Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2010-3333 PoC — Microsoft Office Open XML文件格式转换器栈缓冲区溢出漏洞

Source
Associated Vulnerability
Title:Microsoft Office Open XML文件格式转换器栈缓冲区溢出漏洞 (CVE-2010-3333)
Description:Microsoft Office 是微软发布的非常流行的办公软件套件。 基于Mac平台的Microsoft Office XP SP3,Office 2003 SP3,Office 2007 SP2,Office 2010,Office 2004以及2008版本,基于Mac 2011平台的Office,以及基于MAC平台的Open XML文件格式转换器中存在基于栈的缓冲区溢出漏洞。远程攻击者可以借助特制的RTF数据执行任意代码。该漏洞又名"RTF栈缓冲区溢出漏洞"。
File Snapshot

[4.0K] /data/pocs/72fa8aa999d58fe5d4c9a52005c472b2f2595469 ├── [3.8M] cve-2010-3333调试分析.pages └── [ 503] exp.rtf 0 directories, 2 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.