Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
| Vendor | Product | Affected Versions | CPE | Subscribe |
|---|---|---|---|---|
| Microsoft | Windows | 7 for 32-bit Systems Service Pack 1 | - | |
| Microsoft | Windows Server | 2008 R2 for x64-based Systems Service Pack 1 (Core installation) | - |
| # | POC Description | Source Link | Shenlong Link |
|---|---|---|---|
| 1 | proof of concept exploit for Microsoft Windows 7 and Server 2008 RDP vulnerability | https://github.com/hook-s3c/CVE-2019-0708-poc | POC Details |
| 2 | A Win7 RDP exploit | https://github.com/SherlockSec/CVE-2019-0708 | POC Details |
| 3 | CVE-2019-0708 | https://github.com/yetiddbb/CVE-2019-0708-PoC | POC Details |
| 4 | CVE-2019-0708-exploit | https://github.com/p0p0p0/CVE-2019-0708-exploit | POC Details |
| 5 | Using CVE-2019-0708 to Locally Promote Privileges in Windows 10 System | https://github.com/rockmelodies/CVE-2019-0708-Exploit | POC Details |
| 6 | CVE-2019-0708 exp | https://github.com/anquanscan/CVE-2019-0708 | POC Details |
| 7 | Dark Net Sunset New Release CVE-2019-0708 | https://github.com/xiyangzuishuai/Dark-Network-CVE-2019-0708 | POC Details |
| 8 | CVE-2019-0708 | https://github.com/temp-user-2014/CVE-2019-0708 | POC Details |
| 9 | Proof of concept exploit for CVE-2019-0708 | https://github.com/areusecure/CVE-2019-0708 | POC Details |
| 10 | Testing my new bot out | https://github.com/pry0cc/cve-2019-0708-2 | POC Details |
| 11 | POCexp:https://pan.baidu.com/s/184gN1tJVIOYqOjaezM_VsA 提取码:e2k8 | https://github.com/sbkcbig/CVE-2019-0708-EXPloit | POC Details |
| 12 | EXPloit-poc: https://pan.baidu.com/s/184gN1tJVIOYqOjaezM_VsA 提取码:e2k8 | https://github.com/sbkcbig/CVE-2019-0708-EXPloit-3389 | POC Details |
| 13 | CVE-2019-0708 | https://github.com/YSheldon/MS_T120 | POC Details |
| 14 | 3389远程桌面代码执行漏洞CVE-2019-0708批量检测工具(Rdpscan Bluekeep Check) | https://github.com/k8gege/CVE-2019-0708 | POC Details |
| 15 | exploit CVE-2019-0708 RDS | https://github.com/hotdog777714/RDS_CVE-2019-0708 | POC Details |
| 16 | RDP POC | https://github.com/jiansiting/CVE-2019-0708 | POC Details |
| 17 | PoC exploit for BlueKeep (CVE-2019-0708) | https://github.com/NullByteSuiteDevs/CVE-2019-0708 | POC Details |
| 18 | sup pry0cc :3 | https://github.com/thugcrowd/CVE-2019-0708 | POC Details |
| 19 | CVE-2019-0708 | https://github.com/blacksunwen/CVE-2019-0708 | POC Details |
| 20 | None | https://github.com/infenet/CVE-2019-0708 | POC Details |
| 21 | Totally legitimate | https://github.com/n0auth/CVE-2019-0708 | POC Details |
| 22 | None | https://github.com/gildaaa/CVE-2019-0708 | POC Details |
| 23 | CVE-2019-0708 EXPloit-poc 漏洞描述 微软官方紧急发布安全补丁,修复了一个Windows远程桌面服务的远程代码执行漏洞CVE-2019-0708,该漏洞影响了某些旧版本的Windows系统。此漏洞是预身份验证,无需用户交互。当未经身份验证的攻击者使用RDP(常见端口3389)连接到目标系统并发送特制请求时,可以在目标系统上执行任意命令。甚至传播恶意蠕虫,感染内网其他机器。类似于2017年爆发的WannaCry等恶意勒索软件病毒。 漏洞评级 CVE-2019-0708 严重 安全建议 1、针对Windows 7及Windows Server 2008的用户,及时安装官方安全补丁:https://www.catalog.update.microsoft.com/Search.aspx?q=KB4499175 2、针对Windows 2003及Windows XP的用户,及时更新系统版本或安装官方补丁:https://support.microsoft.com/zh-cn/help/4500705/customer-guidance-for-cve-2019-0708 CVE-2019-0708 EXPloit-poc 影响版本 Windows7 XP Windows 2003 Windows Server 2008 Windows Server 2008 R2 EXPloit-poc: https://pan.baidu.com/s/184gN1tJVIOYqOjaezM_VsA 提取码:e2k8 | https://github.com/sbkcbig/CVE-2019-0708-Poc-exploit | POC Details |
| 24 | None | https://github.com/HackerJ0e/CVE-2019-0708 | POC Details |
| 25 | PoC about CVE-2019-0708 (RDP; Windows 7, Windows Server 2003, Windows Server 2008) | https://github.com/syriusbughunt/CVE-2019-0708 | POC Details |
| 26 | A remote code execution vulnerability exists in Remote Desktop Services – formerly known as Terminal Services – when an unauthenticated attacker connects to the target system using RDP and sends specially crafted requests. This vulnerability is pre-authentication and requires no user interaction. An attacker who successfully exploited this vulnerability could execute arbitrary code on the target system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. | https://github.com/Barry-McCockiner/CVE-2019-0708 | POC Details |
| 27 | A remote code execution vulnerability exists in Remote Desktop Services – formerly known as Terminal Services – when an unauthenticated attacker connects to the target system using RDP and sends specially crafted requests. This vulnerability is pre-authentication and requires no user interaction. An attacker who successfully exploited this vulnerability could execute arbitrary code on the target system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. | https://github.com/ShadowBrokers-ExploitLeak/CVE-2019-0708 | POC Details |
| 28 | CVE-2019-0708 demo | https://github.com/safly/CVE-2019-0708 | POC Details |
| 29 | None | https://github.com/Jaky5155/cve-2019-0708-exp | POC Details |
| 30 | Powershell script to run and determine if a specific device has been patched for CVE-2019-0708. This checks to see if the termdd.sys file has been updated appropriate and is at a version level at or greater than the versions released in the 5/14/19 patches. | https://github.com/fourtwizzy/CVE-2019-0708-Check-Device-Patch-Status | POC Details |
| 31 | POC for CVE-2019-0708 | https://github.com/303sec/CVE-2019-0708 | POC Details |
| 32 | PoC for CVE-2019-0708 | https://github.com/f8al/CVE-2019-0708-POC | POC Details |
| 33 | CVE-2019-0708漏洞MSF批量巡检插件 | https://github.com/blockchainguard/CVE-2019-0708 | POC Details |
| 34 | LOL | https://github.com/yushiro/CVE-2019-0708 | POC Details |
| 35 | It's only hitting vulnerable path in termdd.sys!!! NOT DOS | https://github.com/skyshell20082008/CVE-2019-0708-PoC-Hitting-Path | POC Details |
| 36 | Announces fraud | https://github.com/ttsite/CVE-2019-0708- | POC Details |
| 37 | Report fraud | https://github.com/ttsite/CVE-2019-0708 | POC Details |
| 38 | CVE-2019-0708 远程代码执行漏洞批量检测 | https://github.com/biggerwing/CVE-2019-0708-poc | POC Details |
| 39 | dump | https://github.com/n1xbyte/CVE-2019-0708 | POC Details |
| 40 | High level exploit | https://github.com/freeide/CVE-2019-0708 | POC Details |
| 41 | 根据360的程序,整的CVE-2019-0708批量检测 | https://github.com/edvacco/CVE-2019-0708-POC | POC Details |
| 42 | My bot (badly written) to search and monitor cve-2019-0708 repositories | https://github.com/pry0cc/BlueKeepTracker | POC Details |
| 43 | None | https://github.com/zjw88282740/CVE-2019-0708-win7 | POC Details |
| 44 | Scanner PoC for CVE-2019-0708 RDP RCE vuln | https://github.com/victor0013/CVE-2019-0708 | POC Details |
| 45 | 根据360Vulcan Team开发的CVE-2019-0708单个IP检测工具构造了个批量检测脚本而已 | https://github.com/herhe/CVE-2019-0708poc | POC Details |
| 46 | cve-2019-0708 vulnerablility scanner | https://github.com/l9c/rdp0708scanner | POC Details |
| 47 | None | https://github.com/major203/cve-2019-0708-scan | POC Details |
| 48 | Check vuln CVE 2019-0708 | https://github.com/SugiB3o/Check-vuln-CVE-2019-0708 | POC Details |
| 49 | Goby support CVE-2019-0708 "BlueKeep" vulnerability check | https://github.com/gobysec/CVE-2019-0708 | POC Details |
| 50 | Working proof of concept for CVE-2019-0708, spawns remote shell. | https://github.com/smallFunction/CVE-2019-0708-POC | POC Details |
| 51 | CVE-2019-0708 PoC Exploit | https://github.com/freeide/CVE-2019-0708-PoC-Exploit | POC Details |
| 52 | A quick scanner for the CVE-2019-0708 "BlueKeep" vulnerability. | https://github.com/robertdavidgraham/rdpscan | POC Details |
| 53 | cve-2019-0708 poc . | https://github.com/closethe/CVE-2019-0708-POC | POC Details |
| 54 | 50 first stargazers will get get the tool via email | https://github.com/SQLDebugger/CVE-2019-0708-Tool | POC Details |
| 55 | CVE-2019-0708 | https://github.com/Rostelecom-CERT/bluekeepscan | POC Details |
| 56 | Only Hitting PoC [Tested on Windows Server 2008 r2] | https://github.com/Leoid/CVE-2019-0708 | POC Details |
| 57 | 基于360公开的无损检测工具的可直接在windows上运行的批量检测程序 | https://github.com/ht0Ruial/CVE-2019-0708Poc-BatchScanning | POC Details |
| 58 | CVE-2019-0708 bluekeep 漏洞检测 | https://github.com/oneoy/BlueKeep | POC Details |
| 59 | None | https://github.com/infiniti-team/CVE-2019-0708 | POC Details |
| 60 | None | https://github.com/haishanzheng/CVE-2019-0708-generate-hosts | POC Details |
| 61 | Proof of concept for CVE-2019-0708 | https://github.com/Ekultek/BlueKeep | POC Details |
| 62 | CVE-2019-0708 | https://github.com/UraSecTeam/CVE-2019-0708 | POC Details |
| 63 | A quick scanner for the CVE-2019-0708 "BlueKeep" vulnerability. | https://github.com/Gh0st0ne/rdpscan-BlueKeep | POC Details |
| 64 | An Attempt to Port BlueKeep PoC from @Ekultek to actual exploits | https://github.com/algo7/bluekeep_CVE-2019-0708_poc_to_exploit | POC Details |
| 65 | None | https://github.com/JasonLOU/CVE-2019-0708 | POC Details |
| 66 | CVE-2019-0708批量蓝屏恶搞 | https://github.com/AdministratorGithub/CVE-2019-0708 | POC Details |
| 67 | CVE-2019-0708 - BlueKeep (RDP) | https://github.com/umarfarook882/CVE-2019-0708 | POC Details |
| 68 | Python script to detect bluekeep vulnerability (CVE-2019-0708) with TLS/SSL and x509 support | https://github.com/HynekPetrak/detect_bluekeep.py | POC Details |
| 69 | CVE-2019-0708批量检测 | https://github.com/Pa55w0rd/CVE-2019-0708 | POC Details |
| 70 | CVE-2019-0708-PoC It is a semi-functional exploit capable of remotely accessing a Windows computer by exploiting the aforementioned vulnerability, this repository also contains notes on how to complete the attack. | https://github.com/at0mik/CVE-2019-0708-PoC | POC Details |
| 71 | CVE-2019-0708-Msf-验证 | https://github.com/cream-sec/CVE-2019-0708-Msf-- | POC Details |
| 72 | 蓝屏poc | https://github.com/ZhaoYukai/CVE-2019-0708 | POC Details |
| 73 | 改写某大佬写的0708蓝屏脚本 改为网段批量蓝屏 | https://github.com/ZhaoYukai/CVE-2019-0708-Batch-Blue-Screen | POC Details |
| 74 | None | https://github.com/wdfcc/CVE-2019-0708 | POC Details |
| 75 | POC CVE-2019-0708 with python script! | https://github.com/cvencoder/cve-2019-0708 | POC Details |
| 76 | None | https://github.com/ze0r/CVE-2019-0708-exp | POC Details |
| 77 | Metasploit module for massive Denial of Service using #Bluekeep vector. | https://github.com/mekhalleh/cve-2019-0708 | POC Details |
| 78 | CVE-2019-0708 Exploit Tool | https://github.com/cve-2019-0708-poc/cve-2019-0708 | POC Details |
| 79 | Scanner PoC for CVE-2019-0708 RDP RCE vuln | https://github.com/andripwn/CVE-2019-0708 | POC Details |
| 80 | Public work for CVE-2019-0708 | https://github.com/0xeb-bp/bluekeep | POC Details |
| 81 | 收集网上CVE-2018-0708的poc和exp(目前没有找到exp) | https://github.com/ntkernel0/CVE-2019-0708 | POC Details |
| 82 | rce exploit , made to work with pocsuite3 | https://github.com/dorkerdevil/Remote-Desktop-Services-Remote-Code-Execution-Vulnerability-CVE-2019-0708- | POC Details |
| 83 | Research Regarding CVE-2019-0708. | https://github.com/turingcompl33t/bluekeep | POC Details |
| 84 | None | https://github.com/fade-vivida/CVE-2019-0708-test | POC Details |
| 85 | CVE-2019-0708 BlueKeep漏洞批量扫描工具和POC,暂时只有蓝屏。 | https://github.com/skommando/CVE-2019-0708 | POC Details |
| 86 | Metasploit module for CVE-2019-0708 (BlueKeep) - https://github.com/rapid7/metasploit-framework/tree/5a0119b04309c8e61b44763ac08811cd3ecbbf8d/modules/exploits/windows/rdp | https://github.com/RickGeex/msf-module-CVE-2019-0708 | POC Details |
| 87 | initial exploit for CVE-2019-0708, BlueKeep CVE-2019-0708 BlueKeep RDP Remote Windows Kernel Use After Free The RDP termdd.sys driver improperly handles binds to internal-only channel MS_T120, allowing a malformed Disconnect Provider Indication message to cause use-after-free. With a controllable data/size remote nonpaged pool spray, an indirect call gadget of the freed channel is used to achieve arbitrary code execution. | https://github.com/wqsemc/CVE-2019-0708 | POC Details |
| 88 | CVE-2019-0708RDP MSF | https://github.com/Micr067/CVE-2019-0708RDP-MSF | POC Details |
| 89 | CVE-2019-0708 With Metasploit-Framework Exploit | https://github.com/FrostsaberX/CVE-2019-0708 | POC Details |
| 90 | CVE-2019-0708 RCE远程代码执行getshell教程 | https://github.com/0x6b7966/CVE-2019-0708-RCE | POC Details |
| 91 | CVE-2019-0708-EXP(MSF) Vulnerability exploit program for cve-2019-0708 | https://github.com/qing-root/CVE-2019-0708-EXP-MSF- | POC Details |
| 92 | None | https://github.com/distance-vector/CVE-2019-0708 | POC Details |
| 93 | CVE-2019-0708 C#验证漏洞 | https://github.com/0xFlag/CVE-2019-0708-test | POC Details |
| 94 | None | https://github.com/1aa87148377/CVE-2019-0708 | POC Details |
| 95 | it works on xp (all version sp2 sp3) | https://github.com/coolboy4me/cve-2019-0708_bluekeep_rce | POC Details |
| 96 | ispy V1.0 - Eternalblue(ms17-010)/Bluekeep(CVE-2019-0708) Scanner and exploit ( Metasploit automation ) | https://github.com/Cyb0r9/ispy | POC Details |
| 97 | CVE-2019-0708 | https://github.com/lwtz/CVE-2019-0708 | POC Details |
| 98 | None | https://github.com/ulisesrc/-2-CVE-2019-0708 | POC Details |
| 99 | CVE-2019-0708 (BlueKeep) | https://github.com/worawit/CVE-2019-0708 | POC Details |
| 100 | Mass exploit for CVE-2019-0708 | https://github.com/Ameg-yag/Wincrash | POC Details |
| 101 | CVE-2019-0708-EXP-Windows版单文件exe版,运行后直接在当前控制台反弹System权限Shell | https://github.com/cbwang505/CVE-2019-0708-EXP-Windows | POC Details |
| 102 | 这篇文章将分享Windows远程桌面服务漏洞(CVE-2019-0708),并详细讲解该漏洞及防御措施。作者作为网络安全的小白,分享一些自学基础教程给大家,主要是关于安全工具和实践操作的在线笔记,希望您们喜欢。同时,更希望您能与我一起操作和进步,后续将深入学习网络安全和系统安全知识并分享相关实验。总之,希望该系列文章对博友有所帮助,写文不易,大神们不喜勿喷,谢谢! | https://github.com/eastmountyxz/CVE-2019-0708-Windows | POC Details |
| 103 | CVE-2019-0708 (BlueKeep) proof of concept allowing pre-auth RCE on Windows7 | https://github.com/RICSecLab/CVE-2019-0708 | POC Details |
| 104 | Scanner CVE-2019-0708 | https://github.com/JSec1337/Scanner-CVE-2019-0708 | POC Details |
| 105 | vulnerabilidad CVE-2019-0708 testing y explotacion | https://github.com/nochemax/bLuEkEeP-GUI | POC Details |
| 106 | None | https://github.com/AaronCaiii/CVE-2019-0708-POC | POC Details |
| 107 | Scan through given ip list | https://github.com/DeathStroke-source/Mass-scanner-for-CVE-2019-0708-RDP-RCE-Exploit | POC Details |
| 108 | None | https://github.com/go-bi/CVE-2019-0708-EXP-Windows | POC Details |
| 109 | POC-CVE-2019-0708 | https://github.com/CircuitSoul/CVE-2019-0708 | POC Details |
| 110 | None | https://github.com/pywc/CVE-2019-0708 | POC Details |
| 111 | None | https://github.com/bibo318/kali-CVE-2019-0708-lab | POC Details |
| 112 | None | https://github.com/lisinan988/CVE-2019-0708-scan | POC Details |
| 113 | CVE-2019-0708 DOS RDP | https://github.com/5l1v3r1/CVE-2019-0708-DOS | POC Details |
| 114 | None | https://github.com/offensity/CVE-2019-0708 | POC Details |
| 115 | MS CVE 2019-0708 Python Exploit | https://github.com/CPT-Jack-A-Castle/Haruster-CVE-2019-0708-Exploit | POC Details |
| 116 | CVE-2019-0708, A tool which mass hunts for bluekeep vulnerability for exploitation. | https://github.com/Ravaan21/Bluekeep-Hunter | POC Details |
| 117 | Checker and exploit for Bluekeep CVE-2019-0708 vulnerability | https://github.com/davidfortytwo/bluekeep | POC Details |
| 118 | a simple tool to detect the exploitation of BlueKeep vulnerability (CVE-2019-0708) | https://github.com/tranqtruong/Detect-BlueKeep | POC Details |
| 119 | CVE-2019-0708 Exploit With 100% Success Ratio You Can Pay a reasonable Price for my hard Time Gone For this exploit | https://github.com/jdouglas12a/CVE-2019-0708 | POC Details |
| 120 | None | https://github.com/rasan2001/CVE-2019-0708 | POC Details |
| 121 | None | https://github.com/adyanamul/Remote-Code-Execution-RCE-Exploit-BlueKeep-CVE-2019-0708-PoC | POC Details |
| 122 | None | https://github.com/rasan2001/Microsoft-Remote-Desktop-Services-Remote-Code-Execution-Vulnerability-CVE-2019-0708 | POC Details |
| 123 | CVE Exploitation Reports: CVE-2007-3280, CVE-2017-0144, CVE-2019-0708 | https://github.com/DenuwanJayasekara/CVE-Exploitation-Reports | POC Details |
| 124 | None | https://github.com/hualy13/CVE-2019-0708-Check | POC Details |
| 125 | None | https://github.com/Threekiii/Awesome-POC/blob/master/%E6%93%8D%E4%BD%9C%E7%B3%BB%E7%BB%9F%E6%BC%8F%E6%B4%9E/Windows%20%E8%BF%9C%E7%A8%8B%E6%A1%8C%E9%9D%A2%E6%9C%8D%E5%8A%A1%E6%BC%8F%E6%B4%9E%20CVE-2019-0708.md | POC Details |
| 126 | None | https://github.com/isabelacostaz/CVE-2019-0708-POC | POC Details |
| 127 | CVE Exploitation Reports: CVE-2007-3280, CVE-2017-0144, CVE-2019-0708 | https://github.com/denuwanjayasekara/CVE-Exploitation-Reports | POC Details |
| 128 | A hands-on Windows 7 lab designed to demonstrate the real-world impact of the BlueKeep (CVE-2019-0708) vulnerability through practical exploitation and security analysis. | https://github.com/GopeshKachhadiya/Windows-2 | POC Details |
No public POC found.
Login to generate AI POCZaproxy alias impedit expedita quisquam pariatur exercitationem. Nemo rerum eveniet dolores rem quia dignissimos.