Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
10-question deep dive: root cause, exploitation, mitigation, urgency. Read summary free, full version requires login.
| # | POC Description | Source Link | Shenlong Link |
|---|---|---|---|
| 1 | Proof of concept & details for CVE-2025-21298 | https://github.com/ynwarcs/CVE-2025-21298 | POC Details |
| 2 | A Critical Windows OLE Zero-Click Vulnerability | https://github.com/Dit-Developers/CVE-2025-21298 | POC Details |
| 3 | A safe CTF challenge demonstrating CVE-2025-21298 using RTF and OLE objects. | https://github.com/Denyningbow/rtf-ctf-cve-2025-21298 | POC Details |
| 4 | None | https://github.com/mr-big-leach/CVE-2025-21298 | POC Details |
| 5 | CVE-2025-21298 | https://github.com/B1ack4sh/Blackash-CVE-2025-21298 | POC Details |
| 6 | Complete analysis of CVE-2025-21298, a double free vulnerability related to ole32 library in windows. | https://github.com/fy-poc/full-poc-CVE-2025_21298 | POC Details |
| 7 | We are expected to investigate a critical alert reporting a Windows OLE zero-click RCE exploitation (CVE-2025-21298) delivered via a malicious RTF attachment. | https://github.com/Arkha-Corvus/LetsDefend-SOC336-Windows-OLE-Zero-Click-RCE-Exploitation-Detected-CVE-2025-21298- | POC Details |
| 8 | CVE-2025-21298 | https://github.com/Ashwesker/Blackash-CVE-2025-21298 | POC Details |
| 9 | CVE-2025-21298 | https://github.com/Ashwesker/Ashwesker-CVE-2025-21298 | POC Details |
No public POC found.
Login to generate AI POC| CVE-2025-21311 | 9.8 CRITICAL | Windows NTLM V1 Elevation of Privilege Vulnerability |
| CVE-2025-21307 | 9.8 CRITICAL | Windows Reliable Multicast Transport Driver (RMCAST) Remote Code Execution Vulnerability |
| CVE-2025-21305 | 8.8 HIGH | Windows Telephony Service Remote Code Execution Vulnerability |
| CVE-2025-21266 | 8.8 HIGH | Windows Telephony Service Remote Code Execution Vulnerability |
| CVE-2025-21282 | 8.8 HIGH | Windows Telephony Service Remote Code Execution Vulnerability |
| CVE-2025-21293 | 8.8 HIGH | Active Directory Domain Services Elevation of Privilege Vulnerability |
| CVE-2025-21291 | 8.8 HIGH | Windows Direct Show Remote Code Execution Vulnerability |
| CVE-2025-21302 | 8.8 HIGH | Windows Telephony Service Remote Code Execution Vulnerability |
| CVE-2025-21303 | 8.8 HIGH | Windows Telephony Service Remote Code Execution Vulnerability |
| CVE-2025-21306 | 8.8 HIGH | Windows Telephony Service Remote Code Execution Vulnerability |
| CVE-2025-21176 | 8.8 HIGH | .NET, .NET Framework, and Visual Studio Remote Code Execution Vulnerability |
| CVE-2025-21178 | 8.8 HIGH | Visual Studio Remote Code Execution Vulnerability |
| CVE-2025-21273 | 8.8 HIGH | Windows Telephony Service Remote Code Execution Vulnerability |
| CVE-2025-21286 | 8.8 HIGH | Windows Telephony Service Remote Code Execution Vulnerability |
| CVE-2025-21223 | 8.8 HIGH | Windows Telephony Service Remote Code Execution Vulnerability |
| CVE-2025-21240 | 8.8 HIGH | Windows Telephony Service Remote Code Execution Vulnerability |
| CVE-2025-21238 | 8.8 HIGH | Windows Telephony Service Remote Code Execution Vulnerability |
| CVE-2025-21417 | 8.8 HIGH | Windows Telephony Service Remote Code Execution Vulnerability |
| CVE-2025-21245 | 8.8 HIGH | Windows Telephony Service Remote Code Execution Vulnerability |
| CVE-2025-21409 | 8.8 HIGH | Windows Telephony Service Remote Code Execution Vulnerability |
Showing top 20 of 157 CVEs. View all on vendor page → →
No comments yet