Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
10-question deep dive: root cause, exploitation, mitigation, urgency. Read summary free, full version requires login.
| Vendor | Product | Affected Versions | CPE | Subscribe |
|---|---|---|---|---|
| Microsoft Corporation | Office/WordPad | Office 2007 SP3, Microsoft Office 2010 SP2, Microsoft Office 2013 SP1, Microsoft Office 2016, Microsoft Windows Vista SP2, Windows Server 2008 SP2, Windows 7 SP1, and Windows 8.1 | - |
| # | POC Description | Source Link | Shenlong Link |
|---|---|---|---|
| 1 | None | https://github.com/ryhanson/CVE-2017-0199 | POC Details |
| 2 | None | https://github.com/SyFi/cve-2017-0199 | POC Details |
| 3 | Exploit toolkit CVE-2017-0199 - v4.0 is a handy python script which provides pentesters and security researchers a quick and effective way to test Microsoft Office RCE. It could generate a malicious RTF/PPSX file and deliver metasploit / meterpreter / other payload to victim without any complex configuration. | https://github.com/bhdresh/CVE-2017-0199 | POC Details |
| 4 | Quick and dirty fix to OLE2 executing code via .hta | https://github.com/NotAwful/CVE-2017-0199-Fix | POC Details |
| 5 | CVE-2017-0199 | https://github.com/haibara3839/CVE-2017-0199-master | POC Details |
| 6 | Exploit toolkit CVE-2017-0199 - v2.0 is a handy python script which provides a quick and effective way to exploit Microsoft RTF RCE. It could generate a malicious RTF file and deliver metasploit / meterpreter / any other payload to victim without any complex configuration. | https://github.com/Exploit-install/CVE-2017-0199 | POC Details |
| 7 | Exploit toolkit for vulnerability RCE Microsoft RTF | https://github.com/mzakyz666/PoC-CVE-2017-0199 | POC Details |
| 8 | Exploit toolkit CVE-2017-0199 - v2.0 is a handy python script which provides a quick and effective way to exploit Microsoft RTF RCE. It could generate a malicious RTF file and deliver metasploit / meterpreter payload to victim without any complex configuration. | https://github.com/n1shant-sinha/CVE-2017-0199 | POC Details |
| 9 | An exploit implementation for RCE in RTF & DOCs (CVE-2017-0199) | https://github.com/kn0wm4d/htattack | POC Details |
| 10 | None | https://github.com/joke998/Cve-2017-0199 | POC Details |
| 11 | Cve-2017-0199 | https://github.com/joke998/Cve-2017-0199- | POC Details |
| 12 | None | https://github.com/sUbc0ol/Microsoft-Word-CVE-2017-0199- | POC Details |
| 13 | None | https://github.com/viethdgit/CVE-2017-0199 | POC Details |
| 14 | None | https://github.com/herbiezimmerman/2017-11-17-Maldoc-Using-CVE-2017-0199 | POC Details |
| 15 | RTF Cleaner, tries to extract URL from malicious RTF samples using CVE-2017-0199 & CVE-2017-8759 | https://github.com/jacobsoo/RTF-Cleaner | POC Details |
| 16 | None | https://github.com/likescam/CVE-2017-0199 | POC Details |
| 17 | None | https://github.com/stealth-ronin/CVE-2017-0199-PY-KIT | POC Details |
| 18 | None | https://github.com/Phantomlancer123/CVE-2017-0199 | POC Details |
| 19 | A python script/generator, for generating and exploiting Microsoft vulnerability | https://github.com/BRAINIAC22/CVE-2017-0199 | POC Details |
| 20 | CVE-2017-0199复现 | https://github.com/Sunqiz/CVE-2017-0199-reprofuction | POC Details |
| 21 | None | https://github.com/TheCyberWatchers/CVE-2017-0199-v5.0 | POC Details |
| 22 | RTF de-obfuscator for CVE-2017-0199 documents to find URLs statically. | https://github.com/nicpenning/RTF-Cleaner | POC Details |
| 23 | Python3 toolkit update | https://github.com/kash-123/CVE-2017-0199 | POC Details |
| 24 | None | https://github.com/likekabin/CVE-2017-0199 | POC Details |
| 25 | This repository contains a full blue-team malware analysis of a real malicious DOCX exploiting CVE-2017-0199. The lab includes sandbox execution, network forensics, IOC extraction, MITRE ATT&CK mapping, dropped files review, and detection rules. Evidence screenshots are included inside the evidence folder for professional documentation. | https://github.com/BlueShield-CyberDefense/Phishing-Analysis | POC Details |
No public POC found.
Login to generate AI POC| CVE-2017-0197 | Microsoft Office 安全漏洞 | |
| CVE-2017-0183 | Microsoft Windows Hyper-V 安全漏洞 | |
| CVE-2017-0184 | Microsoft Windows Hyper-V 安全漏洞 | |
| CVE-2017-0185 | Microsoft Windows Hyper-V 安全漏洞 | |
| CVE-2017-0186 | Microsoft Windows Hyper-V 安全漏洞 | |
| CVE-2017-0188 | Microsoft Win32k 信息泄露漏洞 | |
| CVE-2017-0189 | Microsoft Win32k 权限许可和访问控制问题漏洞 | |
| CVE-2017-0191 | Microsoft Windows 安全漏洞 | |
| CVE-2017-0192 | Microsoft Windows 信息泄露漏洞 | |
| CVE-2017-0194 | Microsoft Office 信息泄露漏洞 | |
| CVE-2017-0195 | Microsoft Office 安全漏洞 | |
| CVE-2017-0182 | Microsoft Windows Hyper-V 安全漏洞 | |
| CVE-2017-0200 | Microsoft Edge 安全漏洞 | |
| CVE-2017-0201 | Microsoft Internet Explorer JScript和VBScript 安全漏洞 | |
| CVE-2017-0202 | Microsoft Internet Explorer 安全漏洞 | |
| CVE-2017-0204 | Microsoft Office 安全漏洞 | |
| CVE-2017-0205 | Microsoft Edge 安全漏洞 | |
| CVE-2017-0207 | Microsoft Outlook for Mac 安全漏洞 | |
| CVE-2017-0208 | Microsoft Edge 信息泄露漏洞 | |
| CVE-2017-0210 | Microsoft Internet Explorer 权限许可和访问控制问题漏洞 |
Showing top 20 of 42 CVEs. View all on vendor page → →
No comments yet