7.8
CVSSv3

CVE-2019-0808

Published: 09/04/2019 Updated: 24/08/2020
CVSS v2 Base Score: 7.2 | Impact Score: 10 | Exploitability Score: 3.9
CVSS v3 Base Score: 7.8 | Impact Score: 5.9 | Exploitability Score: 1.8
VMScore: 727
Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Summary

An elevation of privilege vulnerability exists in Windows when the Win32k component fails to properly handle objects in memory, aka 'Win32k Elevation of Privilege Vulnerability'. This CVE ID is unique from CVE-2019-0797.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

microsoft windows 7 sp1

microsoft windows server 2008 r2

microsoft windows server 2008 -

Exploits

# Exploit Title: Microsoft Windows Win32k CVE-2019-0808 Local Privilege Escalation Vulnerability # Date: 24/03/2019 # Exploit Author: ze0r # Vendor Homepage: wwwmicrosoftcom # Version: Microsoft Windows 7/ Server 2008 # CVE : CVE-2019-0808 githubcom/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/46604zip ...
This Metasploit module exploits a NULL pointer dereference vulnerability in MNGetpItemFromIndex(), which is reachable via a NtUserMNDragOver() system call The NULL pointer dereference occurs because the xxxMNFindWindowFromPoint() function does not effectively check the validity of the tagPOPUPMENU objects it processes before passing them on to MNG ...

Github Repositories

cobaltstrike的BypassUAC、提权dll插件

插件介绍 该插件主要包括各种提权、ByPassUAC等功能。使用cobaltstrike加载elecna,并确保cna与dll文件在同一目录下,否则需要修改脚本的dll路径。 功能模块 使用时只需要在后面跟上运行文件的路径,即可实现提权/BypassUAC运行文件 提权脚本针对不同系统版本请使用不同的模块,BypassUAC挑

This is a list of offensive security tools that I have curated and actaully saved..

List-O-Tools This is a list of offensive security tools that I have curated and actaully saved githubcom/751643992/whale githubcom/751643992/LittleCCompiler githubcom/751643992/shellcode githubcom/odzhan/acorn githubcom/odzhan/injection githubcom/odzhan/dewifi githubcom/odzhan/polymutex githubcom/TonyChen

Win32k Exploit by Grant Willcox

CVE-2019-5786 and CVE-2019-0808 Chrome 7203626119 stable Windows 7 x86 exploit chain This exploit uses site-isolation to brute-force CVE-2019-5786 host1_wrapper/iframehtml is the wrapper script that loads the exploit repeatedly into an iframe The actual chain resides in the host2_single_run directory The sandbox escape exploit for CVE-2019-0808 is in the file host2_sin

cve-2019-0808-poc

cve-2019-0808-poc cve-2019-0808-poc jut BSOD,used for reboot OS;

CVE-2019-0808 packetstormsecuritycom/files/download/152267/cve-2019-0808-poc-mastertgz

CVE-2020-1054 CVE-2020-1054 Learning Screenshot Reference 0xeb-bpgithubio/blog/2020/06/15/cve-2020-1054-analysishtml (steal Security token) githubcom/mwrlabs/CVE-2016-7255 (leak function) githubcom/DreamoneOnly/CVE-2019-0808-32-64-exp

Bunch of Random Tools

Tools Bunch of Random Offensive Tools, Libraries, and Compilers githubcom/haidragon/dylib_inject githubcom/haidragon/goEncrypt githubcom/haidragon/JustTrustMe githubcom/haidragon/fireELF githubcom/haidragon/AvastHV githubcom/haidragon/win10_UserApcInject githubcom/haidragon/win10_CreateRemoteThread githubco

Recent Articles

Microsoft Patch Tuesday – March 2019
Symantec Threat Intelligence Blog • Ratheesh PM • 13 Mar 2024

This month the vendor has patched 64 vulnerabilities, 17 of which are rated Critical.

Posted: 13 Mar, 201920 Min ReadThreat Intelligence SubscribeFollowtwitterfacebooklinkedinMicrosoft Patch Tuesday – March 2019This month the vendor has patched 64 vulnerabilities, 17 of which are rated Critical.As always, customers are advised to follow these security best practices: Install vendor patches as soon as they are available. Run all software with the least privileges required while still maintaining functionality. Avoid handlin...

IT threat evolution Q1 2019. Statistics
Securelist • Victor Chebyshev Fedor Sinitsyn Denis Parinov Boris Larin Oleg Kupreev Evgeny Lopatin • 23 May 2019

These statistics are based on detection verdicts of Kaspersky Lab products received from users who consented to provide statistical data. According to Kaspersky Security Network, Q1 2019 is remembered mainly for mobile financial threats. First, the operators of the Russia-targeting Asacub Trojan made several large-scale distribution attempts, reaching up to 13,000 unique users per day. The attacks used active bots to send malicious links to contacts in already infected smartphones. The mailings ...

Microsoft changes DHCP to 'Dammit! Hacked! Compromised! Pwned!' Big bunch of security fixes land for Windows
The Register • Shaun Nichols in San Francisco • 12 Mar 2019

DHCP client has trio of remote-code exec vulns – plus SAP, Adobe issue updates

Patch Tuesday It's the second Tuesday of the month, and you know what that means: a fresh dump of security fixes from Microsoft, Adobe and others. The March edition of Patch Tuesday includes fixes for 64 CVE-listed vulnerabilities, while Adobe addressed a pair of bugs in Photoshop and Digital Editions. Even SAP has got in on the game. You should review the updates, test them if necessary or able to, and install them as soon as possible, to avoid running into miscreants exploiting them to comprom...