CVE-2018-0802
CVE-2018-0802 copied to clipboard
PoC Exploit for CVE-2018-0802 (and optionally CVE-2017-11882)
how i can replace white image to something else?
Hey so I use the python_packager .py script but it doesn’t work. When I open doc on target machine , it just opens word document, does not load calc.exe (which...
i know its too much basic question can you please guide me that how to apply yara rules on doc file ?? or it can be also applied on python...
build doc from ur code and its not working....
Funny think. So not considered to Windows Update, i builded few .rtf files with some random .exe and it worked fine, since 2 days ago(i tried several python versions) i...
i have error this errors: python packager_exec_CVE-2018-0802.py -e "cmd.exe /c start calc.exe" -o test.rtf Traceback (most recent call last): File "packager_exec_CVE-2018-0802.py", line 337, in f.write(create_rtf(RTF_HEADER, RTF_TRAILER, args.executable, args.double)) File "packager_exec_CVE-2018-0802.py",...
hi. I tried it with reverse_shell msfvenom , and it worked just fine. but when i try it with download_exec , it not working. the file wont run. do you...
i made a video to demonstrate exploit not executing EXECUTABLE 