Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2019-0708 PoC — Microsoft Remote Desktop Services 资源管理错误漏洞

Source
Associated Vulnerability
Title:Microsoft Remote Desktop Services 资源管理错误漏洞 (CVE-2019-0708)
Description:Microsoft Windows和Microsoft Windows Server都是美国微软(Microsoft)公司的产品。Microsoft Windows是一套个人设备使用的操作系统。Microsoft Windows Server是一套服务器操作系统。Remote Desktop Services是其中的一个远程桌面服务组件。 Microsoft Remote Desktop Services中存在资源管理错误漏洞。该漏洞源于网络系统或产品对系统资源(如内存、磁盘空间、文件等)的管理不当。以下
Description
CVE Exploitation Reports: CVE-2007-3280, CVE-2017-0144, CVE-2019-0708
Readme
# CVE-Exploitation-Reports

CVE Exploitation Reports: **CVE-2007-3280, CVE-2017-0144, CVE-2019-0708**
This repository contains detailed exploitation reports for the following Common Vulnerabilities and Exposures (CVEs):

CVE-2007-3280: A buffer overflow vulnerability in the RealPlayer ActiveX control, which allows remote attackers to execute arbitrary code via a crafted URL.

CVE-2017-0144: The vulnerability associated with the EternalBlue exploit, targeting Microsoft SMBv1, which was a critical factor in the spread of the WannaCry ransomware.

CVE-2019-0708: A critical Remote Code Execution (RCE) vulnerability, commonly referred to as BlueKeep, in Microsoft's Remote Desktop Services, which can allow unauthenticated attackers to gain control of affected systems.

Each report includes:

In-depth analysis of the vulnerability.
Detailed step-by-step reproduction and exploitation techniques.
Mitigation strategies and defensive measures.
These reports are intended for educational purposes, helping security professionals understand the inner workings of these vulnerabilities to better protect against real-world attacks.

File Snapshot

[4.0K] /data/pocs/91c64bfa7c0b95e0433fdaea5bbc451fdf4777a8 ├── [645K] IT22589668 - CVE-2007-3280.pdf ├── [837K] IT22589668 - CVE-2017-0144.pdf ├── [922K] IT22589668 - CVE-2019-0708.pdf ├── [ 129] IT22589668 - TryHackMe.txt └── [1.1K] README.md 0 directories, 5 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.