Files
CVEs-PoC/2017/CVE-2017-0262.md
T
2025-09-29 21:09:30 +02:00

25 lines
1.2 KiB
Markdown

### [CVE-2017-0262](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-0262)
![](https://img.shields.io/static/v1?label=Product&message=Microsoft%20Office&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=Microsoft%20Office%202010%20SP2%2C%20Office%202013%20SP1%2C%20and%20Office%202016%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=Remote%20Code%20Execution&color=brightgreen)
### Description
Microsoft Office 2010 SP2, Office 2013 SP1, and Office 2016 allow a remote code execution vulnerability when the software fails to properly handle objects in memory, aka "Office Remote Code Execution Vulnerability". This CVE ID is unique from CVE-2017-0261 and CVE-2017-0281.
### POC
#### Reference
No PoCs from references.
#### Github
- https://github.com/ARPSyndicate/cvemon
- https://github.com/Ostorlab/KEV
- https://github.com/Ostorlab/known_exploited_vulnerbilities_detectors
- https://github.com/Panopticon-Project/panopticon-APT28
- https://github.com/Panopticon-Project/panopticon-FancyBear
- https://github.com/cnhouzi/APTNotes
- https://github.com/houjingyi233/office-exploit-case-study
- https://github.com/qiantu88/office-cve