mirror of
https://github.com/0xMarcio/cve.git
synced 2026-05-11 04:25:00 +02:00
26 lines
1.1 KiB
Markdown
26 lines
1.1 KiB
Markdown
### [CVE-2017-11774](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11774)
|
|

|
|

|
|

|
|
|
|
### Description
|
|
|
|
Microsoft Outlook 2010 SP2, Outlook 2013 SP1 and RT SP1, and Outlook 2016 allow an attacker to execute arbitrary commands, due to how Microsoft Office handles objects in memory, aka "Microsoft Outlook Security Feature Bypass Vulnerability."
|
|
|
|
### POC
|
|
|
|
#### Reference
|
|
No PoCs from references.
|
|
|
|
#### Github
|
|
- https://github.com/ARPSyndicate/cvemon
|
|
- https://github.com/Ostorlab/KEV
|
|
- https://github.com/Ostorlab/known_exploited_vulnerbilities_detectors
|
|
- https://github.com/cetriext/fireeye_cves
|
|
- https://github.com/devcoinfet/SniperRoost
|
|
- https://github.com/lnick2023/nicenice
|
|
- https://github.com/qazbnm456/awesome-cve-poc
|
|
- https://github.com/whitfieldsdad/epss
|
|
- https://github.com/xbl3/awesome-cve-poc_qazbnm456
|
|
|