Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2017-9779 PoC — OCaml compiler 安全漏洞

Source
Associated Vulnerability
Title:OCaml compiler 安全漏洞 (CVE-2017-9779)
Description:OCaml compiler是由OCaml社区维护的OCaml的编译器,它能够生成独立程序,支持面向批处理。 OCaml compiler中存在安全漏洞。攻击者可利用该漏洞提升权限。
Description
Automatic execution Payload From Windows By Path Users All Exploit Via File bashrc 
Readme
### Automatic execution Payload From Windows By Path Users ::)
![vscode-powershell 1 0 0 20161116](https://user-images.githubusercontent.com/25440152/30280688-662ed582-96de-11e7-85aa-ee410fb2a7d2.png) 
-------------------------------------------------------------------------------



## What is ? Cmder
------------------------------------------------------------------

Cmder is a software package created out of pure frustration over the absence of nice console emulators on Windows. It is based on amazing software, and spiced up with the Monokai color scheme and a custom prompt layout, looking sexy from the start.
# >>>> Site framework Cmder !
http://cmder.net/

## 

## What is .bashrc

is executable file Any word you write They are displayed on Terminal directly, Unfortunately for all Linux systems it works on all of them  
## 
## What is Users In Windows ?
Is the file that comes After him Name file User Basic for Windows illustrative pictures
# |

## [Video] (https://www.youtube.com/watch?v=baA89FT9etQ&t=26s)
File Snapshot

[4.0K] /data/pocs/e630e37193122e52480353aba54bb426d270d406 └── [1.0K] README.md 0 directories, 1 file
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.