├── README.md ├── cve-2019-1458.cpp ├── img ├── DrawSwitchWndHilite_being_called.png ├── InitFunctionTable_comparison.png ├── InitFunctionTable_typeapplied.png ├── InternalRegisterClassEx.png ├── NtUserMessageCall.png ├── NtUserfnDWORD.png ├── bindiff_comparison.png ├── kespersky_windows_0day_wizardopium_03.png ├── success.PNG ├── successfull_run.png ├── windbg_exploit_working.png ├── xxxPaintSwitchWindow.png ├── xxxSetWindowLong.png └── xxxSwitchWndProc.png └── syscall.asm /README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Microsvuln/cve-2019-1458_POC/HEAD/README.md -------------------------------------------------------------------------------- /cve-2019-1458.cpp: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Microsvuln/cve-2019-1458_POC/HEAD/cve-2019-1458.cpp -------------------------------------------------------------------------------- /img/DrawSwitchWndHilite_being_called.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Microsvuln/cve-2019-1458_POC/HEAD/img/DrawSwitchWndHilite_being_called.png -------------------------------------------------------------------------------- /img/InitFunctionTable_comparison.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Microsvuln/cve-2019-1458_POC/HEAD/img/InitFunctionTable_comparison.png -------------------------------------------------------------------------------- /img/InitFunctionTable_typeapplied.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Microsvuln/cve-2019-1458_POC/HEAD/img/InitFunctionTable_typeapplied.png -------------------------------------------------------------------------------- /img/InternalRegisterClassEx.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Microsvuln/cve-2019-1458_POC/HEAD/img/InternalRegisterClassEx.png -------------------------------------------------------------------------------- /img/NtUserMessageCall.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Microsvuln/cve-2019-1458_POC/HEAD/img/NtUserMessageCall.png -------------------------------------------------------------------------------- /img/NtUserfnDWORD.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Microsvuln/cve-2019-1458_POC/HEAD/img/NtUserfnDWORD.png -------------------------------------------------------------------------------- /img/bindiff_comparison.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Microsvuln/cve-2019-1458_POC/HEAD/img/bindiff_comparison.png -------------------------------------------------------------------------------- /img/kespersky_windows_0day_wizardopium_03.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Microsvuln/cve-2019-1458_POC/HEAD/img/kespersky_windows_0day_wizardopium_03.png -------------------------------------------------------------------------------- /img/success.PNG: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Microsvuln/cve-2019-1458_POC/HEAD/img/success.PNG -------------------------------------------------------------------------------- /img/successfull_run.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Microsvuln/cve-2019-1458_POC/HEAD/img/successfull_run.png -------------------------------------------------------------------------------- /img/windbg_exploit_working.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Microsvuln/cve-2019-1458_POC/HEAD/img/windbg_exploit_working.png -------------------------------------------------------------------------------- /img/xxxPaintSwitchWindow.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Microsvuln/cve-2019-1458_POC/HEAD/img/xxxPaintSwitchWindow.png -------------------------------------------------------------------------------- /img/xxxSetWindowLong.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Microsvuln/cve-2019-1458_POC/HEAD/img/xxxSetWindowLong.png -------------------------------------------------------------------------------- /img/xxxSwitchWndProc.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Microsvuln/cve-2019-1458_POC/HEAD/img/xxxSwitchWndProc.png -------------------------------------------------------------------------------- /syscall.asm: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Microsvuln/cve-2019-1458_POC/HEAD/syscall.asm --------------------------------------------------------------------------------