7.2
CVSSv2

CVE-2018-8639

Published: 12/12/2018 Updated: 03/10/2019
CVSS v2 Base Score: 7.2 | Impact Score: 10 | Exploitability Score: 3.9
CVSS v3 Base Score: 7.8 | Impact Score: 5.9 | Exploitability Score: 1.8
VMScore: 642
Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Summary

An elevation of privilege vulnerability exists in Windows when the Win32k component fails to properly handle objects in memory, aka "Win32k Elevation of Privilege Vulnerability." This affects Windows 7, Windows Server 2012 R2, Windows RT 8.1, Windows Server 2008, Windows Server 2019, Windows Server 2012, Windows 8.1, Windows Server 2016, Windows Server 2008 R2, Windows 10, Windows 10 Servers. This CVE ID is unique from CVE-2018-8641.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

microsoft windows 10 -

microsoft windows 10 1607

microsoft windows 10 1703

microsoft windows 10 1709

microsoft windows server 2019 -

microsoft windows server 2016 1709

microsoft windows rt 8.1 -

microsoft windows 7 -

microsoft windows 10 1803

microsoft windows server 2012 -

microsoft windows server 2012 r2

microsoft windows server 2008 r2

microsoft windows server 2016 -

microsoft windows server 2016 1803

microsoft windows server 2008 -

microsoft windows 8.1 -

microsoft windows 10 1809

Github Repositories

CVE-2018-8639-EXP

CVE-2018-8639-EXP CVE-2018-8639 EXP Usage: CVE-2018-8639-EXPexe [command] etc 开源的样本大部分可能已经无法免杀,需要自行修改 我认为基础核心代码的开源能够帮助想学习的人 本人从github大佬项目中学到了很多 若用本人项目去进行:HW演练/红蓝对抗/APT/黑产/恶意行为/违法行为/割韭菜,等行为,

CVE-2018-8639-exp platform: windows 2008 and windows 2008 R2

Recent Articles

Magnitude exploit kit – evolution
Securelist • Boris Larin • 24 Jun 2020

Exploit kits are not as widespread as they used to be. In the past, they relied on the use of already patched vulnerabilities. Newer and more secure web browsers with automatic updates simply do not allow known vulnerabilities to be exploited. It was very different back in the heyday of Adobe Flash because it’s just a plugin for a web browser, meaning that even if the user has an up-to-date browser, there’s a non-zero chance that Adobe Flash may still be vulnerable to 1-day exploits. Now tha...