Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
https://github.com/GeorgiiFirsov/CVE-2020-1034
CVE 2020-1034 exploit and presentation
https://github.com/GeorgiiFirsov/CVE-2020-1034
cve cve-2020-1034 education exploit research vulnerability winapi windows
Last synced: 3 months ago
JSON representation
CVE 2020-1034 exploit and presentation
- Host: GitHub
- URL: https://github.com/GeorgiiFirsov/CVE-2020-1034
- Owner: GeorgiiFirsov
- License: mit
- Archived: true
- Created: 2022-03-23T19:14:26.000Z (almost 3 years ago)
- Default Branch: main
- Last Pushed: 2022-06-16T18:50:56.000Z (over 2 years ago)
- Last Synced: 2024-08-10T04:23:13.192Z (6 months ago)
- Topics: cve, cve-2020-1034, education, exploit, research, vulnerability, winapi, windows
- Language: C++
- Homepage:
- Size: 26.4 MB
- Stars: 1
- Watchers: 2
- Forks: 0
- Open Issues: 0
-
Metadata Files:
- Readme: README.md
- License: LICENSE
Awesome Lists containing this project
README
# CVE-2020-1034
> **Warning**
> *This repository contains a working exploit. Publication was made for educational purposes only. Owner of this repository is not responsible for any damage done by any part of source code published here.****This repository was created as a homework for "Protected Information Systems" course in National Research Nuclear University MEPhI.***
CVE 2020-1034 exploit and presentation.
## Brief description
An elevation of privilege vulnerability exists in the way that the Windows Kernel handles objects in memory, aka 'Windows Kernel Elevation of Privilege Vulnerability' \[1].
More info: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2020-1034
## References
1. [MITRE CVE-2020-1034][1]
[1]: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1034