VariCAD is prone to a remote buffer-overflow vulnerability because the application fails to perform adequate boundary checks on user-supplied input This module runs a malicious web server on the Core Impact Console and waits for an unsuspecting user to trigger the exploit by connecting to it.
uTorrent is prone to a vulnerability that may allow execution of plugin_dll.dll if this dll is located in the same folder as a .TORRENT file. The attacker must entice a victim into opening a specially crafted .TORRENT file. This file and the associated binary may be delivered to a user through remote WebDAV shares. An attacker may exploit this issue to execute arbitrary code.
This module exploits an argument injection vulnerability in Microsoft Internet Explorer, when running on systems with Firefox installed and certain URIs registered, allows remote attackers to conduct cross-browser scripting attacks and execute arbitrary commands via shell metacharacters in a FirefoxURL or FirefoxHTML URI, which are inserted into the command line that is created when invoking firefox.exe.
The Ultra Office Control ActiveX control (OfficeCtrl.ocx) is vulnerable to a stack-based buffer overflow. By persuading a victim to visit a specially-crafted Web page that passes an overly long string to the HttpUpload() method, a remote attacker could overflow a buffer and execute arbitrary code on the system with the privileges of the current user or cause the victim's browser to crash.
UltraVNC Viewer is prone to a vulnerability that may allow execution of vnclang.dll if this dll is located in the same folder than .VNC file. The attacker must entice a victim into opening a specially crafted .VNC file. This file and the associated binary may be delivered to a user through remote WebDAV shares. An attacker may exploit this issue to execute arbitrary code.
A stack-based buffer overflow in UltraISO allows an attacker to execute arbitrary code via crafted .MDS file. This module runs a malicious web server on the Core Impact Console and waits for an unsuspecting user to trigger the exploit by connecting to it.
UltraISO is prone to a vulnerability that may allow execution of daemon.dll if this dll is located in the same folder than .ISZ file. The attacker must entice a victim into opening a specially crafted .ISZ file. This file and the associated binary may be delivered to a user through remote WebDAV shares. An attacker may exploit this issue to execute arbitrary code.
The vulnerability is caused due to a boundary error within the parsing of .CUE files, This can be exploited to cause a stack-based buffer overflow via a .CUE file with an overly long file string. This module runs a malicious web server on the Core Impact Console and waits for an unsuspecting user to trigger the exploit by connecting to it.