Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2018-8120 PoC — Microsoft Windows 权限许可和访问控制问题漏洞

Source
Associated Vulnerability
Title:Microsoft Windows 权限许可和访问控制问题漏洞 (CVE-2018-8120)
Description:Microsoft Windows 7 SP1、Windows Server 2008 SP2和Windows Server 2008 R2 SP1都是美国微软(Microsoft)公司的产品。Microsoft Windows 7 SP1是一套供个人电脑使用的操作系统;Windows Server 2008 SP2是一套服务器操作系统。R2 SP1是它的升级版。 Microsoft Windows中存在提权漏洞,该漏洞源于Win32k组件没有正确的处理内存中的对象。攻击者可利用该漏洞在内核模式下以提升的
Description
This CVE-2018-8120 File
File Snapshot

[4.0K] /data/pocs/ee9d445c70037850d1dacdcf1adaa636b5495745 ├── [4.0K] CVE-2018-8120 │   └── [4.0K] Project1 │   ├── [4.0K] Debug │   │   ├── [426K] Project1.exe │   │   ├── [1.9M] Project1.ilk │   │   └── [5.2M] Project1.pdb │   ├── [4.0K] Project1 │   │   ├── [4.0K] Debug │   │   │   ├── [ 913] Project1.Build.CppClean.log │   │   │   ├── [ 266] Project1.exe.recipe │   │   │   ├── [ 911] Project1.log │   │   │   ├── [4.0K] Project1.tlog │   │   │   │   ├── [ 738] CL.command.1.tlog │   │   │   │   ├── [ 39K] CL.read.1.tlog │   │   │   │   ├── [ 532] CL.write.1.tlog │   │   │   │   ├── [1.2K] link.command.1.tlog │   │   │   │   ├── [3.3K] link.read.1.tlog │   │   │   │   ├── [ 510] link.write.1.tlog │   │   │   │   └── [ 171] Project1.lastbuildstate │   │   │   ├── [ 0] Project1.vcxproj.FileListAbsolute.txt │   │   │   ├── [ 66K] test.obj │   │   │   ├── [355K] vc142.idb │   │   │   └── [380K] vc142.pdb │   │   ├── [7.1K] Project1.vcxproj │   │   ├── [1.0K] Project1.vcxproj.filters │   │   ├── [ 165] Project1.vcxproj.user │   │   ├── [ 18] test.cpp │   │   └── [9.5K] test.h │   └── [1.4K] Project1.sln ├── [4.0K] CVE-2018-8120-POC │   └── [ 18] CVE-2018-8120-POC.cpp └── [4.0K] ida ├── [ 33M] win32k.idb ├── [5.0M] win32k.pdb └── [2.2M] win32k.sys 8 directories, 27 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.