Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2014-4113 PoC — Microsoft Windows Win32k.sys 特权提升漏洞

Source
Associated Vulnerability
Title:Microsoft Windows Win32k.sys 特权提升漏洞 (CVE-2014-4113)
Description:win32k.sys in the kernel-mode drivers in Microsoft Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, and Windows RT Gold and 8.1 allows local users to gain privileges via a crafted application, as exploited in the wild in October 2014, aka "Win32k.sys Elevation of Privilege Vulnerability."
Description
Exploit CVE-2014-4113
Readme
# Exploit-CVE-2014-4113

CVE-2014-4113 is a Local & Privilege Escalation Exploits. You can get the SYSTEM Privilege.

support platform: x86; windows xp and windowx 7

usage:

1. ��cmd.exe���л�����ǰ��������Ŀ¼��ִ���������
cve-2014-4113.exe [target program name]

for example:
cve-2014-4113.exe calc.exe


File Snapshot

[4.0K] /data/pocs/5a90f3a3089c1a2c949b68538484abdcb00a77d0 ├── [4.0K] cve-2014-4113 │   ├── [4.1K] cve-2014-4113.vcxproj │   ├── [ 924] cve-2014-4113.vcxproj.filters │   ├── [ 162] cve-2014-4113.vcxproj.user │   ├── [4.0K] Debug │   │   ├── [1.6K] cve-2014-4113.log │   │   └── [4.0K] cve-2014-4113.tlog │   │   └── [ 160] cve-2014-4113.lastbuildstate │   └── [ 13K] main.cpp ├── [ 963] cve-2014-4113.sln ├── [ 20K] cve-2014-4113.v12.suo ├── [4.0K] Debug │   └── [530K] cve-2014-4113.exe ├── [ 313] README.md └── [ 383] removejunk.bat 4 directories, 11 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. Local POC snapshots are reserved for subscribers — if the original source is unavailable, the local mirror is part of the paid plan.
    3. Mirroring, verifying, and maintaining this POC archive takes ongoing effort, so local snapshots are a paid feature. Your subscription keeps the archive online — thank you for the support. View subscription plans →