### [CVE-2013-0008](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0008) ![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen) ### Description win32k.sys in the kernel-mode drivers in Microsoft Windows Vista SP2, Windows Server 2008 SP2, R2, and R2 SP1, Windows 7 Gold and SP1, Windows 8, Windows Server 2012, and Windows RT does not properly handle window broadcast messages, which allows local users to gain privileges via a crafted application, aka "Win32k Improper Message Handling Vulnerability." ### POC #### Reference - http://www.exploit-db.com/exploits/24485 #### Github - https://github.com/ARPSyndicate/cvemon - https://github.com/Al1ex/WindowsElevation - https://github.com/Ascotbe/Kernelhub - https://github.com/Crunchy0/Win_exploits - https://github.com/Cruxer8Mech/Idk - https://github.com/fei9747/WindowsElevation - https://github.com/nitishbadole/oscp-note-2 - https://github.com/rmsbpro/rmsbpro - https://github.com/ycdxsb/WindowsPrivilegeEscalation