尽管我们使用了先进的大模型技术,但其输出仍可能包含不准确或过时的信息。神龙努力确保数据的准确性,但请您根据实际情况进行核实和判断。
| 厂商 | 产品 | 影响版本 | CPE | 订阅 |
|---|---|---|---|---|
| Microsoft Corporation | Office/WordPad | Office 2007 SP3, Microsoft Office 2010 SP2, Microsoft Office 2013 SP1, Microsoft Office 2016, Microsoft Windows Vista SP2, Windows Server 2008 SP2, Windows 7 SP1, and Windows 8.1 | - |
| # | POC 描述 | 源链接 | 神龙链接 |
|---|---|---|---|
| 1 | None | https://github.com/ryhanson/CVE-2017-0199 | POC详情 |
| 2 | None | https://github.com/SyFi/cve-2017-0199 | POC详情 |
| 3 | Exploit toolkit CVE-2017-0199 - v4.0 is a handy python script which provides pentesters and security researchers a quick and effective way to test Microsoft Office RCE. It could generate a malicious RTF/PPSX file and deliver metasploit / meterpreter / other payload to victim without any complex configuration. | https://github.com/bhdresh/CVE-2017-0199 | POC详情 |
| 4 | Quick and dirty fix to OLE2 executing code via .hta | https://github.com/NotAwful/CVE-2017-0199-Fix | POC详情 |
| 5 | CVE-2017-0199 | https://github.com/haibara3839/CVE-2017-0199-master | POC详情 |
| 6 | Exploit toolkit CVE-2017-0199 - v2.0 is a handy python script which provides a quick and effective way to exploit Microsoft RTF RCE. It could generate a malicious RTF file and deliver metasploit / meterpreter / any other payload to victim without any complex configuration. | https://github.com/Exploit-install/CVE-2017-0199 | POC详情 |
| 7 | Exploit toolkit for vulnerability RCE Microsoft RTF | https://github.com/mzakyz666/PoC-CVE-2017-0199 | POC详情 |
| 8 | Exploit toolkit CVE-2017-0199 - v2.0 is a handy python script which provides a quick and effective way to exploit Microsoft RTF RCE. It could generate a malicious RTF file and deliver metasploit / meterpreter payload to victim without any complex configuration. | https://github.com/n1shant-sinha/CVE-2017-0199 | POC详情 |
| 9 | An exploit implementation for RCE in RTF & DOCs (CVE-2017-0199) | https://github.com/kn0wm4d/htattack | POC详情 |
| 10 | None | https://github.com/joke998/Cve-2017-0199 | POC详情 |
| 11 | Cve-2017-0199 | https://github.com/joke998/Cve-2017-0199- | POC详情 |
| 12 | None | https://github.com/sUbc0ol/Microsoft-Word-CVE-2017-0199- | POC详情 |
| 13 | None | https://github.com/viethdgit/CVE-2017-0199 | POC详情 |
| 14 | None | https://github.com/herbiezimmerman/2017-11-17-Maldoc-Using-CVE-2017-0199 | POC详情 |
| 15 | RTF Cleaner, tries to extract URL from malicious RTF samples using CVE-2017-0199 & CVE-2017-8759 | https://github.com/jacobsoo/RTF-Cleaner | POC详情 |
| 16 | None | https://github.com/likescam/CVE-2017-0199 | POC详情 |
| 17 | None | https://github.com/stealth-ronin/CVE-2017-0199-PY-KIT | POC详情 |
| 18 | None | https://github.com/Phantomlancer123/CVE-2017-0199 | POC详情 |
| 19 | A python script/generator, for generating and exploiting Microsoft vulnerability | https://github.com/BRAINIAC22/CVE-2017-0199 | POC详情 |
| 20 | CVE-2017-0199复现 | https://github.com/Sunqiz/CVE-2017-0199-reprofuction | POC详情 |
| 21 | None | https://github.com/TheCyberWatchers/CVE-2017-0199-v5.0 | POC详情 |
| 22 | RTF de-obfuscator for CVE-2017-0199 documents to find URLs statically. | https://github.com/nicpenning/RTF-Cleaner | POC详情 |
| 23 | Python3 toolkit update | https://github.com/kash-123/CVE-2017-0199 | POC详情 |
| 24 | None | https://github.com/likekabin/CVE-2017-0199 | POC详情 |
| 25 | This repository contains a full blue-team malware analysis of a real malicious DOCX exploiting CVE-2017-0199. The lab includes sandbox execution, network forensics, IOC extraction, MITRE ATT&CK mapping, dropped files review, and detection rules. Evidence screenshots are included inside the evidence folder for professional documentation. | https://github.com/BlueShield-CyberDefense/Phishing-Analysis | POC详情 |
未找到公开 POC。
登录以生成 AI POC暂无评论