Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2018-8120 PoC — Microsoft Windows 权限许可和访问控制问题漏洞

Source
Associated Vulnerability
Title:Microsoft Windows 权限许可和访问控制问题漏洞 (CVE-2018-8120)
Description:Microsoft Windows 7 SP1、Windows Server 2008 SP2和Windows Server 2008 R2 SP1都是美国微软(Microsoft)公司的产品。Microsoft Windows 7 SP1是一套供个人电脑使用的操作系统;Windows Server 2008 SP2是一套服务器操作系统。R2 SP1是它的升级版。 Microsoft Windows中存在提权漏洞,该漏洞源于Win32k组件没有正确的处理内存中的对象。攻击者可利用该漏洞在内核模式下以提升的
Description
dd
File Snapshot

[4.0K] /data/pocs/6633795027f2d2454938bee941300179810ad3a7 ├── [4.0K] CVE-2018-8120 │   ├── [9.5K] backup.cpp │   ├── [7.0K] CVE-2018-8120.vcxproj │   ├── [1.0K] CVE-2018-8120.vcxproj.filters │   ├── [4.0K] Debug │   │   ├── [ 874] CVE-2018-8120.Build.CppClean.log │   │   ├── [ 16K] CVE-2018-8120.log │   │   ├── [4.0K] CVE-2018-8120.tlog │   │   │   ├── [ 644] CL.command.1.tlog │   │   │   ├── [ 20K] CL.read.1.tlog │   │   │   ├── [ 464] CL.write.1.tlog │   │   │   ├── [ 195] CVE-2018-8120.lastbuildstate │   │   │   ├── [ 2] link.command.1.tlog │   │   │   ├── [ 2] link-cvtres.read.1.tlog │   │   │   ├── [ 2] link-cvtres.write.1.tlog │   │   │   ├── [ 2] link-rc.read.1.tlog │   │   │   ├── [ 2] link-rc.write.1.tlog │   │   │   ├── [ 2] link.read.1.tlog │   │   │   ├── [ 2] link.write.1.tlog │   │   │   └── [ 0] unsuccessfulbuild │   │   ├── [ 49K] exploit.obj │   │   ├── [523K] vc140.idb │   │   └── [156K] vc140.pdb │   ├── [9.4K] exploit.cpp │   ├── [6.2K] exploit.h │   └── [4.0K] Release │   ├── [ 15K] CVE-2018-8120.log │   ├── [4.0K] CVE-2018-8120.tlog │   │   ├── [ 664] CL.command.1.tlog │   │   ├── [ 20K] CL.read.1.tlog │   │   ├── [ 356] CL.write.1.tlog │   │   ├── [ 197] CVE-2018-8120.lastbuildstate │   │   ├── [1.2K] link.command.1.tlog │   │   ├── [2.8K] link.read.1.tlog │   │   └── [ 564] link.write.1.tlog │   ├── [168K] exploit.obj │   └── [140K] vc140.pdb ├── [ 12K] CVE-2018-8120.md └── [1.3K] CVE-2018-8120.sln 5 directories, 34 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.