VariCAD is prone to a remote buffer-overflow vulnerability because the application fails to perform adequate boundary checks on user-supplied input This module runs a malicious web server on the Core Impact Console and waits for an unsuspecting user to trigger the exploit by connecting to it.
uTorrent is prone to a vulnerability that may allow execution of plugin_dll.dll if this dll is located in the same folder as a .TORRENT file. The attacker must entice a victim into opening a specially crafted .TORRENT file. This file and the associated binary may be delivered to a user through remote WebDAV shares. An attacker may exploit this issue to execute arbitrary code.
This module exploits a stack-based buffer overflow in uTorrent 1.6 when parsing a malformed "announce" tag in a .torrent file.
This module exploits an argument injection vulnerability in Microsoft Internet Explorer, when running on systems with Firefox installed and certain URIs registered, allows remote attackers to conduct cross-browser scripting attacks and execute arbitrary commands via shell metacharacters in a FirefoxURL or FirefoxHTML URI, which are inserted into the command line that is created when invoking firefox.exe.
The Ultra Office Control ActiveX control (OfficeCtrl.ocx) is vulnerable to a stack-based buffer overflow. By persuading a victim to visit a specially-crafted Web page that passes an overly long string to the HttpUpload() method, a remote attacker could overflow a buffer and execute arbitrary code on the system with the privileges of the current user or cause the victim's browser to crash.
UltraVNC Viewer is prone to a vulnerability that may allow execution of vnclang.dll if this dll is located in the same folder than .VNC file. The attacker must entice a victim into opening a specially crafted .VNC file. This file and the associated binary may be delivered to a user through remote WebDAV shares. An attacker may exploit this issue to execute arbitrary code.
This exploit takes advantage of a vulnerability that allows attackers to cause UltraVNC client to execute arbitrary code via a malformed server response.
A stack-based buffer overflow in UltraISO allows an attacker to execute arbitrary code via crafted .MDS file. This module runs a malicious web server on the Core Impact Console and waits for an unsuspecting user to trigger the exploit by connecting to it.
UltraISO is prone to a vulnerability that may allow execution of daemon.dll if this dll is located in the same folder than .ISZ file. The attacker must entice a victim into opening a specially crafted .ISZ file. This file and the associated binary may be delivered to a user through remote WebDAV shares. An attacker may exploit this issue to execute arbitrary code.
The vulnerability is caused due to a boundary error within the parsing of .CUE files, This can be exploited to cause a stack-based buffer overflow via a .CUE file with an overly long file string. This module runs a malicious web server on the Core Impact Console and waits for an unsuspecting user to trigger the exploit by connecting to it.
Pagination
- Previous page
- Page 22
- Next page