These two days stroll a bit cloud, accidentally saw this library, collected.
The vulnerability list is as follows:
#Security Bulletin #KB #Description #Operating System
cve-2017-0213 [Windows COM Elevation of Privilege vulnerability] (Windows 10/8.1/7/2016/2010/2008)
ms17-010 [KB4013389] [Windows Kernel Mode Drivers] (Windows 7/2008/2003/XP)
ms16-135 [KB3199135] [Windows Kernel Mode Drivers] (2016)
ms16-098 [KB3178466] [Kernel Driver] (Win 8.1)
ms16-075 [KB3164038] [Hot Potato] (2003/2008/7/8/2012)
ms16-032 [KB3143141] [secondary Logon Handle] (2008/7/8/10/2012)
ms16-016 [KB3136041] [WebDAV] (2008/VISTA/7)
ms15-097 [KB3089656] [Remote code Execution] (win8.1/2012)
ms15-076 [KB3067505] [RPC] (2003/2008/7/8/2012)
ms15-077 [KB3077657] [ATM] (xp/vista/win7/win8/2000/2003/2008/2012)
ms15-061 [KB3057839] [Kernel Driver] (2003/2008/7/8/2012)
ms15-051 [KB3057191] [Windows Kernel Mode Drivers] (2003/2008/7/8/2012)
ms15-010 [KB3036220] [Kernel Driver] (2003/2008/7/8)
ms15-015 [KB3031432] [Kernel Driver] (win7/8/8.1/2012/rt/2012 r2/2008 R2)
ms15-001 [KB3023266] [Kernel Driver] (2008/2012/7/8)
ms14-070 [KB2989935] [Kernel Driver] (2003)
ms14-068 [KB3011780] [Domain Privilege escalation] (2003/2008/2012/7/8)
ms14-058 [KB3000061] [Win32k.sys] (2003/2008/2012/7/8)
ms14-040 [KB2975684] [AFD Driver] (2003/2008/2012/7/8)
ms14-002 [KB2914368] [NDProxy] (2003/XP)
ms13-053 [KB2850851] [Win32k.sys] (Xp/vista/2003/2008/win 7)
ms13-046 [KB2840221] [Dxgkrnl.sys] (VISTA/2003/2008/2012/7)
ms13-005 [KB2778930] [Kernel Mode Driver] (2003/2008/2012/WIN7/8)
ms12-042 [KB2972621] [Service Bus] (2008/2012/win7)
ms12-020 [KB2671387] [RDP] (2003/2008/7/XP)
ms11-080 [KB2592799] [Afd.sys] (2003/XP)
ms11-062 [KB2566454] [NDISTAPI] (2003/XP)
ms11-046 [KB2503665] [Afd.sys] (2003/2008/7/XP)
ms11-011 [KB2393802] [kernel Driver] (2003/2008/7/xp/vista)
ms10-092 [KB2305420] [Task Scheduler] (2008/7)
ms10-065 [KB2267960] [FastCGI] (IIS 5.1, 6.0, 7.0, and 7.5)
ms10-059 [KB982799] [Acl-churraskito] (2008/7/vista)
ms10-048 [KB2160329] [Win32k.sys] (XP SP2 & sp3/2003 sp2/vista SP1 & sp2/2008 Gold & SP2 & r2/win7)
ms10-015 [KB977165] [kitrap0d] (2003/2008/7/XP)
ms09-050 [KB975517] [Remote Code execution] (2008/vista)
ms09-020 [KB970483] [IIS 6.0] (IIS 5.1 and 6.0)
ms09-012 [KB959454] [chimichurri] (Vista/win7/2008/vista)
ms08-068 [KB957097] [Remote Code execution] (2000/XP)
ms08-067 [KB958644] [Remote Code execution] (Windows 2000/xp/server 2003/vista/server 2008)
ms08-025 [KB941693] [Win32.sys] (Xp/2003/2008/vista)
ms06-040 [KB921883] [Remote Code execution] (2003/xp/2000)
ms05-039 [KB899588] [PnP Service] (Win 9x/me/nt/2000/xp/2003)
ms03-026 [KB823980] [Buffer overrun in RPC Interface] (/nt/2000/xp/2003)
The project address is as follows:
Https://github.com/SecWiki/windows-kernel-exploits
The rest is not much to say ...
A collection of Windows platform rights to exploit, a small harvest of the code-browsing cloud