Invalid or Broken rss link.
 

Author: admin

EPS Processing Zero-Days Exploited File Details Filename 6785e29698444243677300db6a0c519909ae9e620d575e76d9be4862b33ed490.bin Size 251,036 Bytes MD5 2ABE3CC4BFF46455A945D56C27E9FB45 SHA1 0BD354D1EEA9E4864F4C17E6C22BFDB81D88DDEE SHA256 6785E29698444243677300DB6A0C519909AE9E620D575E76D9BE4862B33ED490 Technologies Affected Microsoft Office 2010 Service Pack 2 (32-bit editions) Microsoft Office 2010 Service Pack 2 (64-bit editions) Microsoft Office 2013 RT Service Pack 1 ...

Read More

File Details: Filename 72e347ff2bd8f04d22c30f893c24811012b9fde6040ee632ffaf0ad26e5641cf.bin Size 536 Kilobytes MD5 d86d323607746945d09516f7f9c917fa SHA1 757dfe8e61f96d470da70235dc8c0e3dc9567339 SHA256 72e347ff2bd8f04d22c30f893c24811012b9fde6040ee632ffaf0ad26e5641cf Static Analysis This exploit consists of a compressed zip file with activeX 1.bin embedded in it along with rop-chain and shell code as shown in the diagram after the...

Read More