based buffer overflow in the Plug and Play (PnP) service for Microsoft Windows 2000 and Windows XP Service Pack 1 allows remote attackers to execute arbitrary code via a crafted packet, and local users to gain privileges via a malicious application, as exploited by the Zotob (aka Mytob) worm.
-
Analyse
- https://blog.csdn.net/tomqq/article/details/1951128
-
Exp
2003
CVE-2003-0352 (MS03-026)
Buffer overflow in a certain DCOM interface for RPC in Microsoft Windows NT 4.0, 2000, XP, and Server 2003 allows remote attackers to execute arbitrary code via a malformed message, as exploited by the Blaster/MSblast/LovSAN and Nachi/Welchia worms.
- Analyse
- https://blog.51cto.com/executer/2174779
- Exp
2000
CVE-2000-0979
File and Print Sharing service in Windows 95, Windows 98, and Windows Me does not properly check the password for a file share, which allows remote attackers to bypass share access controls by sending a 1-byte password that matches the first character of the real password, aka the "Share Level Password" vulnerability.