cve/2014/CVE-2014-4114.md

44 lines
2.1 KiB
Markdown
Raw Normal View History

2024-05-26 14:27:05 +02:00
### [CVE-2014-4114](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4114)
![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen)
### Description
Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, and Windows RT Gold and 8.1 allow remote attackers to execute arbitrary code via a crafted OLE object in an Office document, as exploited in the wild with a "Sandworm" attack in June through October 2014, aka "Windows OLE Remote Code Execution Vulnerability."
### POC
#### Reference
- http://www.exploit-db.com/exploits/35019
2024-06-09 00:33:16 +00:00
- http://www.exploit-db.com/exploits/35019
2024-05-26 14:27:05 +02:00
- http://www.exploit-db.com/exploits/35055
2024-06-09 00:33:16 +00:00
- http://www.exploit-db.com/exploits/35055
2024-05-26 14:27:05 +02:00
#### Github
- https://github.com/ARPSyndicate/cvemon
- https://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections
- https://github.com/DarkenCode/PoC
- https://github.com/Kuromesi/Py4CSKG
- https://github.com/Ostorlab/KEV
- https://github.com/Ostorlab/known_exploited_vulnerbilities_detectors
- https://github.com/Panopticon-Project/Panopticon-Patchwork
- https://github.com/R0B1NL1N/APTnotes
- https://github.com/cone4/AOT
- https://github.com/emtee40/APT_CyberCriminal_Campagin_Collections
- https://github.com/eric-erki/APT_CyberCriminal_Campagin_Collections
- https://github.com/eric-erki/threat-INTel
- https://github.com/houjingyi233/office-exploit-case-study
- https://github.com/houseofxyz/threat-INTel
- https://github.com/iwarsong/apt
- https://github.com/jack8daniels2/threat-INTel
- https://github.com/jvdroit/APT_CyberCriminal_Campagin_Collections
- https://github.com/kbandla/APTnotes
- https://github.com/likescam/APT_CyberCriminal_Campagin_Collections
- https://github.com/likescam/CyberMonitor-APT_CyberCriminal_Campagin_Collections
- https://github.com/nitishbadole/oscp-note-2
- https://github.com/qiantu88/office-cve
- https://github.com/rmsbpro/rmsbpro
- https://github.com/sumas/APT_CyberCriminal_Campagin_Collections