<?xml version="1.0" encoding="utf-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
    <channel>
        <title>Win32k NULL-Pointer-Dereference Analysis by Matching the May Update</title>
        <link>https://xiaodaozhi.com/exploit/156.html</link>
        <description>Microsoft shipped and fixed four win32k kernel Escalation of Privilege vulnerabilities in the May security bulletin. This article will discover and analyze one of these vulnerabilities caused by a null pointer dereference fixed by the patch program, and will finally attempt to implement its proof an...</description>
        <lastBuildDate>Tue, 09 Apr 2019 04:00:00 GMT</lastBuildDate>
        <docs>https://validator.w3.org/feed/docs/rss2.html</docs>
        <generator>https://github.com/jpmonette/feed</generator>
        <language>zh-CN</language>
        <image>
            <title>Win32k NULL-Pointer-Dereference Analysis by Matching the May Update</title>
            <url>https://xiaodaozhi.com/uploads/2018/05/09/1773802421984.png</url>
            <link>https://xiaodaozhi.com/exploit/156.html</link>
        </image>
        <copyright>All rights reserved 2026</copyright>
        <atom:link href="https://xiaodaozhi.com/feed/exploit/156.html" rel="self" type="application/rss+xml"/>
    </channel>
</rss>