尽管我们使用了先进的大模型技术,但其输出仍可能包含不准确或过时的信息。神龙努力确保数据的准确性,但请您根据实际情况进行核实和判断。
| # | POC 描述 | 源链接 | 神龙链接 |
|---|---|---|---|
| 1 | The remediation script should set the reg entries described in https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36884 . The detection script checks if they exist. Provided AS-IS without any warrenty. | https://github.com/Maxwitat/CVE-2023-36884-Scripts-for-Intune-Remediation-SCCM-Compliance-Baseline | POC详情 |
| 2 | Recent Campaign abusing CVE-2023-36884 | https://github.com/deepinstinct/Storm0978-RomCom-Campaign | POC详情 |
| 3 | This is an emergency solution while Microsoft addresses the vulnerability. | https://github.com/zerosorai/CVE-2023-36884 | POC详情 |
| 4 | Script to check for CVE-2023-36884 hardening | https://github.com/tarraschk/CVE-2023-36884-Checker | POC详情 |
| 5 | CVE-2023-36884 临时补丁 | https://github.com/or2me/CVE-2023-36884_patcher | POC详情 |
| 6 | PowerShell Script for initial mitigation of vulnerability | https://github.com/ToddMaxey/CVE-2023-36884 | POC详情 |
| 7 | None | https://github.com/ridsoliveira/Fix-CVE-2023-36884 | POC详情 |
| 8 | #comeonits2023 #ie9 #Storm-0978 | https://github.com/raresteak/CVE-2023-36884 | POC详情 |
| 9 | MS Office and Windows HTML RCE (CVE-2023-36884) - PoC and exploit | https://github.com/jakabakos/CVE-2023-36884-MS-Office-HTML-RCE | POC详情 |
未找到公开 POC。
登录以生成 AI POC暂无评论