CVE-2013-1300
EXPLOITEDMicrosoft Windows - Privilege Escalation
Title source: llmDescription
win32k.sys in the kernel-mode drivers in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows Server 2012, and Windows RT does not properly handle objects in memory, which allows local users to gain privileges via a crafted application, aka "Win32k Memory Allocation Vulnerability."
Exploits (3)
exploitdb
WORKING POC
VERIFIED
by Metasploit · rubylocalwindows_x86
https://www.exploit-db.com/exploits/33213
metasploit
WORKING POC
NORMAL
by Nils, Jon · rubypocwin
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/windows/local/ms13_053_schlamperei.rb
References (4)
Scores
EPSS
0.2722
EPSS Percentile
96.4%
Details
VulnCheck KEV
2022-11-03
CWE
CWE-264
Status
published
Products (8)
microsoft/windows_7
(2 CPE variants)
microsoft/windows_8
(2 CPE variants)
microsoft/windows_rt
microsoft/windows_server_2003
microsoft/windows_server_2008
(3 CPE variants)
microsoft/windows_server_2012
microsoft/windows_vista
microsoft/windows_xp
(2 CPE variants)
Published
Jul 10, 2013
Tracked Since
Feb 18, 2026