Logo
Explore Help
Sign In
CalvinBackup/CVEs-PoC
1
0
Fork 0
You've already forked CVEs-PoC
mirror of https://github.com/0xMarcio/cve.git synced 2026-03-11 21:16:09 +00:00
Code Issues Packages Projects Releases Wiki Activity
Files
398163bfe0bfbb3e810dfa827da06aac249b60f2
CVEs-PoC/2017/CVE-2017-0263.md
0xMarcio 48a00929ac Removed duplicates
2024-06-18 02:51:15 +02:00

1.4 KiB
Raw Blame History

CVE-2017-0263

Description

The kernel-mode drivers in Microsoft Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, Windows 10 Gold, 1511, 1607, 1703, and Windows Server 2016 allow local users to gain privileges via a crafted application, aka "Win32k Elevation of Privilege Vulnerability."

POC

Reference

  • https://www.exploit-db.com/exploits/44478/
  • https://xiaodaozhi.com/exploit/117.html

Github

  • https://github.com/ARPSyndicate/cvemon
  • https://github.com/Ascotbe/Kernelhub
  • https://github.com/Cruxer8Mech/Idk
  • https://github.com/LegendSaber/exp
  • https://github.com/Ostorlab/KEV
  • https://github.com/Ostorlab/known_exploited_vulnerbilities_detectors
  • https://github.com/R06otMD5/cve-2017-0263-poc
  • https://github.com/cnhouzi/APTNotes
  • https://github.com/jqsl2012/TopNews
  • https://github.com/leeqwind/HolicPOC
  • https://github.com/lnick2023/nicenice
  • https://github.com/qazbnm456/awesome-cve-poc
  • https://github.com/xbl3/awesome-cve-poc_qazbnm456
  • https://github.com/ycdxsb/WindowsPrivilegeEscalation
Reference in New Issue View Git Blame Copy Permalink
Powered by Gitea Version: 1.25.4 Page: 2398ms Template: 103ms
English
Bahasa Indonesia Deutsch English Español Français Gaeilge Italiano Latviešu Magyar nyelv Nederlands Polski Português de Portugal Português do Brasil Suomi Svenska Türkçe Čeština Ελληνικά Български Русский Українська فارسی മലയാളം 日本語 简体中文 繁體中文(台灣) 繁體中文(香港) 한국어
Licenses API