尽管我们使用了先进的大模型技术,但其输出仍可能包含不准确或过时的信息。神龙努力确保数据的准确性,但请您根据实际情况进行核实和判断。
| 厂商 | 产品 | 影响版本 | CPE | 订阅 |
|---|---|---|---|---|
| Microsoft | Windows Server 2012 | 6.2.9200.0 ~ 6.2.9200.25728 | - | |
| Microsoft | Windows Server 2012 (Server Core installation) | 6.2.9200.0 ~ 6.2.9200.25728 | - | |
| Microsoft | Windows Server 2012 R2 | 6.3.9600.0 ~ 6.3.9600.22826 | - | |
| Microsoft | Windows Server 2012 R2 (Server Core installation) | 6.3.9600.0 ~ 6.3.9600.22826 | - | |
| Microsoft | Windows Server 2016 | 10.0.14393.0 ~ 10.0.14393.8524 | - | |
| Microsoft | Windows Server 2016 (Server Core installation) | 10.0.14393.0 ~ 10.0.14393.8524 | - | |
| Microsoft | Windows Server 2019 | 10.0.17763.0 ~ 10.0.17763.7922 | - | |
| Microsoft | Windows Server 2019 (Server Core installation) | 10.0.17763.0 ~ 10.0.17763.7922 | - | |
| Microsoft | Windows Server 2022 | 10.0.20348.0 ~ 10.0.20348.4297 | - | |
| Microsoft | Windows Server 2022, 23H2 Edition (Server Core installation) | 10.0.25398.0 ~ 10.0.25398.1916 | - | |
| Microsoft | Windows Server 2025 | 10.0.26100.0 ~ 10.0.26100.6905 | - | |
| Microsoft | Windows Server 2025 (Server Core installation) | 10.0.26100.0 ~ 10.0.26100.6905 | - |
| # | POC 描述 | 源链接 | 神龙链接 |
|---|---|---|---|
| 1 | PoC from hawktrace | https://github.com/keeganparr1/CVE-2025-59287-hawktrace | POC详情 |
| 2 | WSUS Unauthenticated RCE | https://github.com/jiansiting/CVE-2025-59287 | POC详情 |
| 3 | It is an Working exploit of new CVE found in WSUS. | https://github.com/garvitv14/CVE-2025-59287 | POC详情 |
| 4 | Windows Server Update Service contains an insecure deserialization vulnerability caused by deserialization of untrusted data. An unauthorized attacker with network access can exploit this to execute arbitrary code remotely, potentially leading to full system compromise. | https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2025/CVE-2025-59287.yaml | POC详情 |
| 5 | PoC for CVE-2025-59287 | https://github.com/0xBruno/WSUSploit.NET | POC详情 |
| 6 | Defensive PoC decoy for CVE-2025-59287 (WSUS) - emulates WSUS endpoints, captures request bodies and metadata, saves evidence for forensic analysis, and provides validation harness and detection rules. | https://github.com/Lupovis/Honeypot-for-CVE-2025-59287-WSUS | POC详情 |
| 7 | CVE-2025-59287 | https://github.com/FurkanKAYAPINAR/CVE-2025-59287 | POC详情 |
| 8 | powershell version of hawktrace POC exploit | https://github.com/tecxx/CVE-2025-59287-WSUS | POC详情 |
| 9 | Module PowerShell de réponse à l'incident CVE-2025-59287 — WSUS Remote Code Execution (RCE) | https://github.com/RadzaRr/WSUSResponder | POC详情 |
| 10 | Helps defenders find their WSUS configurations in the wake of CVE-2025-59287 | https://github.com/mubix/Find-WSUS | POC详情 |
| 11 | CVE-2025-59287 is a critical RCE vulnerability in Windows Server Update Services (WSUS) caused by unsafe deserialization of untrusted data. It allows remote attackers to execute arbitrary code without authentication. Urgent patching is advised due to active exploitation. | https://github.com/mrk336/Breaking-the-Update-Chain-Inside-CVE-2025-59287-and-the-WSUS-RCE-Threat | POC详情 |
| 12 | CVE-2025-59287 — Critical unauthenticated RCE in Windows Server Update Services (WSUS) via unsafe deserialization of an AuthorizationCookie, enabling SYSTEM-level compromise and active exploitation; patch or isolate WSUS (ports 8530/8531) immediately. | https://github.com/AdityaBhatt3010/CVE-2025-59287-When-your-patch-server-becomes-the-attack-vector | POC详情 |
| 13 | Guía de respuesta rápida y script de auditoría para CVE-2025-59287 (RCE crítica en WSUS). | https://github.com/esteban11121/WSUS-RCE-Mitigation-59287 | POC详情 |
| 14 | Verificacion de vulnerabilidad en WSUS | https://github.com/fsanzmoya/wsus_CVE-2025-59287 | POC详情 |
| 15 | CVE-2025-59287 注入WolfShell内存马 | https://github.com/0x7556/CVE-2025-59287 | POC详情 |
| 16 | This is an exploit script written in C# to aid gaining a reverse shell on targets with Windows Server Update Service(WSUS) CVE-2025-59287. We will deliver a reverse shell payload through encrypted SOAP req. | https://github.com/QurtiDev/WSUS-CVE-2025-59287-RCE | POC详情 |
| 17 | WSUS vulnerability PoC | https://github.com/Sid6Effect/CVE-2025-59287 | POC详情 |
| 18 | Exploitation proof-of-concept for CVE-2025-59287 - a critical vulnerability in the Windows Server Update Service (WSUS) caused by the deserialization of untrusted data. This flaw allows an unauthorized attacker to execute arbitrary code over a network, posing a significant security risk. | https://github.com/dexterm300/cve-2025-59287-exploit-poc | POC详情 |
| 19 | WSUS vulnerability PoC | https://github.com/th1n0/CVE-2025-59287 | POC详情 |
| 20 | None | https://github.com/Twodimensionalitylevelcrossing817/CVE-2025-59287 | POC详情 |
| 21 | None | https://github.com/Adel-kaka-dz/cve-2025-59287 | POC详情 |
| 22 | None | https://github.com/17patmaks/CVE-2025-59287-Sigma-Rule | POC详情 |
| 23 | CVE-2025-59287 | https://github.com/gud425/gud425.github.io | POC详情 |
| 24 | None | https://github.com/LuemmelSec/CVE-2025-59287---WSUS-SCCM-RCE | POC详情 |
| 25 | CVE 2025 59287 | https://github.com/you-dream-1hall/CVE-2025-59287 | POC详情 |
| 26 | 🔍 Analyze WSUS deserialization behavior to enhance security, generate reports, and identify configuration weaknesses in your infrastructure. | https://github.com/salman5230/CVE-2025-59287 | POC详情 |
| 27 | None | https://github.com/ross-ns/WSUS-CVE-2025-59287 | POC详情 |
| 28 | CVE 2025 59287 | https://github.com/vatslaaeytoygag/CVE-2025-59287 | POC详情 |
未找到公开 POC。
登录以生成 AI POC暂无评论