### [CVE-2017-0005](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-0005) ![](https://img.shields.io/static/v1?label=Product&message=Windows%20GDI&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Vulnerability&message=Elevation%20of%20Privilege&color=brighgreen) ### Description The Graphics Device Interface (GDI) in Microsoft Windows Vista SP2; Windows Server 2008 SP2 and R2 SP1; Windows 7 SP1; Windows 8.1; Windows Server 2012 Gold and R2; Windows RT 8.1; and Windows 10 Gold, 1511, and 1607 allows local users to gain privileges via a crafted application, aka "Windows GDI Elevation of Privilege Vulnerability." This vulnerability is different from those described in CVE-2017-0001, CVE-2017-0025, and CVE-2017-0047. ### POC #### Reference No PoCs from references. #### Github - https://github.com/0xT11/CVE-POC - https://github.com/0xcyberpj/windows-exploitation - https://github.com/0xpetros/windows-privilage-escalation - https://github.com/Ascotbe/Kernelhub - https://github.com/Cruxer8Mech/Idk - https://github.com/FULLSHADE/WindowsExploitationResources - https://github.com/MustafaNafizDurukan/WindowsKernelExploitationResources - https://github.com/NitroA/windowsexpoitationresources - https://github.com/NullArray/WinKernel-Resources - https://github.com/Ondrik8/exploit - https://github.com/Ostorlab/KEV - https://github.com/Ostorlab/known_exploited_vulnerbilities_detectors - https://github.com/TamilHackz/windows-exploitation - https://github.com/TheNilesh/nvd-cvedetails-api - https://github.com/conceptofproof/Kernel_Exploitation_Resources - https://github.com/omeround3/veach-remote-db - https://github.com/sheri31/0005poc - https://github.com/ycdxsb/WindowsPrivilegeEscalation