An attack chain implementing Externally Controlled Reference to a Resource in Another Sphere in Microsoft Word using CVE-2022-30190, 163 email backdoor, and image steganography. Integration of gdog and follina code with usage instructions and remarks
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo