This Metasploit module creates a malicious RTF file that when opened in vulnerable versions of Microsoft Word will lead to code execution. The flaw exists in how an olelink object can make a http(s) request, and execute hta code in response. This bug was originally seen being exploited in the wild starting in Oct 2016. This Metasploit module was created by reversing a public malware sample.
7e6b9ea3c2f7098466493a6d04a3625fe49a4a591628f01dcefb67c6615f8b03
PDF hack that demonstrates how to execute an embedded executable.
210679723fb461545cbf20e0f88717eb3f49856def8b6a1dc62a64f16049f8ac
This Metasploit module exploits a buffer overflow in Adobe Reader and Adobe Acrobat Professional 8.1.1. By creating a specially crafted pdf that a contains malformed Collab.collectEmailInfo() call, an attacker may be able to execute arbitrary code.
518aaf1102414303ab4491f0657827b243a86c8bd0569ed8dd01e3e5a762cfb3
This Metasploit module exploits a buffer overflow in Adobe Reader and Adobe Acrobat Professional < 8.1.4. By creating a specially crafted pdf that a contains malformed Collab.getIcon() call, an attacker may be able to execute arbitrary code.
d4a91c898b2b649b678e2e14b004ed1827360112073820eebd1bb1198e2c3e7a
This Metasploit module exploits a heap-based pointer corruption flaw in Adobe Reader 9.0.0 and earlier. This Metasploit module relies upon javascript for the heap spray.
c70e7201fb6677429aa372f8e4d78ab8b21364ee9a98a1ffc919b117d64949be
This Metasploit module exploits a buffer overflow in Adobe Reader and Adobe Acrobat Professional < 8.1.3. By creating a specially crafted pdf that a contains malformed util.printf() entry, an attacker may be able to execute arbitrary code.
97136b48e204e50ed975b0d248d3e807fc8bfc21f553834a21665ee774475b17