CVE-2015-0096
EXPLOITEDMicrosoft Windows Shell LNK Code Execution
Title source: metasploitDescription
Untrusted search path vulnerability in Microsoft Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, and Windows RT Gold and 8.1 allows local users to gain privileges via a Trojan horse DLL in the current working directory, leading to DLL loading during Windows Explorer access to the icon of a crafted shortcut, aka "DLL Planting Remote Code Execution Vulnerability."
Exploits (5)
exploitdb
WORKING POC
VERIFIED
by Ivanlef0u · textlocalwindows
https://www.exploit-db.com/exploits/14403
metasploit
WORKING POC
EXCELLENT
by Michael Heerklotz, juan vazquez · rubypocwin
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/windows/smb/ms15_020_shortcut_icon_dllloader.rb
metasploit
WORKING POC
GREAT
by Uncredited, Yorick Koster, Spencer McIntyre · rubypocwin
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/windows/local/cve_2017_8464_lnk_lpe.rb
metasploit
WORKING POC
GREAT
by Uncredited, Yorick Koster, Spencer McIntyre · rubypocwin
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/windows/fileformat/cve_2017_8464_lnk_rce.rb
metasploit
WORKING POC
EXCELLENT
by Michael Heerklotz, juan vazquez · rubypocwin
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/windows/fileformat/ms15_020_shortcut_icon_dllloader.rb
Scores
EPSS
0.8707
EPSS Percentile
99.4%
Details
VulnCheck KEV
2021-12-15
CWE
CWE-426
Status
published
Products (11)
microsoft/windows_7
microsoft/windows_8
microsoft/windows_8.1
microsoft/windows_rt
microsoft/windows_rt_8.1
microsoft/windows_server_2003
microsoft/windows_server_2008
microsoft/windows_server_2008
r2 sp1 (2 CPE variants)
microsoft/windows_server_2012
microsoft/windows_server_2012
r2
... and 1 more
Published
Mar 11, 2015
Tracked Since
Feb 18, 2026