Logo
Explore Help
Sign In
admin/cve
1
0
Fork 0
You've already forked cve
mirror of https://github.com/0xMarcio/cve.git synced 2025-06-19 17:30:12 +00:00
Code Issues Packages Projects Releases Wiki Activity
cve/2013/CVE-2013-1300.md
0xMarcio b042ce8188 Update Mon May 27 13:12:02 UTC 2024
2024-05-27 13:12:02 +00:00

1.5 KiB
Raw Blame History

CVE-2013-1300

Description

win32k.sys in the kernel-mode drivers in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows Server 2012, and Windows RT does not properly handle objects in memory, which allows local users to gain privileges via a crafted application, aka "Win32k Memory Allocation Vulnerability."

POC

Reference

  • https://docs.microsoft.com/en-us/security-updates/securitybulletins/2013/ms13-053

Github

  • https://github.com/ARPSyndicate/cvemon
  • https://github.com/Al1ex/WindowsElevation
  • https://github.com/Ascotbe/Kernelhub
  • https://github.com/CVEDB/PoC-List
  • https://github.com/CVEDB/awesome-cve-repo
  • https://github.com/Cruxer8Mech/Idk
  • https://github.com/JERRY123S/all-poc
  • https://github.com/Meatballs1/cve-2013-1300
  • https://github.com/cyberanand1337x/bug-bounty-2022
  • https://github.com/fei9747/WindowsElevation
  • https://github.com/hktalent/TOP
  • https://github.com/jbmihoub/all-poc
  • https://github.com/nitishbadole/oscp-note-2
  • https://github.com/rmsbpro/rmsbpro
  • https://github.com/weeka10/-hktalent-TOP
  • https://github.com/ycdxsb/WindowsPrivilegeEscalation
Powered by Gitea Version: 1.23.1 Page: 391ms Template: 2ms
English
Bahasa Indonesia Deutsch English Español Français Gaeilge Italiano Latviešu Magyar nyelv Nederlands Polski Português de Portugal Português do Brasil Suomi Svenska Türkçe Čeština Ελληνικά Български Русский Українська فارسی മലയാളം 日本語 简体中文 繁體中文(台灣) 繁體中文(香港) 한국어
Licenses API