Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2018-0798 PoC — Microsoft Office Equation Editor 缓冲区错误漏洞

Source
Associated Vulnerability
Title:Microsoft Office Equation Editor 缓冲区错误漏洞 (CVE-2018-0798)
Description:Equation Editor in Microsoft Office 2007, Microsoft Office 2010, Microsoft Office 2013, and Microsoft Office 2016 allows a remote code execution vulnerability due to the way objects are handled in memory, aka "Microsoft Office Memory Corruption Vulnerability".
Description
CVE-2018-0798复现
File Snapshot

[4.0K] /data/pocs/11874bbdb24b64db5638630eb97d57f3ac61b7bd ├── [1.7M] AppvIsvSubsystems32.dll ├── [4.0K] CVE-2018-0798.assets │   ├── [ 46K] image-20220819152615183.png │   ├── [ 67K] image-20220819152953224.png │   ├── [ 75K] image-20220819172927161.png │   ├── [192K] image-20220819173125214.png │   ├── [ 37K] image-20220819173149384.png │   ├── [ 37K] image-20220819173202304.png │   ├── [ 31K] image-20220819173302407.png │   ├── [ 81K] image-20220819173402649.png │   ├── [ 10K] image-20220819174125100.png │   ├── [ 12K] image-20220819174227423.png │   ├── [ 23K] image-20220826161438996.png │   ├── [185K] image-20220829103124568.png │   ├── [ 33K] image-20220829204312353.png │   ├── [ 24K] image-20220829204329517.png │   ├── [ 32K] image-20220829204357196.png │   ├── [ 21K] image-20220829204429698.png │   ├── [ 36K] image-20220829204444968.png │   ├── [ 23K] image-20220829204458017.png │   ├── [ 23K] image-20220830101200898.png │   ├── [ 30K] image-20220830101215937.png │   ├── [ 39K] image-20220830101225121.png │   ├── [ 35K] image-20220830101237811.png │   ├── [ 30K] image-20220830101825210.png │   ├── [ 22K] image-20220830101859550.png │   ├── [ 24K] image-20220830101911681.png │   ├── [ 21K] image-20220830102242075.png │   ├── [ 18K] image-20220830102304068.png │   ├── [ 18K] image-20220830102324110.png │   ├── [ 22K] image-20220830102956304.png │   ├── [ 14K] image-20220830103413749.png │   ├── [201K] image-20220830144845803.png │   ├── [201K] image-20220830145515155.png │   ├── [157K] image-20220830150302836.png │   ├── [193K] image-20220830150739265.png │   ├── [209K] image-20220830151301292.png │   ├── [203K] image-20220830152131552.png │   ├── [ 12K] image-20220830152618953.png │   ├── [6.3K] image-20220830152712298.png │   ├── [111K] image-20220830152930564.png │   ├── [110K] image-20220830153004491.png │   ├── [ 28K] image-20220830153127724.png │   ├── [ 75K] image-20220830153138068.png │   ├── [ 56K] image-20220830153435884.png │   ├── [ 57K] image-20220830161426190.png │   ├── [ 64K] image-20220830161917025.png │   ├── [ 57K] image-20220830162117658.png │   ├── [ 49K] image-20220830162631103.png │   ├── [ 31K] image-20220830162645436.png │   ├── [ 67K] image-20220830162702036.png │   ├── [ 74K] image-20220830162712709.png │   ├── [ 34K] image-20220830162723457.png │   ├── [ 50K] image-20220830162734521.png │   ├── [208K] image-20220830171737306.png │   └── [ 26K] image-20220830172414841.png ├── [6.4K] CVE-2018-0798.md ├── [ 10K] CVE-2018-0798_poc.zip ├── [531K] eqnedt32.exe └── [ 14K] poc.rtf 1 directory, 59 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. Local POC snapshots are reserved for subscribers — if the original source is unavailable, the local mirror is part of the paid plan.
    3. Mirroring, verifying, and maintaining this POC archive takes ongoing effort, so local snapshots are a paid feature. Your subscription keeps the archive online — thank you for the support. View subscription plans →