This module exploits a stack-based buffer overflow in Visio Viewer This module runs a web server waiting for vulnerable clients (Internet Explorer 6 or 7) to connect to it. When the client connects, it will try to install an agent by exploiting this vulnerability.
Microsoft Visio 2003 is prone to a vulnerability that may allow execution of mfc71enu if this dll is located in the same folder than .VSD file. The attacker must entice a victim into opening a specially crafted .VSD file. This file and the associated binary may be delivered to a user through remote WebDAV shares. An attacker may exploit this issue to execute arbitrary code.
The Unicode Script Processor (Uniscribe) implementation in USP10.DLL does not properly validate tables associated with malformed OpenType fonts, producing an array index error. This module runs a malicious web server on the Core Impact Console and waits for an unsuspecting user to trigger the exploit by connecting to it.
This module exploits a vulnerability in the SQLDMO.DLL control included in the Microsoft SQL Server application. The exploit is triggered when the Start() method processes a long string argument resulting in a stack-based buffer overflow. This module runs a malicious web site on the Core Impact Console and waits for an unsuspecting user to trigger the exploit by connecting to the web site. This module runs a web server waiting for vulnerable clients (Internet Explorer) to connect to it. When the client connects, it will try to install an agent by exploiting this vulnerability.
A remote code execution vulnerability exists in Microsoft Silverlight that can allow a specially crafted Silverlight application to access memory in an unsafe manner. An attacker who successfully exploited this vulnerability could run arbitrary code in the security context of the current user. This module runs a web server waiting for vulnerable clients to connect to it. When the client connects, it will try to install an agent by exploiting this vulnerability.
This module exploits a stack-based buffer overflow in Microsoft PowerPoint Viewer 2003 by sending a specially crafted .PPT file with a malformed TextBytesAtom (0xF0A8) record. This module runs a web server waiting for vulnerable clients to connect to it. When the client connects, it will try to install an agent by exploiting this vulnerability.
This module exploits an error while processing the OEPlaceholderAtom Record when loading PPT files into memory that can be exploited to corrupt memory via a specially crafted PPT file. This module runs a web server waiting for vulnerable clients to connect to it. When the client connects, it will try to install an agent by exploiting this vulnerability.
A remote code execution vulnerability exists in the way that Microsoft Office Powerpoint handles specially crafted Powerpoint files. An attacker who successfully exploited this vulnerability could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights.
A buffer overflow in Microsoft Outlook allows user-assisted remote attackers to execute arbitrary code via a crafted OSS file that triggers memory corruption.
This module exploits a vulnerability in the Microsoft Office Works converter that could allow remote code execution via a specially crafted .wps file.
Pagination
- Previous page
- Page 46
- Next page