7.2
CVSSv2

CVE-2013-0008

Published: 09/01/2013 Updated: 07/12/2023
CVSS v2 Base Score: 7.2 | Impact Score: 10 | Exploitability Score: 3.9
VMScore: 730
Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Summary

win32k.sys in the kernel-mode drivers in Microsoft Windows Vista SP2, Windows Server 2008 SP2, R2, and R2 SP1, Windows 7 Gold and SP1, Windows 8, Windows Server 2012, and Windows RT does not properly handle window broadcast messages, which allows local users to gain privileges via a crafted application, aka "Win32k Improper Message Handling Vulnerability."

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

microsoft windows vista

microsoft windows server 2008

microsoft windows server 2008 -

microsoft windows 7

microsoft windows 7 -

microsoft windows server 2008 r2

microsoft windows 8 -

microsoft windows server 2012 -

microsoft windows rt -

Exploits

/* ms13-005-funz-poccpp - Drive a Medium IL cmdexe via a Low IL process and message broadcasted Copyright (C) 2013 Axel "0vercl0k" Souchet - wwwtwittercom/0vercl0k This program is free software: you can redistribute it and/or modify it under the terms of the GNU General Public License as published by the Free Softwar ...
## # ## This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions Please see the Metasploit # web site for more information on licensing and terms of use # metasploitcom/ ## require 'msf/core' require 'rex' require 'msf/core/exploit/exe' class Metasploit3 < Msf::Exploit::Local ...

Github Repositories

My privilege escalation research

Win_exploits My privilege escalation research I do not own any of the source codes Author of both exploits sources: 0vercl0k Demos CVE-2013-0008 demo: CVE-2013-0008mp4 CVE-2019-1184 demo: CVE-2019-1184mp4