Microsoft Windows Win32k TrackPopupMenu Null Pointer Dereference Privilege Escalation Exploit (MS14-058) Update

This module exploits a null pointer dereference in win32k.sys by abusing of xxxSendMessageTimeout function. The TrackPopupMenu API function is used to trigger the vulnerability.



This update adds support for x86-64 platforms.
Exploit Type - Old
Exploits/Local
Exploit Platform
Exploit Type
Product Name