From 4bc4dc0218bc10545d4b89c279b78a0319a9a6f1 Mon Sep 17 00:00:00 2001 From: Offensive Security Date: Fri, 10 Jun 2016 05:06:43 +0000 Subject: [PATCH] DB: 2016-06-10 1 new exploits Microsoft Word (Win/Mac) - Crash PoC --- files.csv | 1 + platforms/multiple/dos/39906.txt | 10 ++++++++++ 2 files changed, 11 insertions(+) create mode 100755 platforms/multiple/dos/39906.txt diff --git a/files.csv b/files.csv index cd92c2484..88215620f 100755 --- a/files.csv +++ b/files.csv @@ -36085,3 +36085,4 @@ id,file,description,date,author,platform,type,port 39903,platforms/windows/local/39903.txt,"League of Legends Screensaver - Insecure File Permissions Privilege Escalation",2016-06-07,"Vincent Yiu",windows,local,0 39904,platforms/asp/webapps/39904.txt,"Cisco EPC 3928 - Multiple Vulnerabilities",2016-06-07,"Patryk Bogdan",asp,webapps,0 39905,platforms/php/webapps/39905.txt,"Drale DBTableViewer 100123 - Blind SQL Injection",2016-06-08,HaHwul,php,webapps,80 +39906,platforms/multiple/dos/39906.txt,"Microsoft Word (Win/Mac) - Crash PoC",2016-06-09,halsten,multiple,dos,0 diff --git a/platforms/multiple/dos/39906.txt b/platforms/multiple/dos/39906.txt new file mode 100755 index 000000000..8a1e73027 --- /dev/null +++ b/platforms/multiple/dos/39906.txt @@ -0,0 +1,10 @@ +Source: https://twitter.com/halsten/status/740380171694280704 + +Win/Mac #MSFT Word #0day POC having 3 different forced triggers. Happy exploitation! + +Let Word recover it, its essential, and then you can trigger the bug afterwards in 3 ways, Save, Close/Save, change format. + + +Proof of Concept: +https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/39906.zip +