尽管我们使用了先进的大模型技术,但其输出仍可能包含不准确或过时的信息。神龙努力确保数据的准确性,但请您根据实际情况进行核实和判断。
| 厂商 | 产品 | 影响版本 | CPE | 订阅 |
|---|---|---|---|---|
| Microsoft | Microsoft 365 Apps for Enterprise | 16.0.1 ~ https://aka.ms/OfficeSecurityReleases | - | |
| Microsoft | Microsoft Office 2016 | 16.0.0 ~ 16.0.5539.1001 | - | |
| Microsoft | Microsoft Office 2019 | 19.0.0 ~ 16.0.10417.20095 | - | |
| Microsoft | Microsoft Office LTSC 2021 | 16.0.1 ~ https://aka.ms/OfficeSecurityReleases | - | |
| Microsoft | Microsoft Office LTSC 2024 | 16.0.0 ~ https://aka.ms/OfficeSecurityReleases | - |
| # | POC 描述 | 源链接 | 神龙链接 |
|---|---|---|---|
| 1 | CVE-2026-21509 | https://github.com/kimstars/Ashwesker-CVE-2026-21509 | POC详情 |
| 2 | Educational PoC for CVE‑2026‑21509 (Microsoft Office security feature bypass). Generates a harmless DOCX with dummy OLE artifacts to study EDR/AV visibility. Not an exploit. For isolated labs only; see README for 7‑Zip inspection steps and mitigation references. | https://github.com/gavz/CVE-2026-21509-PoC | POC详情 |
| 3 | Powershell script with Detection and Remediation for CVE-2026-21509 | https://github.com/ksk-itdk/KSK-ITDK-CVE-2026-21509-Mitigation | POC详情 |
| 4 | New Physics Disclosure This repository contains a full weaponized exploit for **CVE-2026-21509**, targeting the Windows Network File System (NFSv4.1) kernel-mode driver (`nfssvr.sys`). | https://github.com/SimoesCTT/CTT-NFS-Vortex-RCE | POC详情 |
| 5 | Microsoft just released emergency patches for CVE-2026-21509, a zero-day in the Office Suite that bypasses OLE/COM mitigations when a user simply opens a file. They think their "Service-side change" for Office 2021+ is a solid wall. | https://github.com/SimoesCTT/SCTT-2026-33-0007-The-OLE-Vortex-Laminar-Bypass- | POC详情 |
| 6 | CVE-2026-21509 is a critical bypass in the Microsoft Office OLE (Object Linking and Embedding) validation engine. While standard "laminar" exploits attempt to manipulate static COM objects, this repository utilizes Theorem 4.2 to achieve a speculative race-condition bypass of the Object Definition Rule (ODR). | https://github.com/SimoesCTT/CTT-MICROSOFT-OFFICE-OLE-MANIFOLD-BYPASS-CVE-2026-21509 | POC详情 |
| 7 | YARA rule and python script to detect potential exploits for the CVE-2026-21509 vulnerability in MS Office | https://github.com/decalage2/detect_CVE-2026-21509 | POC详情 |
| 8 | None | https://github.com/kaizensecurity/CVE-2026-21509 | POC详情 |
| 9 | CVE-2026-21509 Mitigation | https://github.com/planetoid/cve-2026-21509-mitigation | POC详情 |
未找到公开 POC。
登录以生成 AI POC暂无评论