Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2018-8120 PoC — Microsoft Windows 权限许可和访问控制问题漏洞

Source
Associated Vulnerability
Title:Microsoft Windows 权限许可和访问控制问题漏洞 (CVE-2018-8120)
Description:Microsoft Windows 7 SP1、Windows Server 2008 SP2和Windows Server 2008 R2 SP1都是美国微软(Microsoft)公司的产品。Microsoft Windows 7 SP1是一套供个人电脑使用的操作系统;Windows Server 2008 SP2是一套服务器操作系统。R2 SP1是它的升级版。 Microsoft Windows中存在提权漏洞,该漏洞源于Win32k组件没有正确的处理内存中的对象。攻击者可利用该漏洞在内核模式下以提升的
Readme
# CVE-2018-8120

win7 x64

![test](https://github.com/lqy130048/cve-2018-8120/blob/master/test.jpg)


# Reference

* https://github.com/unamer/CVE-2018-8120

* https://github.com/FuzzySecurity/PSKernel-Primitives
File Snapshot

[4.0K] /data/pocs/c107ad35867d0de1812d9db5eb5fb3951e5ea21a ├── [4.0K] bindiff │   ├── [263K] combined_NtUserSetImeInfoEx vs NtUserSetImeInfoEx.png │   ├── [174K] primary_NtUserSetImeInfoEx vs NtUserSetImeInfoEx.png │   ├── [169K] secondary_NtUserSetImeInfoEx vs NtUserSetImeInfoEx.png │   ├── [3.1M] win32k_0410.sys │   └── [3.0M] win32k.sys ├── [ 29K] CVE-2018-8120.ps1 ├── [ 213] README.md └── [ 19K] test.jpg 1 directory, 8 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.