Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%
Get alerts for future matching vulnerabilitiesLog in to subscribe
I. Basic Information for CVE-2019-0708
Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Description
A remote code execution vulnerability exists in Remote Desktop Services formerly known as Terminal Services when an unauthenticated attacker connects to the target system using RDP and sends specially crafted requests, aka 'Remote Desktop Services Remote Code Execution Vulnerability'.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Title
Microsoft Remote Desktop Services 资源管理错误漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Microsoft Windows和Microsoft Windows Server都是美国微软(Microsoft)公司的产品。Microsoft Windows是一套个人设备使用的操作系统。Microsoft Windows Server是一套服务器操作系统。Remote Desktop Services是其中的一个远程桌面服务组件。 Microsoft Remote Desktop Services中存在资源管理错误漏洞。该漏洞源于网络系统或产品对系统资源(如内存、磁盘空间、文件等)的管理不当。以下
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)
Affected Products
VendorProductAffected VersionsCPESubscribe
MicrosoftWindows 7 for 32-bit Systems Service Pack 1 -
MicrosoftWindows Server 2008 R2 for x64-based Systems Service Pack 1 (Core installation) -
II. Public POCs for CVE-2019-0708
#POC DescriptionSource LinkShenlong Link
1proof of concept exploit for Microsoft Windows 7 and Server 2008 RDP vulnerabilityhttps://github.com/hook-s3c/CVE-2019-0708-pocPOC Details
2A Win7 RDP exploithttps://github.com/SherlockSec/CVE-2019-0708POC Details
3CVE-2019-0708https://github.com/yetiddbb/CVE-2019-0708-PoCPOC Details
4CVE-2019-0708-exploithttps://github.com/p0p0p0/CVE-2019-0708-exploitPOC Details
5Using CVE-2019-0708 to Locally Promote Privileges in Windows 10 Systemhttps://github.com/rockmelodies/CVE-2019-0708-ExploitPOC Details
6CVE-2019-0708 exphttps://github.com/anquanscan/CVE-2019-0708POC Details
7Dark Net Sunset New Release CVE-2019-0708https://github.com/xiyangzuishuai/Dark-Network-CVE-2019-0708POC Details
8CVE-2019-0708https://github.com/temp-user-2014/CVE-2019-0708POC Details
9Proof of concept exploit for CVE-2019-0708https://github.com/areusecure/CVE-2019-0708POC Details
10Testing my new bot outhttps://github.com/pry0cc/cve-2019-0708-2POC Details
11POCexp:https://pan.baidu.com/s/184gN1tJVIOYqOjaezM_VsA 提取码:e2k8 https://github.com/sbkcbig/CVE-2019-0708-EXPloitPOC Details
12EXPloit-poc: https://pan.baidu.com/s/184gN1tJVIOYqOjaezM_VsA 提取码:e2k8https://github.com/sbkcbig/CVE-2019-0708-EXPloit-3389POC Details
13CVE-2019-0708https://github.com/YSheldon/MS_T120POC Details
143389远程桌面代码执行漏洞CVE-2019-0708批量检测工具(Rdpscan Bluekeep Check)https://github.com/k8gege/CVE-2019-0708POC Details
15exploit CVE-2019-0708 RDShttps://github.com/hotdog777714/RDS_CVE-2019-0708POC Details
16RDP POChttps://github.com/jiansiting/CVE-2019-0708POC Details
17PoC exploit for BlueKeep (CVE-2019-0708)https://github.com/NullByteSuiteDevs/CVE-2019-0708POC Details
18sup pry0cc :3https://github.com/thugcrowd/CVE-2019-0708POC Details
19CVE-2019-0708https://github.com/blacksunwen/CVE-2019-0708POC Details
20Nonehttps://github.com/infenet/CVE-2019-0708POC Details
21Totally legitimatehttps://github.com/n0auth/CVE-2019-0708POC Details
22Nonehttps://github.com/gildaaa/CVE-2019-0708POC Details
23CVE-2019-0708 EXPloit-poc 漏洞描述 微软官方紧急发布安全补丁,修复了一个Windows远程桌面服务的远程代码执行漏洞CVE-2019-0708,该漏洞影响了某些旧版本的Windows系统。此漏洞是预身份验证,无需用户交互。当未经身份验证的攻击者使用RDP(常见端口3389)连接到目标系统并发送特制请求时,可以在目标系统上执行任意命令。甚至传播恶意蠕虫,感染内网其他机器。类似于2017年爆发的WannaCry等恶意勒索软件病毒。 漏洞评级 CVE-2019-0708 严重 安全建议 1、针对Windows 7及Windows Server 2008的用户,及时安装官方安全补丁:https://www.catalog.update.microsoft.com/Search.aspx?q=KB4499175 2、针对Windows 2003及Windows XP的用户,及时更新系统版本或安装官方补丁:https://support.microsoft.com/zh-cn/help/4500705/customer-guidance-for-cve-2019-0708 CVE-2019-0708 EXPloit-poc 影响版本 Windows7 XP Windows 2003 Windows Server 2008 Windows Server 2008 R2 EXPloit-poc: https://pan.baidu.com/s/184gN1tJVIOYqOjaezM_VsA 提取码:e2k8https://github.com/sbkcbig/CVE-2019-0708-Poc-exploitPOC Details
24Nonehttps://github.com/HackerJ0e/CVE-2019-0708POC Details
25PoC about CVE-2019-0708 (RDP; Windows 7, Windows Server 2003, Windows Server 2008) https://github.com/syriusbughunt/CVE-2019-0708POC Details
26A remote code execution vulnerability exists in Remote Desktop Services – formerly known as Terminal Services – when an unauthenticated attacker connects to the target system using RDP and sends specially crafted requests. This vulnerability is pre-authentication and requires no user interaction. An attacker who successfully exploited this vulnerability could execute arbitrary code on the target system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights.https://github.com/Barry-McCockiner/CVE-2019-0708POC Details
27A remote code execution vulnerability exists in Remote Desktop Services – formerly known as Terminal Services – when an unauthenticated attacker connects to the target system using RDP and sends specially crafted requests. This vulnerability is pre-authentication and requires no user interaction. An attacker who successfully exploited this vulnerability could execute arbitrary code on the target system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights.https://github.com/ShadowBrokers-ExploitLeak/CVE-2019-0708POC Details
28CVE-2019-0708 demohttps://github.com/safly/CVE-2019-0708POC Details
29Nonehttps://github.com/Jaky5155/cve-2019-0708-expPOC Details
30Powershell script to run and determine if a specific device has been patched for CVE-2019-0708. This checks to see if the termdd.sys file has been updated appropriate and is at a version level at or greater than the versions released in the 5/14/19 patches.https://github.com/fourtwizzy/CVE-2019-0708-Check-Device-Patch-StatusPOC Details
31POC for CVE-2019-0708https://github.com/303sec/CVE-2019-0708POC Details
32PoC for CVE-2019-0708https://github.com/f8al/CVE-2019-0708-POCPOC Details
33CVE-2019-0708漏洞MSF批量巡检插件https://github.com/blockchainguard/CVE-2019-0708POC Details
34LOLhttps://github.com/yushiro/CVE-2019-0708POC Details
35It's only hitting vulnerable path in termdd.sys!!! NOT DOShttps://github.com/skyshell20082008/CVE-2019-0708-PoC-Hitting-PathPOC Details
36Announces fraudhttps://github.com/ttsite/CVE-2019-0708-POC Details
37Report fraudhttps://github.com/ttsite/CVE-2019-0708POC Details
38CVE-2019-0708 远程代码执行漏洞批量检测https://github.com/biggerwing/CVE-2019-0708-pocPOC Details
39dumphttps://github.com/n1xbyte/CVE-2019-0708POC Details
40High level exploithttps://github.com/freeide/CVE-2019-0708POC Details
41根据360的程序,整的CVE-2019-0708批量检测https://github.com/edvacco/CVE-2019-0708-POCPOC Details
42My bot (badly written) to search and monitor cve-2019-0708 repositories https://github.com/pry0cc/BlueKeepTrackerPOC Details
43Nonehttps://github.com/zjw88282740/CVE-2019-0708-win7POC Details
44Scanner PoC for CVE-2019-0708 RDP RCE vulnhttps://github.com/victor0013/CVE-2019-0708POC Details
45根据360Vulcan Team开发的CVE-2019-0708单个IP检测工具构造了个批量检测脚本而已https://github.com/herhe/CVE-2019-0708pocPOC Details
46cve-2019-0708 vulnerablility scannerhttps://github.com/l9c/rdp0708scannerPOC Details
47Nonehttps://github.com/major203/cve-2019-0708-scanPOC Details
48Check vuln CVE 2019-0708https://github.com/SugiB3o/Check-vuln-CVE-2019-0708POC Details
49Goby support CVE-2019-0708 "BlueKeep" vulnerability checkhttps://github.com/gobysec/CVE-2019-0708POC Details
50Working proof of concept for CVE-2019-0708, spawns remote shell.https://github.com/smallFunction/CVE-2019-0708-POCPOC Details
51CVE-2019-0708 PoC Exploithttps://github.com/freeide/CVE-2019-0708-PoC-ExploitPOC Details
52A quick scanner for the CVE-2019-0708 "BlueKeep" vulnerability.https://github.com/robertdavidgraham/rdpscanPOC Details
53cve-2019-0708 poc .https://github.com/closethe/CVE-2019-0708-POCPOC Details
5450 first stargazers will get get the tool via emailhttps://github.com/SQLDebugger/CVE-2019-0708-ToolPOC Details
55CVE-2019-0708https://github.com/Rostelecom-CERT/bluekeepscanPOC Details
56Only Hitting PoC [Tested on Windows Server 2008 r2]https://github.com/Leoid/CVE-2019-0708POC Details
57基于360公开的无损检测工具的可直接在windows上运行的批量检测程序https://github.com/ht0Ruial/CVE-2019-0708Poc-BatchScanningPOC Details
58CVE-2019-0708 bluekeep 漏洞检测https://github.com/oneoy/BlueKeepPOC Details
59Nonehttps://github.com/infiniti-team/CVE-2019-0708POC Details
60Nonehttps://github.com/haishanzheng/CVE-2019-0708-generate-hostsPOC Details
61Proof of concept for CVE-2019-0708https://github.com/Ekultek/BlueKeepPOC Details
62CVE-2019-0708https://github.com/UraSecTeam/CVE-2019-0708POC Details
63A quick scanner for the CVE-2019-0708 "BlueKeep" vulnerability. https://github.com/Gh0st0ne/rdpscan-BlueKeepPOC Details
64An Attempt to Port BlueKeep PoC from @Ekultek to actual exploitshttps://github.com/algo7/bluekeep_CVE-2019-0708_poc_to_exploitPOC Details
65Nonehttps://github.com/JasonLOU/CVE-2019-0708POC Details
66CVE-2019-0708批量蓝屏恶搞https://github.com/AdministratorGithub/CVE-2019-0708POC Details
67CVE-2019-0708 - BlueKeep (RDP)https://github.com/umarfarook882/CVE-2019-0708POC Details
68Python script to detect bluekeep vulnerability (CVE-2019-0708) with TLS/SSL and x509 supporthttps://github.com/HynekPetrak/detect_bluekeep.pyPOC Details
69CVE-2019-0708批量检测https://github.com/Pa55w0rd/CVE-2019-0708POC Details
70CVE-2019-0708-PoC It is a semi-functional exploit capable of remotely accessing a Windows computer by exploiting the aforementioned vulnerability, this repository also contains notes on how to complete the attack.https://github.com/at0mik/CVE-2019-0708-PoCPOC Details
71CVE-2019-0708-Msf-验证https://github.com/cream-sec/CVE-2019-0708-Msf--POC Details
72蓝屏pochttps://github.com/ZhaoYukai/CVE-2019-0708POC Details
73改写某大佬写的0708蓝屏脚本 改为网段批量蓝屏https://github.com/ZhaoYukai/CVE-2019-0708-Batch-Blue-ScreenPOC Details
74Nonehttps://github.com/wdfcc/CVE-2019-0708POC Details
75POC CVE-2019-0708 with python script!https://github.com/cvencoder/cve-2019-0708POC Details
76Nonehttps://github.com/ze0r/CVE-2019-0708-expPOC Details
77Metasploit module for massive Denial of Service using #Bluekeep vector.https://github.com/mekhalleh/cve-2019-0708POC Details
78CVE-2019-0708 Exploit Toolhttps://github.com/cve-2019-0708-poc/cve-2019-0708POC Details
79Scanner PoC for CVE-2019-0708 RDP RCE vulnhttps://github.com/andripwn/CVE-2019-0708POC Details
80Public work for CVE-2019-0708https://github.com/0xeb-bp/bluekeepPOC Details
81收集网上CVE-2018-0708的poc和exp(目前没有找到exp)https://github.com/ntkernel0/CVE-2019-0708POC Details
82rce exploit , made to work with pocsuite3https://github.com/dorkerdevil/Remote-Desktop-Services-Remote-Code-Execution-Vulnerability-CVE-2019-0708-POC Details
83Research Regarding CVE-2019-0708.https://github.com/turingcompl33t/bluekeepPOC Details
84Nonehttps://github.com/fade-vivida/CVE-2019-0708-testPOC Details
85CVE-2019-0708 BlueKeep漏洞批量扫描工具和POC,暂时只有蓝屏。https://github.com/skommando/CVE-2019-0708POC Details
86Metasploit module for CVE-2019-0708 (BlueKeep) - https://github.com/rapid7/metasploit-framework/tree/5a0119b04309c8e61b44763ac08811cd3ecbbf8d/modules/exploits/windows/rdphttps://github.com/RickGeex/msf-module-CVE-2019-0708POC Details
87initial exploit for CVE-2019-0708, BlueKeep CVE-2019-0708 BlueKeep RDP Remote Windows Kernel Use After Free The RDP termdd.sys driver improperly handles binds to internal-only channel MS_T120, allowing a malformed Disconnect Provider Indication message to cause use-after-free. With a controllable data/size remote nonpaged pool spray, an indirect call gadget of the freed channel is used to achieve arbitrary code execution.https://github.com/wqsemc/CVE-2019-0708POC Details
88CVE-2019-0708RDP MSFhttps://github.com/Micr067/CVE-2019-0708RDP-MSFPOC Details
89CVE-2019-0708 With Metasploit-Framework Exploithttps://github.com/FrostsaberX/CVE-2019-0708POC Details
90CVE-2019-0708 RCE远程代码执行getshell教程https://github.com/0x6b7966/CVE-2019-0708-RCEPOC Details
91CVE-2019-0708-EXP(MSF) Vulnerability exploit program for cve-2019-0708https://github.com/qing-root/CVE-2019-0708-EXP-MSF-POC Details
92Nonehttps://github.com/distance-vector/CVE-2019-0708POC Details
93CVE-2019-0708 C#验证漏洞https://github.com/0xFlag/CVE-2019-0708-testPOC Details
94Nonehttps://github.com/1aa87148377/CVE-2019-0708POC Details
95it works on xp (all version sp2 sp3)https://github.com/coolboy4me/cve-2019-0708_bluekeep_rcePOC Details
96ispy V1.0 - Eternalblue(ms17-010)/Bluekeep(CVE-2019-0708) Scanner and exploit ( Metasploit automation )https://github.com/Cyb0r9/ispyPOC Details
97CVE-2019-0708https://github.com/lwtz/CVE-2019-0708POC Details
98Nonehttps://github.com/ulisesrc/-2-CVE-2019-0708POC Details
99CVE-2019-0708 (BlueKeep)https://github.com/worawit/CVE-2019-0708POC Details
100Mass exploit for CVE-2019-0708https://github.com/Ameg-yag/WincrashPOC Details
101CVE-2019-0708-EXP-Windows版单文件exe版,运行后直接在当前控制台反弹System权限Shellhttps://github.com/cbwang505/CVE-2019-0708-EXP-WindowsPOC Details
102这篇文章将分享Windows远程桌面服务漏洞(CVE-2019-0708),并详细讲解该漏洞及防御措施。作者作为网络安全的小白,分享一些自学基础教程给大家,主要是关于安全工具和实践操作的在线笔记,希望您们喜欢。同时,更希望您能与我一起操作和进步,后续将深入学习网络安全和系统安全知识并分享相关实验。总之,希望该系列文章对博友有所帮助,写文不易,大神们不喜勿喷,谢谢!https://github.com/eastmountyxz/CVE-2019-0708-WindowsPOC Details
103CVE-2019-0708 (BlueKeep) proof of concept allowing pre-auth RCE on Windows7https://github.com/RICSecLab/CVE-2019-0708POC Details
104Scanner CVE-2019-0708https://github.com/JSec1337/Scanner-CVE-2019-0708POC Details
105vulnerabilidad CVE-2019-0708 testing y explotacion https://github.com/nochemax/bLuEkEeP-GUIPOC Details
106Nonehttps://github.com/AaronCaiii/CVE-2019-0708-POCPOC Details
107Scan through given ip listhttps://github.com/DeathStroke-source/Mass-scanner-for-CVE-2019-0708-RDP-RCE-ExploitPOC Details
108Nonehttps://github.com/go-bi/CVE-2019-0708-EXP-WindowsPOC Details
109POC-CVE-2019-0708https://github.com/CircuitSoul/CVE-2019-0708POC Details
110Nonehttps://github.com/pywc/CVE-2019-0708POC Details
111Nonehttps://github.com/bibo318/kali-CVE-2019-0708-labPOC Details
112Nonehttps://github.com/lisinan988/CVE-2019-0708-scanPOC Details
113CVE-2019-0708 DOS RDPhttps://github.com/5l1v3r1/CVE-2019-0708-DOSPOC Details
114Nonehttps://github.com/offensity/CVE-2019-0708POC Details
115MS CVE 2019-0708 Python Exploithttps://github.com/CPT-Jack-A-Castle/Haruster-CVE-2019-0708-ExploitPOC Details
116CVE-2019-0708, A tool which mass hunts for bluekeep vulnerability for exploitation.https://github.com/Ravaan21/Bluekeep-HunterPOC Details
117Checker and exploit for Bluekeep CVE-2019-0708 vulnerabilityhttps://github.com/davidfortytwo/bluekeepPOC Details
118a simple tool to detect the exploitation of BlueKeep vulnerability (CVE-2019-0708)https://github.com/tranqtruong/Detect-BlueKeepPOC Details
119CVE-2019-0708 Exploit With 100% Success Ratio You Can Pay a reasonable Price for my hard Time Gone For this exploit https://github.com/jdouglas12a/CVE-2019-0708POC Details
120Nonehttps://github.com/rasan2001/CVE-2019-0708POC Details
121Nonehttps://github.com/adyanamul/Remote-Code-Execution-RCE-Exploit-BlueKeep-CVE-2019-0708-PoCPOC Details
122Nonehttps://github.com/rasan2001/Microsoft-Remote-Desktop-Services-Remote-Code-Execution-Vulnerability-CVE-2019-0708POC Details
123CVE Exploitation Reports: CVE-2007-3280, CVE-2017-0144, CVE-2019-0708https://github.com/DenuwanJayasekara/CVE-Exploitation-ReportsPOC Details
124Nonehttps://github.com/hualy13/CVE-2019-0708-CheckPOC Details
125Nonehttps://github.com/Threekiii/Awesome-POC/blob/master/%E6%93%8D%E4%BD%9C%E7%B3%BB%E7%BB%9F%E6%BC%8F%E6%B4%9E/Windows%20%E8%BF%9C%E7%A8%8B%E6%A1%8C%E9%9D%A2%E6%9C%8D%E5%8A%A1%E6%BC%8F%E6%B4%9E%20CVE-2019-0708.mdPOC Details
126Nonehttps://github.com/isabelacostaz/CVE-2019-0708-POCPOC Details
127CVE Exploitation Reports: CVE-2007-3280, CVE-2017-0144, CVE-2019-0708https://github.com/denuwanjayasekara/CVE-Exploitation-ReportsPOC Details
128A hands-on Windows 7 lab designed to demonstrate the real-world impact of the BlueKeep (CVE-2019-0708) vulnerability through practical exploitation and security analysis.https://github.com/GopeshKachhadiya/Windows-2POC Details
AI-Generated POCPremium

No public POC found.

Login to generate AI POC
III. Intelligence Information for CVE-2019-0708
Please Login to view more intelligence information
IV. Related Vulnerabilities
V. Comments for CVE-2019-0708
Anonymous User
2026-01-15 06:09:08

Zaproxy alias impedit expedita quisquam pariatur exercitationem. Nemo rerum eveniet dolores rem quia dignissimos.


Leave a comment