Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2014-4113 PoC — Microsoft Windows Win32k.sys 特权提升漏洞

Source
Associated Vulnerability
Title:Microsoft Windows Win32k.sys 特权提升漏洞 (CVE-2014-4113)
Description:win32k.sys in the kernel-mode drivers in Microsoft Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, and Windows RT Gold and 8.1 allows local users to gain privileges via a crafted application, as exploited in the wild in October 2014, aka "Win32k.sys Elevation of Privilege Vulnerability."
Description
Trigger and exploit code for CVE-2014-4113
Readme
# CVE-2014-4113
Trigger and exploit code for CVE-2014-4113
File Snapshot

[4.0K] /data/pocs/1d6f29a45b8829fae368f6f32d0068733c71eaa0 ├── [4.0K] Exploit │   ├── [4.0K] Exploit │   │   ├── [ 13K] Exploit.cpp │   │   ├── [4.3K] Exploit.vcxproj │   │   ├── [1.3K] Exploit.vcxproj.filters │   │   ├── [1.6K] ReadMe.txt │   │   ├── [ 286] stdafx.cpp │   │   ├── [ 305] stdafx.h │   │   └── [ 306] targetver.h │   ├── [ 973] Exploit.sln │   └── [ 18K] Exploit.v12.suo ├── [1.1K] LICENSE ├── [ 59] README.md └── [4.0K] Trigger ├── [4.0K] Trigger │   ├── [1.6K] ReadMe.txt │   ├── [ 286] stdafx.cpp │   ├── [ 305] stdafx.h │   ├── [ 306] targetver.h │   ├── [8.2K] Trigger.cpp │   ├── [4.3K] Trigger.vcxproj │   └── [1.3K] Trigger.vcxproj.filters ├── [ 20] Trigger.opensdf ├── [ 973] Trigger.sln └── [ 18K] Trigger.v12.suo 4 directories, 21 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. Local POC snapshots are reserved for subscribers — if the original source is unavailable, the local mirror is part of the paid plan.
    3. Mirroring, verifying, and maintaining this POC archive takes ongoing effort, so local snapshots are a paid feature. Your subscription keeps the archive online — thank you for the support. View subscription plans →