exploitdb
WORKING POC
VERIFIED
by Serus · clocalwindows
https://www.exploit-db.com/exploits/21923
This exploit leverages the Winlogon NetDDE Agent vulnerability (CVE-2002-1230) to achieve local privilege escalation by sending a WM_COPYDATA message with shellcode and triggering execution via a WM_TIMER message. It targets Windows 2000 and XP by bruteforcing memory addresses to locate the injected shellcode.
Classification
Working Poc 95%
Target:
Microsoft Windows 2000, Windows XP
No auth needed
Prerequisites:
Local access to the target system · NetDDE Agent running
exploitdb
WORKING POC
VERIFIED
by Serus · clocalwindows
https://www.exploit-db.com/exploits/21922
This exploit leverages the Winlogon NetDDE Agent vulnerability (CVE-2002-1230) to achieve local privilege escalation on Windows 2000 by sending a WM_COPYDATA message with shellcode and triggering execution via a WM_TIMER message.
Classification
Working Poc 95%
Target:
Microsoft Windows 2000
No auth needed
Prerequisites:
Local access to a vulnerable Windows 2000 system · NetDDE Agent running
exploitdb
WRITEUP
VERIFIED
by anonymous · textlocalwindows
https://www.exploit-db.com/exploits/21691
This is a technical writeup describing a design flaw in the Win32 API related to inter-window message passing, which can be exploited for local privilege escalation (LPE) by targeting windows of higher-privileged processes. It references multiple papers and proofs-of-concept, including Shatter attacks and specific Windows messages like WM_TIMER and WM_SETTEXT.
Classification
Writeup 90%
Target:
Win32 API (Windows-based applications)
No auth needed
Prerequisites:
Local access to the target system · Presence of a higher-privileged window (e.g., antivirus software running as LocalSystem)
exploitdb
WRITEUP
VERIFIED
by Ovidio Mallo · textlocalwindows
https://www.exploit-db.com/exploits/21690
The document describes a Win32 API design flaw related to inter-window message passing, which can be exploited for local privilege escalation (LPE) by targeting windows of higher-privileged processes. It references multiple papers and proofs-of-concept, including Shatter attacks and specific Windows messages like WM_TIMER and WM_SETTEXT.
Classification
Writeup 90%
Target:
Win32-based applications (e.g., antivirus software)
No auth needed
Prerequisites:
Local access to the target system · Presence of a higher-privileged window
exploitdb
WORKING POC
VERIFIED
by Brett Moore · clocalwindows
https://www.exploit-db.com/exploits/21689
This exploit demonstrates a Shatter attack against Win32 applications with listview controls, leveraging inter-window message passing to inject shellcode and overwrite a critical memory address (SEH handler). It targets local privilege escalation by manipulating window messages like LVM_SETCOLUMNWIDTH and HDM_GETITEMRECT.
Classification
Working Poc 95%
Target:
Win32 applications with listview controls (e.g., Explorer, IE, file open dialogs)
No auth needed
Prerequisites:
Local access to the target system · Presence of a vulnerable window with higher privileges
exploitdb
WORKING POC
VERIFIED
by Oliver Lavery · clocalwindows
https://www.exploit-db.com/exploits/21688
This exploit demonstrates a Shatter attack against Windows applications with tab controls, specifically targeting McAfee A/V products. It injects shellcode into a known memory location and overwrites a critical address to achieve local privilege escalation.
Classification
Working Poc 95%
Target:
McAfee A/V products (or any Win32 application with a tab control)
No auth needed
Prerequisites:
Local access to the target system · Presence of a vulnerable application with a tab control
exploitdb
WORKING POC
VERIFIED
by Brett Moore · clocalwindows
https://www.exploit-db.com/exploits/21687
This exploit demonstrates a Shatter attack against Windows applications using progress bar controls. It injects shellcode into a known memory location and overwrites a critical address to achieve local privilege escalation.
Classification
Working Poc 100%
Target:
Windows applications with progress bar controls
No auth needed
Prerequisites:
Local access to the system · Presence of a vulnerable application with a progress bar control
exploitdb
WORKING POC
VERIFIED
by Brett Moore · clocalwindows
https://www.exploit-db.com/exploits/21686
This exploit demonstrates a Shatter attack against Windows applications using status bar controls. It brute-forces heap addresses, injects shellcode, and overwrites SEH to achieve local privilege escalation.
Classification
Working Poc 95%
Target:
Windows applications with status bar controls (e.g., antivirus software)
No auth needed
Prerequisites:
Local access to the target system · Presence of a vulnerable window with higher privileges
exploitdb
WORKING POC
VERIFIED
by Oliver Lavery · clocalwindows
https://www.exploit-db.com/exploits/21685
This exploit demonstrates a Shatter attack against Windows applications using the CommCtrl 6.0 Button control. It injects shellcode into a known memory location and overwrites a critical address to achieve local privilege escalation.
Classification
Working Poc 100%
Target:
Windows applications using CommCtrl 6.0 Button controls
No auth needed
Prerequisites:
Local access to the target system · Presence of a vulnerable window with higher privileges
exploitdb
WORKING POC
VERIFIED
by sectroyer · clocalwindows
https://www.exploit-db.com/exploits/21684
This exploit leverages the Win32 message passing vulnerability (CVE-2002-1230) to achieve local privilege escalation by targeting the Utility Manager window. It uses techniques like LVM_SORTITEMS and HDM_GETITEMRECT to overwrite SEH and execute shellcode.
Classification
Working Poc 95%
Target:
Windows 2000 (Utility Manager)
No auth needed
Prerequisites:
Local access to the target system · Utility Manager window must be present