searchtwitterarrow rightmail strokearrow leftmail solidfacebooklinkedinplusangle upmagazine plus
Help Net Security - Daily information security news with a focus on enterprise security.
Help Net Security - Daily information security news with a focus on enterprise security.
  • News
  • Features
  • Expert analysis
  • Videos
  • Reviews
  • Events
  • Whitepapers
  • Industry news
  • Product showcase
  • Newsletters
Help Net Security
Help Net Security
November 2, 2009
Share

Find potential exploit conditions in Microsoft Office documents

OfficeCat is a command line utility developed by the Sourcefire VRT that can be used to process Microsoft Office Documents to determine the presence of potential exploit conditions in the file.

Officecat is available for Windows and Linux.

Vulnerabilities checked by OfficeCat:

  • CVE-2006-0001
  • CVE-2006-1301
  • CVE-2006-1306
  • CVE-2006-1308
  • CVE-2006-1540
  • CVE-2006-2492
  • CVE-2006-3014
  • CVE-2006-3086
  • CVE-2006-3431
  • CVE-2006-3432
  • CVE-2006-3493
  • CVE-2006-3590
  • CVE-2006-3656
  • CVE-2006-3864
  • CVE-2006-3865
  • CVE-2006-3875
  • CVE-2006-3876
  • CVE-2006-3877
  • CVE-2006-4534
  • CVE-2006-4694
  • CVE-2006-4700
  • CVE-2006-4701
  • CVE-2006-5994
  • CVE-2006-5995
  • CVE-2006-6456
  • CVE-2006-6561
  • CVE-2007-0027
  • CVE-2007-0030
  • CVE-2007-0031
  • CVE-2007-0515
  • CVE-2007-0671
  • CVE-2007-1203
  • CVE-2007-1214
  • CVE-2007-1756
  • CVE-2007-3029
  • CVE-2007-3030
  • CVE-2008-0081
  • CVE-2008-0111
  • CVE-2008-0114
  • CVE-2008-0115
  • CVE-2008-0116
  • CVE-2008-0117
  • CVE-2008-0118
  • CVE-2008-0119
  • CVE-2008-0120
  • CVE-2008-1088
  • CVE-2008-2244
  • CVE-2008-4024
  • CVE-2008-4026
  • CVE-2008-4837
  • CVE-2008-4841
Share this

Featured news

  • 3 business application security risks businesses need to prepare for in 2023
  • Researchers release PoC exploit for critical Windows CryptoAPI bug (CVE-2022-34689)
  • Attackers use portable executables of remote management software to great effect
Guide: How virtual CISOs can efficiently extend their services into compliance readiness

Sponsored

eBook: 4 ways to secure passwords, avoid corporate account takeover

Here’s the deal: Uptycs for all of 2023 for $1

2022 Cloud Data Security Report

Don't miss

3 business application security risks businesses need to prepare for in 2023

Researchers release PoC exploit for critical Windows CryptoAPI bug (CVE-2022-34689)

Attackers use portable executables of remote management software to great effect

How businesses can bolster their cybersecurity defenses with open source

ChatGPT is a bigger threat to cybersecurity than most realize

Cybersecurity news
Help Net Security - Daily information security news with a focus on enterprise security.
© Copyright 1998-2023 by Help Net Security
Read our privacy policy | About us | Advertise
Follow us