### [CVE-2017-0090](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-0090) ![](https://img.shields.io/static/v1?label=Product&message=Windows%20Uniscribe&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=Uniscribe%20in%20Microsoft%20Windows%20Vista%20SP2%2C%20Windows%20Server%202008%20SP2%20and%20R2%20SP1%2C%20and%20Windows%207%20SP1%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Vulnerability&message=Remote%20Code%20Execution&color=brightgreen) ### Description Uniscribe in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, and Windows 7 SP1 allows remote attackers to execute arbitrary code via a crafted web site, aka "Uniscribe Remote Code Execution Vulnerability." This vulnerability is different from those described in CVE-2017-0072, CVE-2017-0083, CVE-2017-0084, CVE-2017-0086, CVE-2017-0087, CVE-2017-0088, and CVE-2017-0089. ### POC #### Reference - https://www.exploit-db.com/exploits/41653/ #### Github - https://github.com/ARPSyndicate/cve-scores - https://github.com/rainhawk13/Added-Pentest-Ground-to-vulnerable-websites-for-training