Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2014-6332 PoC — Windows OLE 自动化数组远程执行代码漏洞

Source
Associated Vulnerability
Title:Windows OLE 自动化数组远程执行代码漏洞 (CVE-2014-6332)
Description:OleAut32.dll in OLE in Microsoft Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, and Windows RT Gold and 8.1 allows remote attackers to execute arbitrary code via a crafted web site, as demonstrated by an array-redimensioning attempt that triggers improper handling of a size value in the SafeArrayDimen function, aka "Windows OLE Automation Array Remote Code Execution Vulnerability."
Description
CVE-2014-6332 ZeroDay POC - Starts PowerShell
Readme
CVE-2014-6332
=============

CVE-2014-6332 ZeroDay POC - Starts PowerShell
File Snapshot

[4.0K] /data/pocs/b23bd858de8e7128bc9cde7d3b7b5cc8f0228b11 ├── [3.9K] exploit.html └── [ 75] README.md 0 directories, 2 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. Local POC snapshots are reserved for subscribers — if the original source is unavailable, the local mirror is part of the paid plan.
    3. Mirroring, verifying, and maintaining this POC archive takes ongoing effort, so local snapshots are a paid feature. Your subscription keeps the archive online — thank you for the support. View subscription plans →