Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
10-question deep dive: root cause, exploitation, mitigation, urgency. Read summary free, full version requires login.
| Vendor | Product | Affected Versions | CPE | Subscribe |
|---|---|---|---|---|
| Microsoft Corporation | Windows SMB | The SMBv1 server in Microsoft Windows Vista SP2; Windows Server 2008 SP2 and R2 SP1; Windows 7 SP1; Windows 8.1; Windows Server 2012 Gold and R2; Windows RT 8.1; and Windows 10 Gold, 1511, and 1607 | - |
| # | POC Description | Source Link | Shenlong Link |
|---|---|---|---|
| 1 | An internet scanner for exploit CVE-2017-0144 (Eternal Blue) & CVE-2017-0145 (Eternal Romance) | https://github.com/peterpt/eternal_scanner | POC Details |
| 2 | CVE-2017-0144 | https://github.com/kimocoder/eternalblue | POC Details |
| 3 | None | https://github.com/EEsshq/CVE-2017-0144---EtneralBlue-MS17-010-Remote-Code-Execution | POC Details |
| 4 | Chương trình theo dõi, giám sát lưu lượng mạng được viết bằng Python, nó sẽ đưa ra cảnh báo khi phát hiện tấn công CVE-2017-0144 | https://github.com/quynhold/Detect-CVE-2017-0144-attack | POC Details |
| 5 | LAB: TẤN CÔNG HỆ ĐIỀU HÀNH WINDOWS DỰA VÀO LỖ HỔNG GIAO THỨC SMB. | https://github.com/ducanh2oo3/Vulnerability-Research-CVE-2017-0144 | POC Details |
| 6 | CVE-2017-0144 (Eternal Blue) | CVE-2023-3881 | CVE-2011-2523 | https://github.com/AnugiArrawwala/CVE-Research | POC Details |
| 7 | Can you exploit the EternalBlue vulnerability (CVE-2017-0144) on a Windows 7 system and retrieve the hidden flag? Your goal is to gain administrative privileges and locate the flag.txt file stored in the `C:\Windows\System32` directory. | https://github.com/sethwhy/BlueDoor | POC Details |
| 8 | AutoBlue - Automated EternalBlue (CVE-2017-0144 / MS17-010) exploitation tool leveraging Nmap and Metasploit for ethical hacking, penetration testing, and CTF challenges. Strictly for authorized and educational use only! | https://github.com/AtithKhawas/autoblue | POC Details |
| 9 | This script checks for devices vulnerable to the EternalBlue exploit (CVE-2017-0144) in a network using SMB. | https://github.com/MedX267/EternalBlue-Vulnerability-Scanner | POC Details |
| 10 | Automated bash script which scans an ip for potential vulnerability to eternalblue using nmap and then exploit using metasploit framework which uses the CVE-2017-0144 vulnerability[Code name: EternalBlue] in (windows 7,windows 2008 servers,etc.) to gain access to a windows 7 machine and establish a reverse meterpreter shell. | https://github.com/pelagornisandersi/WIndows-7-automated-exploitation-using-metasploit-framework- | POC Details |
| 11 | None | https://github.com/luckyman2907/SMB-Protocol-Vulnerability_CVE-2017-0144 | POC Details |
| 12 | This report outlines a structured VAPT engagement focusing on PCI DSS compliance, SMB service enumeration, and exploitation of CVE-2017-0144 (EternalBlue) on a Windows 10 machine within a finance-oriented infrastructure. | https://github.com/AdityaBhatt3010/VAPT-Report-on-SMB-Exploitation-in-Windows-10-Finance-Endpoint | POC Details |
| 13 | Educational documentation on EternalBlue (CVE-2017-0144) – Windows SMB vulnerability, history, and mitigation. No exploit code. | https://github.com/nivedh-j/EternalBlue-Explained | POC Details |
| 14 | CVE-2017-0144 | https://github.com/B1ack4sh/Blackash-CVE-2017-0144 | POC Details |
| 15 | None | https://github.com/AbbeAlthany/Windows-7_och_CVE-2017-0144_Exploit | POC Details |
| 16 | CVE-2017-0144 | https://github.com/Ashwesker/Blackash-CVE-2017-0144 | POC Details |
| 17 | The SMBv1 server in Microsoft Windows Vista SP2; Windows Server 2008 SP2 and R2 SP1; Windows 7 SP1; Windows 8.1; Windows Server 2012 Gold and R2; Windows RT 8.1; and Windows 10 Gold, 1511, and 1607; and Windows Server 2016 allows remote attackers to execute arbitrary code via crafted packets, aka "Windows SMB Remote Code Execution Vulnerability." | https://github.com/Mitsu-bis/Eternal-Blue-CVE-2017-0144-THM-Write-Up | POC Details |
| 18 | CVE-2017-0144 | https://github.com/FireTemple/Blackash-CVE-2017-0144 | POC Details |
No public POC found.
Login to generate AI POC| CVE-2017-0100 | Microsoft Windows COM 权限许可和访问控制漏洞 | |
| CVE-2017-0116 | Microsoft Windows Uniscribe 信息泄露漏洞 | |
| CVE-2017-0115 | Microsoft Windows Uniscribe 信息泄露漏洞 | |
| CVE-2017-0114 | Microsoft Windows Uniscribe 信息泄露漏洞 | |
| CVE-2017-0113 | Microsoft Windows Uniscribe 信息泄露漏洞 | |
| CVE-2017-0112 | Microsoft Windows Uniscribe 信息泄露漏洞 | |
| CVE-2017-0111 | Microsoft Windows Uniscribe 信息泄露漏洞 | |
| CVE-2017-0110 | Microsoft Exchange Server 权限许可和访问控制漏洞 | |
| CVE-2017-0109 | Microsoft Windows Hyper-V 安全漏洞 | |
| CVE-2017-0108 | 多款Microsoft产品Windows Graphics组件缓冲区错误漏洞 | |
| CVE-2017-0107 | Microsoft SharePoint 跨站脚本漏洞 | |
| CVE-2017-0105 | Microsoft Office 信息泄露漏洞 | |
| CVE-2017-0104 | Microsoft Windows iSNS服务器安全漏洞 | |
| CVE-2017-0103 | Microsoft Windows Registry 权限许可和访问控制漏洞 | |
| CVE-2017-0102 | Microsoft Windows 权限许可和访问控制漏洞 | |
| CVE-2017-0101 | Microsoft Windows Transaction Manager 权限许可和访问控制漏洞 | |
| CVE-2017-0088 | Microsoft Windows Uniscribe 缓冲区错误漏洞 | |
| CVE-2017-0087 | Microsoft Windows Uniscribe 缓冲区错误漏洞 | |
| CVE-2017-0086 | Microsoft Windows Uniscribe 缓冲区错误漏洞 | |
| CVE-2017-0089 | Microsoft Windows Uniscribe 缓冲区错误漏洞 |
Showing top 20 of 129 CVEs. View all on vendor page → →
No comments yet