Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2019-0859 PoC — Microsoft Windows win32k 权限许可和访问控制问题漏洞

Source
Associated Vulnerability
Title:Microsoft Windows win32k 权限许可和访问控制问题漏洞 (CVE-2019-0859)
Description:Microsoft Windows和Microsoft Windows Server都是美国微软(Microsoft)公司的产品。Microsoft Windows是一套个人设备使用的操作系统。Microsoft Windows Server是一套服务器操作系统。win32k是其中的一个Windows子系统的内核部分,是一个内核模式设备驱动程序,它包含有窗口管理器、后台控制窗口和屏幕输出管理等。 Microsoft win32k中存在提权漏洞,该漏洞源于网络系统或产品缺乏有效的权限许可和访问控制措施。以下
Description
CVE-2019-0859 1day Exploit
Readme
# CVE-2019-0859-1day-Exploit
CVE-2019-0859 1day Exploit

Target OS : Windows 7 x64 ServicePack1 (7601)

![image](https://user-images.githubusercontent.com/8948193/59811665-e1183f80-9345-11e9-9cc5-de2375ea4761.png)

This exploit need to enviroment that is updated with 2019 March security update. Previous update didn't check currently.


exploit relible isn't 100%. Sometime exploit didn't work perfecty. Then you try again...
File Snapshot

[4.0K] /data/pocs/0b65d500785e17684d4ccde230613c90eb7883ad ├── [2.6M] CVE-2019-0859 1day Exploit.pdf ├── [4.0K] exp │   ├── [4.0K] exp │   │   ├── [ 38K] exp.cpp │   │   ├── [5.2K] exp.h │   │   ├── [8.6K] exp.vcxproj │   │   ├── [1.5K] exp.vcxproj.filters │   │   ├── [ 162] exp.vcxproj.user │   │   ├── [ 380] stdafx.cpp │   │   ├── [ 450] stdafx.h │   │   ├── [ 142] syscall_x64.asm │   │   ├── [ 629] syscall_x64.h │   │   └── [ 452] targetver.h │   └── [1.4K] exp.sln └── [ 427] README.md 2 directories, 13 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.