Public exploit available
Public proof-of-concept or exploit code exists (ExploitDB / Metasploit / Nuclei).

CVE-2013-0008Microsoft Windows Server 2008 vulnerability

CWE-2647 documents6 sources
Severity
7.2HIGHNVD
EPSS
17.6%
top 4.90%
CISA KEV
Not in KEV
Exploit
PoC available
Public exploit / PoC exists
Timeline
PublishedJan 9
Latest updateMay 5

Description

win32k.sys in the kernel-mode drivers in Microsoft Windows Vista SP2, Windows Server 2008 SP2, R2, and R2 SP1, Windows 7 Gold and SP1, Windows 8, Windows Server 2012, and Windows RT does not properly handle window broadcast messages, which allows local users to gain privileges via a crafted application, aka "Win32k Improper Message Handling Vulnerability."

CVSS vector

AV:L/AC:L/C:C/I:C/A:CExploitability: 3.9 | Impact: 10.0

Affected Packages1 packages

🔴Vulnerability Details

1
GHSA
GHSA-xc82-cc97-pg8v: win32k2022-05-05

💥Exploits & PoCs

3
Exploit-DB
Microsoft Windows - HWND_BROADCAST Low to Medium Integrity Privilege Escalation (MS13-005) (Metasploit)2013-08-02
Exploit-DB
Microsoft Windows - HWND_BROADCAST (PoC) (MS13-005)2013-02-11
Metasploit
MS13-005 HWND_BROADCAST Low to Medium Integrity Privilege Escalation

📋Vendor Advisories

1
VMware
VMware vCenter Chargeback Manager Remote Code Execution2013-06-11

💬Community

1
Bugzilla
CVE-2013-1777 geronimo: Improper RMI classloader implementation in JMX remoting functionality leading to arbitrary code execution2013-07-12