Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
10-question deep dive: root cause, exploitation, mitigation, urgency. Read summary free, full version requires login.
| # | POC Description | Source Link | Shenlong Link |
|---|---|---|---|
| 1 | PoC - CVE-2025-24071 / CVE-2025-24054, NTMLv2 hash'leri alınabilen bir vulnerability | https://github.com/xigney/CVE-2025-24054_PoC | POC Details |
| 2 | Proof of Concept for the NTLM Hash Leak via .library-ms CVE-2025-24054 / CVE-2025-24071 | https://github.com/helidem/CVE-2025-24054_CVE-2025-24071-PoC | POC Details |
| 3 | None | https://github.com/S4mma3l/CVE-2025-24054 | POC Details |
| 4 | Vulnerabilidad NTLM (CVE-2025-24054) explotada para robo de hashes | https://github.com/moften/CVE-2025-24054 | POC Details |
| 5 | CVE 2025 24054 | https://github.com/Yuri08loveElaina/CVE-2025-24054_POC | POC Details |
| 6 | PoC - CVE-2025-24071 / CVE-2025-24054, NTMLv2 hash'leri alınabilen bir vulnerability | https://github.com/basekilll/CVE-2025-24054_PoC | POC Details |
| 7 | 🛠️ Exploit NTLM hash leaks via `.library-ms` files on unpatched Windows systems for research with this proof of concept and setup instructions. | https://github.com/yum1ra/CVE-2025-24054_CVE-2025-24071-PoC | POC Details |
| 8 | A proof of concept for CVE-2025-24054/CVE-2025-24071 | https://github.com/Wind010/CVE-2025-24054_PoC | POC Details |
| 9 | Windows File Explorer Zero Click NTLMv2-SSP Hash Disclosure | https://github.com/Untouchable17/CVE-2025-24054 | POC Details |
| 10 | CVE-2025-24054 And CVE-2025-24071-PoC | https://github.com/WhiteDominion/CVE-2025-24054_CVE-2025-24071-PoC | POC Details |
No public POC found.
Login to generate AI POC| CVE-2025-26645 | 8.8 HIGH | Remote Desktop Client Remote Code Execution Vulnerability |
| CVE-2025-24056 | 8.8 HIGH | Windows Telephony Service Remote Code Execution Vulnerability |
| CVE-2025-24051 | 8.8 HIGH | Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability |
| CVE-2025-24049 | 8.4 HIGH | Azure Command Line Integration (CLI) Elevation of Privilege Vulnerability |
| CVE-2025-24084 | 8.4 HIGH | Windows Subsystem for Linux (WSL2) Kernel Remote Code Execution Vulnerability |
| CVE-2025-24064 | 8.1 HIGH | Windows Domain Name Service Remote Code Execution Vulnerability |
| CVE-2025-24045 | 8.1 HIGH | Windows Remote Desktop Services Remote Code Execution Vulnerability |
| CVE-2025-24035 | 8.1 HIGH | Windows Remote Desktop Services Remote Code Execution Vulnerability |
| CVE-2025-24993 | 7.8 HIGH | Windows NTFS Remote Code Execution Vulnerability |
| CVE-2025-24044 | 7.8 HIGH | Windows Win32 Kernel Subsystem Elevation of Privilege Vulnerability |
| CVE-2025-26629 | 7.8 HIGH | Microsoft Office Remote Code Execution Vulnerability |
| CVE-2025-24066 | 7.8 HIGH | Kernel Streaming Service Driver Elevation of Privilege Vulnerability |
| CVE-2025-24059 | 7.8 HIGH | Windows Common Log File System Driver Elevation of Privilege Vulnerability |
| CVE-2025-24061 | 7.8 HIGH | Windows Mark of the Web Security Feature Bypass Vulnerability |
| CVE-2025-24057 | 7.8 HIGH | Microsoft Office Remote Code Execution Vulnerability |
| CVE-2025-24077 | 7.8 HIGH | Microsoft Word Remote Code Execution Vulnerability |
| CVE-2025-24050 | 7.8 HIGH | Windows Hyper-V Elevation of Privilege Vulnerability |
| CVE-2025-24048 | 7.8 HIGH | Windows Hyper-V Elevation of Privilege Vulnerability |
| CVE-2025-24046 | 7.8 HIGH | Kernel Streaming Service Driver Elevation of Privilege Vulnerability |
| CVE-2025-24067 | 7.8 HIGH | Kernel Streaming Service Driver Elevation of Privilege Vulnerability |
Showing top 20 of 57 CVEs. View all on vendor page → →
No comments yet