The Server service in Microsoft Windows 2000 SP4, XP SP2 and SP3, Server 2003 SP1 and SP2, Vista Gold and SP1, Server 2008, and 7 Pre-Beta allows remote attackers to execute arbitrary code via a crafted RPC request that triggers the overflow during path canonicalization, as exploited in the wild by Gimmiv.A in October 2008, aka "Server Service Vulnerability."
- https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-067
- https://www.exploit-db.com/exploits/6824
- https://www.exploit-db.com/exploits/6841
- https://www.exploit-db.com/exploits/7104
- https://www.exploit-db.com/exploits/7132
- https://github.com/0xwh1pl4sh/MS08-067
- https://github.com/4070E034/gank
- https://github.com/4070E071/nmap
- https://github.com/4n0nym0u5dk/MS08_067_CVE-2008-4250
- https://github.com/ARPSyndicate/cve-scores
- https://github.com/ARPSyndicate/cvemon
- https://github.com/Al1ex/WindowsElevation
- https://github.com/AnshumanSrivastavaGit/OSCP-3
- https://github.com/ArcadeHustle/X3_USB_softmod
- https://github.com/Ascotbe/Kernelhub
- https://github.com/BinRacer/ms08-067
- https://github.com/BinRacer/ms08-067.py
- https://github.com/BrennanStJohn/Sample_Pentest
- https://github.com/BrunoCRovira/LegacyHTB
- https://github.com/CVEDB/PoC-List
- https://github.com/CVEDB/awesome-cve-repo
- https://github.com/Cruxer8Mech/Idk
- https://github.com/H3xL00m/MS08-067
- https://github.com/JFR-C/Boot2root-CTFs-Writeups
- https://github.com/Jean-Francois-C/Boot2root-CTFs-Writeups
- https://github.com/Kuromesi/Py4CSKG
- https://github.com/N3rdyN3xus/MS08-067
- https://github.com/NoTrustedx/Exploit_MS08-067
- https://github.com/NyxByt3/MS08-067
- https://github.com/PuddinCat/GithubRepoSpider
- https://github.com/RodrigoVarasLopez/Download-Scanners-from-Nessus-8.7-using-the-API
- https://github.com/Seby26Dev/-HTB-Legacy
- https://github.com/SexyBeast233/SecBooks
- https://github.com/Sp3c73rSh4d0w/MS08-067
- https://github.com/TheLastochka/pentest
- https://github.com/TrojanAZhen/Self_Back
- https://github.com/VpSanta3/Rscan
- https://github.com/Y2FuZXBh/exploits
- https://github.com/ajb3932/AD_Pentesting
- https://github.com/amack3131/Legacy
- https://github.com/c0d3cr4f73r/MS08-067
- https://github.com/crypticdante/MS08-067
- https://github.com/cyberleelawat/LeelawatX-CVE-Hunter
- https://github.com/dtomic-ftnt/solution-pack-ips-alert-triage
- https://github.com/fei9747/WindowsElevation
- https://github.com/fortinet-fortisoar/solution-pack-ips-alert-triage
- https://github.com/grisuno/LazyOwn
- https://github.com/gwyomarch/Legacy-HTB-Writeup-FR
- https://github.com/h3x0v3rl0rd/MS08-067
- https://github.com/h3xcr4ck3r/MS08-067
- https://github.com/k4u5h41/MS08-067
- https://github.com/khansiddique/VulnHub-Boot2root-CTFs-Writeups
- https://github.com/limeg/ms08-067-case-study
- https://github.com/lyshark/Windows-exploits
- https://github.com/miguelvelazco/coffee-saver
- https://github.com/morkin1792/security-tests
- https://github.com/mssky9527/Rscan
- https://github.com/n0-traces/cve_monitor
- https://github.com/n3ov4n1sh/MS08-067
- https://github.com/n3rdh4x0r/MS08-067
- https://github.com/nanotechz9l/cvesearch
- https://github.com/nitishbadole/oscp-note-2
- https://github.com/notsag-dev/htb-legacy
- https://github.com/pxcs/CVE-29343-Sysmon-list
- https://github.com/rayhan0x01/reverse-shell-able-exploit-pocs
- https://github.com/rmsbpro/rmsbpro
- https://github.com/rsfl/pentest_safe
- https://github.com/shashihacks/OSCP
- https://github.com/shashihacks/OSWE
- https://github.com/thunderstrike9090/Conflicker_analysis_scripts
- https://github.com/uroboros-security/SMB-CVE
- https://github.com/willamygarcia/Vuln_Windows_7_11
- https://github.com/ycdxsb/WindowsPrivilegeEscalation