Microsoft Windows Vista Gold, SP1, and SP2, Windows Server 2008 Gold and SP2, and Windows 7 RC do not properly process the command value in an SMB Multi-Protocol Negotiate Request packet, which allows remote attackers to execute arbitrary code via a crafted SMBv2 packet to the Server service, aka "SMBv2 Command Value Vulnerability."
- https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-050
- https://github.com/ARPSyndicate/cve-scores
- https://github.com/Al1ex/WindowsElevation
- https://github.com/Ascotbe/Kernelhub
- https://github.com/Cruxer8Mech/Idk
- https://github.com/EricwentwithCyber/Vulnerability-Scan-Lab
- https://github.com/fei9747/WindowsElevation
- https://github.com/lyshark/Windows-exploits
- https://github.com/uroboros-security/SMB-CVE
- https://github.com/ycdxsb/WindowsPrivilegeEscalation