searchtwitterarrow rightmail strokearrow leftmail solidfacebooklinkedinplusangle upmagazine plus
Help Net Security - Daily information security news with a focus on enterprise security.
Help Net Security - Daily information security news with a focus on enterprise security.
  • News
  • Features
  • Expert analysis
  • Videos
  • Events
  • Whitepapers
  • Industry news
  • Product showcase
  • Newsletters
Help Net Security
Help Net Security
November 2, 2009
Share

Find potential exploit conditions in Microsoft Office documents

OfficeCat is a command line utility developed by the Sourcefire VRT that can be used to process Microsoft Office Documents to determine the presence of potential exploit conditions in the file.

Officecat is available for Windows and Linux.

Vulnerabilities checked by OfficeCat:

  • CVE-2006-0001
  • CVE-2006-1301
  • CVE-2006-1306
  • CVE-2006-1308
  • CVE-2006-1540
  • CVE-2006-2492
  • CVE-2006-3014
  • CVE-2006-3086
  • CVE-2006-3431
  • CVE-2006-3432
  • CVE-2006-3493
  • CVE-2006-3590
  • CVE-2006-3656
  • CVE-2006-3864
  • CVE-2006-3865
  • CVE-2006-3875
  • CVE-2006-3876
  • CVE-2006-3877
  • CVE-2006-4534
  • CVE-2006-4694
  • CVE-2006-4700
  • CVE-2006-4701
  • CVE-2006-5994
  • CVE-2006-5995
  • CVE-2006-6456
  • CVE-2006-6561
  • CVE-2007-0027
  • CVE-2007-0030
  • CVE-2007-0031
  • CVE-2007-0515
  • CVE-2007-0671
  • CVE-2007-1203
  • CVE-2007-1214
  • CVE-2007-1756
  • CVE-2007-3029
  • CVE-2007-3030
  • CVE-2008-0081
  • CVE-2008-0111
  • CVE-2008-0114
  • CVE-2008-0115
  • CVE-2008-0116
  • CVE-2008-0117
  • CVE-2008-0118
  • CVE-2008-0119
  • CVE-2008-0120
  • CVE-2008-1088
  • CVE-2008-2244
  • CVE-2008-4024
  • CVE-2008-4026
  • CVE-2008-4837
  • CVE-2008-4841
Share this

Featured news

  • Malicious ads creep into Bing Chat responses
  • How should organizations navigate the risks and opportunities of AI?
  • Why California’s Delete Act matters for the whole country
Guide: SaaS Offboarding Checklist

Sponsored

eBook: 9 Ways to Secure Your Cloud App Dev Pipeline

Free entry-level cybersecurity training and certification exam

Guide: Attack Surface Management (ASM)

Don't miss

Malicious ads creep into Bing Chat responses

How should organizations navigate the risks and opportunities of AI?

Why California’s Delete Act matters for the whole country

Yet another Chrome zero-day exploited in the wild! (CVE-2023-5217)

How to avoid the 4 main pitfalls of cloud identity management

Cybersecurity news
Help Net Security - Daily information security news with a focus on enterprise security.
© Copyright 1998-2023 by Help Net Security
Read our privacy policy | About us | Advertise
Follow us