Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
| Vendor | Product | Affected Versions | CPE | Subscribe |
|---|---|---|---|---|
| Microsoft Corporation | Microsoft Office | Microsoft Office 2007 Service Pack 3, Microsoft Office 2010 Service Pack 2, Microsoft Office 2013 Service Pack 1, Microsoft Office 2016 | - |
| # | POC Description | Source Link | Shenlong Link |
|---|---|---|---|
| 1 | None | https://github.com/zhouat/cve-2017-11882 | POC Details |
| 2 | Proof-of-Concept exploits for CVE-2017-11882 | https://github.com/embedi/CVE-2017-11882 | POC Details |
| 3 | CVE-2017-11882 from https://github.com/embedi/CVE-2017-11882 | https://github.com/Ridter/CVE-2017-11882 | POC Details |
| 4 | CVE-2017-11882 File Generator PoC | https://github.com/BlackMathIT/2017-11882_Generator | POC Details |
| 5 | CVE-2017-11882 Exploit accepts over 17k bytes long command/code in maximum. | https://github.com/rip1s/CVE-2017-11882 | POC Details |
| 6 | This is a Metasploit module which exploits CVE-2017-11882 using the POC released here : https://embedi.com/blog/skeleton-closet-ms-office-vulnerability-you-didnt-know-about. | https://github.com/0x09AL/CVE-2017-11882-metasploit | POC Details |
| 7 | CVE-2017-11882 | https://github.com/HZachev/ABC | POC Details |
| 8 | CVE-2017-11882 exploitation | https://github.com/starnightcyber/CVE-2017-11882 | POC Details |
| 9 | None | https://github.com/Grey-Li/CVE-2017-11882 | POC Details |
| 10 | # CVE-2017-11882-metasploit This is a Metasploit module which exploits CVE-2017-11882 using the POC below: https://embedi.com/blog/skeleton-closet-ms-office-vulnerability-you-didnt-know-about. ## Installation 1) Copy the cve_2017_11882.rb to /usr/share/metasploit-framework/modules/exploits/windows/local/ 2) Copy the cve-2017-11882.rtf to /usr/share/metasploit-framework/data/exploits/ This module is a quick port to Metasploit and uses mshta.exe to execute the payload. There are better ways to implement this module and exploit but will update it as soon as I have the time. | https://github.com/legendsec/CVE-2017-11882-for-Kali | POC Details |
| 11 | None | https://github.com/CSC-pentest/cve-2017-11882 | POC Details |
| 12 | None | https://github.com/Shadowshusky/CVE-2017-11882- | POC Details |
| 13 | PoC Exploit for CVE-2018-0802 (and optionally CVE-2017-11882) | https://github.com/rxwx/CVE-2018-0802 | POC Details |
| 14 | PoC for CVE-2018-0802 And CVE-2017-11882 | https://github.com/Ridter/RTF_11882_0802 | POC Details |
| 15 | None | https://github.com/likescam/CVE-2017-11882 | POC Details |
| 16 | None | https://github.com/likescam/CVE-2018-0802_CVE-2017-11882 | POC Details |
| 17 | None | https://github.com/herbiezimmerman/CVE-2017-11882-Possible-Remcos-Malspam | POC Details |
| 18 | Empire Port of CVE-2017-11882 | https://github.com/ChaitanyaHaritash/CVE-2017-11882 | POC Details |
| 19 | None | https://github.com/qy1202/https-github.com-Ridter-CVE-2017-11882- | POC Details |
| 20 | None | https://github.com/j0lama/CVE-2017-11882 | POC Details |
| 21 | Microsoft Equation 3.0/Convert python2 to python3 | https://github.com/chanbin/CVE-2017-11882 | POC Details |
| 22 | CVE-2017-11882(通杀Office 2003到2016) | https://github.com/littlebin404/CVE-2017-11882 | POC Details |
| 23 | Simple Overflow demo, like CVE-2017-11882 exp | https://github.com/ekgg/Overflow-Demo-CVE-2017-11882 | POC Details |
| 24 | None | https://github.com/HaoJame/CVE-2017-11882 | POC Details |
| 25 | generate RTF exploit payload. uses cve-2017-11882, cve-2017-8570, cve-2018-0802, and cve-2018-8174. | https://github.com/5l1v3r1/rtfkit | POC Details |
| 26 | None | https://github.com/ActorExpose/CVE-2017-11882 | POC Details |
| 27 | SignHere is implementation of CVE-2017-11882. SignHere is builder of malicious rtf document and VBScript payloads. | https://github.com/Retr0-code/SignHere | POC Details |
| 28 | None | https://github.com/lisinan988/CVE-2017-11882-exp | POC Details |
| 29 | None | https://github.com/tzwlhack/CVE-2017-11882 | POC Details |
| 30 | CVE-2017-11882复现 | https://github.com/Sunqiz/CVE-2017-11882-reproduction | POC Details |
| 31 | Pada bulan maret 2023, terdapat sample baru yang terindentifikasi sebagai malware. Malware tersebut berasal dari file berekstensi.xls dan .doc dan dikenal dengan nama “Bank Slip.xls”. Aktivitas malware tersebut memiliki hubungan dengan kerentanan yang dikenal dengan id CVE-2017-11882 dan CVE-2018-0802. | https://github.com/Abdibimantara/Maldoc-Analysis | POC Details |
| 32 | None | https://github.com/n18dcat053-luuvannga/DetectPacket-CVE-2017-11882 | POC Details |
| 33 | None | https://github.com/nhuynhuy/cve-2017-11882 | POC Details |
| 34 | Examining the phases of an attack using “Dragonfish's Elise Malware”, specifically, exploring the exploitation of vulnerability CVE-2017-11882. | https://github.com/jadeapar/Dragonfish-s-Malware-Cyber-Analysis | POC Details |
| 35 | None | https://github.com/likekabin/CVE-2017-11882 | POC Details |
| 36 | None | https://github.com/likekabin/CVE-2018-0802_CVE-2017-11882 | POC Details |
| 37 | Malware Analysis CVE-2017-11882 | https://github.com/yaseenibnakhtar/Malware-Analysis-CVE-2017-11882 | POC Details |
| 38 | Malware Analysis CVE-2017-11882 | https://github.com/yaseenibnakhtar/001-Malware-Analysis-CVE-2017-11882 | POC Details |
| 39 | CVE-2017-11882 Preventer for .docx files | https://github.com/xdrake1010/CVE-2017-11882-Preventer | POC Details |
| 40 | Simple PoC of CVE-2017-11882 | https://github.com/imkidz0/CVE-2017-11882 | POC Details |
| 41 | Proof-of-Concept exploits for CVE-2017-11882 | https://github.com/futureFfff/CVE-2017 | POC Details |
No public POC found.
Login to generate AI POCNo comments yet