Exploit for Path Traversal in Microsoft. Path traversal in Microsoft allows remote code execution via malicious document with Bitmap Object in header, footer, document. It utilizes .dll payload, HTML with Javascript, .cab, .inf, and server hosting. With verbose and without verbose screenshots provided
Reporter | Title | Published | Views | Family All 153 |
---|---|---|---|---|
![]() | FormBook Adds Latest Office 365 0-Day Vulnerability (CVE-2021-40444) to Its Arsenal | 29 Sep 202100:00 | – | trendmicroblog |
![]() | Remote Code Execution 0-Day (CVE-2021-40444) Hits Windows, Triggered Via Office Docs | 9 Sep 202100:00 | – | trendmicroblog |
![]() | Microsoft Releases Mitigations and Workarounds for CVE-2021-40444 | 7 Sep 202100:00 | – | cisa |
![]() | Exploit for Path Traversal in Microsoft | 9 Sep 202115:43 | – | githubexploit |
![]() | Exploit for Vulnerability in Microsoft | 12 Sep 202109:27 | – | githubexploit |
![]() | Exploit for Path Traversal in Microsoft | 25 Nov 202105:13 | – | githubexploit |
![]() | Exploit for Path Traversal in Microsoft | 16 Sep 202110:14 | – | githubexploit |
![]() | Exploit for Vulnerability in Microsoft | 11 Sep 202115:33 | – | githubexploit |
![]() | Exploit for Path Traversal in Microsoft | 11 Sep 202116:31 | – | githubexploit |
![]() | Exploit for Path Traversal in Microsoft | 10 Sep 202116:55 | – | githubexploit |
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo