### [CVE-2019-0803](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0803) ![](https://img.shields.io/static/v1?label=Product&message=Windows%20Server&color=blue) ![](https://img.shields.io/static/v1?label=Product&message=Windows&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Vulnerability&message=Elevation%20of%20Privilege&color=brighgreen) ### Description An elevation of privilege vulnerability exists in Windows when the Win32k component fails to properly handle objects in memory, aka 'Win32k Elevation of Privilege Vulnerability'. This CVE ID is unique from CVE-2019-0685, CVE-2019-0859. ### POC #### Reference - http://packetstormsecurity.com/files/153034/Microsoft-Windows-Win32k-Privilege-Escalation.html #### Github - https://github.com/0xT11/CVE-POC - https://github.com/20142995/sectool - https://github.com/ARPSyndicate/cvemon - https://github.com/ASR511-OO7/windows-kernel-exploits - https://github.com/Al1ex/WindowsElevation - https://github.com/Ascotbe/Kernelhub - https://github.com/CnHack3r/Penetration_PoC - https://github.com/Cruxer8Mech/Idk - https://github.com/EchoGin404/- - https://github.com/EchoGin404/gongkaishouji - https://github.com/ExpLife0011/CVE-2019-0803 - https://github.com/ExpLife0011/awesome-windows-kernel-security-development - https://github.com/Iamgublin/CVE-2019-0803 - https://github.com/Jkrasher/WindowsThreatResearch_JKrasher - https://github.com/Micr067/windows-kernel-exploits - https://github.com/Mr-xn/Penetration_Testing_POC - https://github.com/Ondrik8/exploit - https://github.com/Ostorlab/KEV - https://github.com/Ostorlab/known_exploited_vulnerbilities_detectors - https://github.com/SecWiki/windows-kernel-exploits - https://github.com/SexyBeast233/SecBooks - https://github.com/Tyro-Shan/gongkaishouji - https://github.com/YIXINSHUWU/Penetration_Testing_POC - https://github.com/ZTK-009/Penetration_PoC - https://github.com/ZTK-009/RedTeamer - https://github.com/albinjoshy03/windows-kernel-exploits - https://github.com/alian87/windows-kernel-exploits - https://github.com/asr511/windows-kernel-exploits - https://github.com/demilson/Windows - https://github.com/developer3000S/PoC-in-GitHub - https://github.com/distance-vector/window-kernel-exp - https://github.com/fei9747/WindowsElevation - https://github.com/fengjixuchui/RedTeamer - https://github.com/hasee2018/Penetration_Testing_POC - https://github.com/hectorgie/PoC-in-GitHub - https://github.com/hktalent/bug-bounty - https://github.com/huike007/penetration_poc - https://github.com/huike007/poc - https://github.com/hwiwonl/dayone - https://github.com/lions2012/Penetration_Testing_POC - https://github.com/lyshark/Windows-exploits - https://github.com/mishmashclone/SecWiki-windows-kernel-exploits - https://github.com/nicolas-gagnon/windows-kernel-exploits - https://github.com/nomi-sec/PoC-in-GitHub - https://github.com/paramint/windows-kernel-exploits - https://github.com/password520/Penetration_PoC - https://github.com/password520/RedTeamer - https://github.com/pentration/gongkaishouji - https://github.com/pravinsrc/NOTES-windows-kernel-links - https://github.com/root26/bug - https://github.com/safesword/WindowsExp - https://github.com/winterwolf32/CVE-S---Penetration_Testing_POC- - https://github.com/xfinest/windows-kernel-exploits - https://github.com/xuetusummer/Penetration_Testing_POC - https://github.com/ycdxsb/WindowsPrivilegeEscalation - https://github.com/yedada-wei/- - https://github.com/yedada-wei/gongkaishouji - https://github.com/yige666/windows-kernel-exploits - https://github.com/yisan1/hh - https://github.com/yiyebuhuijia/windows-kernel-exploits