This Metasploit module creates a malicious docx file that when opened in Word on a vulnerable Windows system will lead to code execution. This vulnerability exists because an attacker can craft a malicious ActiveX control to be used by a Microsoft Office document that hosts the browser rendering engine.
fcc3f4d138a7fb7352da3e6cb2038a1b4776153656e84bcdef4857dab28eac23
129 bytes small Linux/x86 chmod + execute + hide output via /usr/bin/wget shellcode.
d71026b126f921724e16445e34b085a5d7ac0a2d632fd2da03c87d64173716c6
XenForo 2 suffers from a CSS loader denial of service vulnerability.
f08a899f612b499b3a9aa1796d8fbaa32aad423a4aeac9610cc59c1f5b5c6e17