Skip to content
SecBytes
Menu
  • Home
  • Sumit Shrivastava (@invad3rsam)
  • Contact Me
Menu

Tag: MS Word

Getting system access using malicious word file

Posted on May 23, 2017January 12, 2020 by Sumit

Microsoft Office Word / Wordpad remote code execution vulnerability allows a remote attacker to execute arbitrary code on the system. An attacker can send specially crafted files which can cause the MS Word / Wordpad to download a remote shell and the attacker can gain access of the system. Once, the attacker has control of…

Continue reading

Recent Posts

  • Setting Up Wazuh Server – Part 3 (Wazuh Dashboard)
  • Setting Up Wazuh Server – Part 2 (Wazuh Manager)
  • Setting Up Wazuh Server – Part 1 (Wazuh Indexer)
  • Guide to Creating Virtual Machines from Proxmox Templates
  • Self-Hosted Kubernetes Cluster in your Home Lab

Categories

  • Application Security Assessment (2)
  • Capture The Flag (1)
  • CVE (1)
  • DevSecOps (4)
  • Lab Solution (1)
  • Metasploit (2)
  • Miscellaneous (5)
  • Network Penetration Testing (3)
  • Phishing (1)
  • Tips and Tricks (8)

SecBytes

  • GitHub
  • Twitter
  • Facebook

RSS Exploit DB Update

  • [webapps] FortiWeb Fabric Connector 7.6.x - SQL Injection to Remote Code Execution February 4, 2026
    FortiWeb Fabric Connector 7.6.x - SQL Injection to Remote Code Execution
  • [local] Docker Desktop 4.44.3 - Unauthenticated API Exposure February 4, 2026
    Docker Desktop 4.44.3 - Unauthenticated API Exposure
  • [webapps] aiohttp 3.9.1 - directory traversal PoC February 4, 2026
    aiohttp 3.9.1 - directory traversal PoC

Legal

  • Disclaimer
  • Privacy Policy
  • Cookie Policy

Subscribe to Blog via Email

Enter your email address to subscribe to this blog and receive notifications of new posts by email.

© 2026 SecBytes | Powered by Minimalist Blog WordPress Theme