Entreprise d'experts en Sécurité Informatique : Audits et conseils en cybersécurité
Entreprise française de cybersécurité depuis 2004
☎ 03 60 47 09 81 - info@securiteinfo.com


CVE-2025-30397

Description

Access of resource using incompatible type ('type confusion') in Microsoft Scripting Engine allows an unauthorized attacker to execute code over a network.

POC

Reference

- https://www.vicarius.io/vsociety/posts/cve-2025-30397-type-confusion-vulnerability-in-microsoft-scripting-engine-detection-script

- https://www.vicarius.io/vsociety/posts/cve-2025-30397-type-confusion-vulnerability-in-microsoft-scripting-engine-mitigation-script

Github

- https://github.com/0xMarcio/cve

- https://github.com/0xsyr0/OSCP

- https://github.com/AMatheusFeitosaM/OSCP-Cheat

- https://github.com/ARPSyndicate/cve-scores

- https://github.com/B1ack4sh/Blackash-CVE-2025-30397

- https://github.com/GhostTroops/TOP

- https://github.com/Leviticus-Triage/ChromSploit-Framework

- https://github.com/PuddinCat/GithubRepoSpider

- https://github.com/VishuGahlyan/OSCP

- https://github.com/giriaryan694-a11y/exposed-win-zero-days

- https://github.com/jibinjobyp/internshipdaythree

- https://github.com/jitmondal1/OSCP

- https://github.com/mbanyamer/CVE-2025-30397---Windows-Server-2025-JScript-RCE-Use-After-Free-

- https://github.com/nomi-sec/PoC-in-GitHub

- https://github.com/packetinside/CISA_BOT

- https://github.com/redacherkaoui/jscript.dll

- https://github.com/ums91/CISA_BOT

- https://github.com/yembors64632/cve_monitor_Public

- https://github.com/zxarj/wxvl