Microsoft Office Word is prone to a memory corruption vulnerability when the wdGetApplicationObject function processes a malformed Word document. This can be exploited to execute arbitrary code by convincing an unsuspecting user to open a specially crafted .DOC file.
This module exploits a stack-based buffer overflow in Microsoft Office Word by sending a specially crafted .RTF file with a malformed pFragments record. This module runs a web server waiting for vulnerable clients to connect to it. When the client connects, it will try to install an agent by exploiting this vulnerability.
This module exploits a buffer overflow on Microsoft Office Word when parsing a malformed .DOC file with a specially crafted Property Data record.
This module exploits a vulnerability in Microsoft Office Word (.DOC files). The vulnerability is caused due to a boundary error in winword.exe within the processing of DOC files. This can be exploited to cause a memory corruption when a specially crafted file is opened. This module runs a malicious web server on the Core Impact Console and waits for an unsuspecting user to trigger the exploit by connecting to it.
This module exploits an error while processing the FIB when loading Word files into memory that can be exploited to corrupt memory via a specially crafted DOC file. This module runs a web server waiting for vulnerable clients to connect to it. When the client connects, it will try to install an agent by exploiting this vulnerability.
This module exploits a stack-based buffer overflow in the Microsoft Office Web Components. This module runs a web server waiting for vulnerable clients (Internet Explorer 6) to connect to it. When the client connects, it will try to install an agent by exploiting this vulnerability.
This module exploits a buffer overflow in the owc10.dll ActiveX Control included in Microsoft Office Web Components. This module runs a web server waiting for vulnerable clients (Internet Explorer) to connect to it. When the client connects, it will try to install an agent by exploiting this vulnerability.
Microsoft Office is prone to a vulnerability that may allow the execution of any library file named rsaenh.dll, if this dll is located in the same folder as a .dotx file. The attacker must entice a victim into opening a specially crafted .dotx file. This file and the associated binary may be delivered to a user through remote WebDAV shares. An attacker may exploit this issue to execute arbitrary code.
This module exploits a buffer overflow on Microsoft Office Publisher when parsing a malformed .PUB file with a specially crafted TextBox item.
This module exploits a buffer overflow on Microsoft Office Publisher when parsing a malformed .PUB file with a specially crafted TextBox item.
Pagination
- Previous page
- Page 47
- Next page