CVE-2018-8639-EXP
CVE-2018-8639-EXP CVE-2018-8639 EXP Usage: CVE-2018-8639-EXPexe [command] etc 开源的样本大部分可能已经无法免杀,需要自行修改 我认为基础核心代码的开源能够帮助想学习的人 本人从github大佬项目中学到了很多 若用本人项目去进行:HW演练/红蓝对抗/APT/黑产/恶意行为/违法行为/割韭菜,等行为,
An elevation of privilege vulnerability exists in Windows when the Win32k component fails to properly handle objects in memory, aka "Win32k Elevation of Privilege Vulnerability." This affects Windows 7, Windows Server 2012 R2, Windows RT 8.1, Windows Server 2008, Windows Server 2019, Windows Server 2012, Windows 8.1, Windows Server 2016, Windows Server 2008 R2, Windows 10, Windows 10 Servers. This CVE ID is unique from CVE-2018-8641.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
microsoft windows 10 - |
||
microsoft windows 10 1607 |
||
microsoft windows 10 1703 |
||
microsoft windows 10 1709 |
||
microsoft windows server 2019 - |
||
microsoft windows server 2016 1709 |
||
microsoft windows rt 8.1 - |
||
microsoft windows 7 - |
||
microsoft windows 10 1803 |
||
microsoft windows server 2012 - |
||
microsoft windows server 2012 r2 |
||
microsoft windows server 2008 r2 |
||
microsoft windows server 2016 - |
||
microsoft windows server 2016 1803 |
||
microsoft windows server 2008 - |
||
microsoft windows 8.1 - |
||
microsoft windows 10 1809 |
Exploit kits are not as widespread as they used to be. In the past, they relied on the use of already patched vulnerabilities. Newer and more secure web browsers with automatic updates simply do not allow known vulnerabilities to be exploited. It was very different back in the heyday of Adobe Flash because it’s just a plugin for a web browser, meaning that even if the user has an up-to-date browser, there’s a non-zero chance that Adobe Flash may still be vulnerable to 1-day exploits. Now tha...