Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2019-0709 PoC — Windows Hyper-V Remote Code Execution Vulnerability

Source
Associated Vulnerability
Title:Windows Hyper-V Remote Code Execution Vulnerability (CVE-2019-0709)
Description:A remote code execution vulnerability exists when Windows Hyper-V on a host server fails to properly validate input from an authenticated user on a guest operating system. To exploit the vulnerability, an attacker could run a specially crafted application on a guest operating system that could cause the Hyper-V host operating system to execute arbitrary code. An attacker who successfully exploited the vulnerability could execute arbitrary code on the host operating system. The security update addresses the vulnerability by correcting how Hyper-V validates guest operating system user input.
Description
Exploit In Progress
Readme
# CVE-2019-0708
Exploit In Progress
It hits the Vulnerable Function.
File Snapshot

[4.0K] /data/pocs/1309b6996444c23ba0f93944c8f915097a3b9888 ├── [9.4K] poc.py └── [ 69] README.md 0 directories, 2 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. Local POC snapshots are reserved for subscribers — if the original source is unavailable, the local mirror is part of the paid plan.
    3. Mirroring, verifying, and maintaining this POC archive takes ongoing effort, so local snapshots are a paid feature. Your subscription keeps the archive online — thank you for the support. View subscription plans →