Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
| Vendor | Product | Affected Versions | CPE | Subscribe |
|---|---|---|---|---|
| Microsoft Corporation | Windows COM | Microsoft Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, Windows 10 Gold, 1511, 1607, and 1703, and Windows Server 2016. | - |
| # | POC Description | Source Link | Shenlong Link |
|---|---|---|---|
| 1 | None | https://github.com/shaheemirza/CVE-2017-0213- | POC Details |
| 2 | CVE-2017-0213 for command line | https://github.com/zcgonvh/CVE-2017-0213 | POC Details |
| 3 | None | https://github.com/likescam/CVE-2017-0213 | POC Details |
| 4 | A version of CVE-2017-0213 that I plan to use with an Empire stager | https://github.com/jbooz1/CVE-2017-0213 | POC Details |
| 5 | Fixed No Virus Manual Automatic Loader exe no zip because zip picks up the anti virus detector. | https://github.com/eonrickity/CVE-2017-0213 | POC Details |
| 6 | Binary | https://github.com/Jos675/CVE-2017-0213-Exploit | POC Details |
| 7 | Windows COM Aggregate Marshaler in Microsoft Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, Windows 10 Gold, 1511, 1607, and 1703, and Windows Server 2016 allows an elevation privilege vulnerability when an attacker runs a specially crafted application, aka "Windows COM Elevation of Privilege Vulnerability". This CVE ID is unique from CVE-2017-0214. | https://github.com/Anonymous-Family/CVE-2017-0213 | POC Details |
| 8 | None | https://github.com/billa3283/CVE-2017-0213 | POC Details |
| 9 | None | https://github.com/likekabin/CVE-2017-0213 | POC Details |
No public POC found.
Login to generate AI POCNo comments yet