A malformed Microsoft Excel document allows an attacker to execute arbitrary code when processing malformed RTD (recType 0x813) records. This module runs a malicious web server on the Core Impact Console and waits for an unsuspecting user to trigger the exploit by connecting to it.
This module exploits a memory corruption on Microsoft Office Excel when parsing a malformed .XLS file with a specially crafted PivotTable Cache Data record.
This module exploits Microsoft Office 2007 systems via a crafted Excel document that triggers an access attempt on an invalid SST record.
This module exploits an error during processing of FORMAT records when loading Excel files into memory that can be exploited to corrupt memory via a specially crafted XLS file containing an out-of-bounds array index. This module runs a web server waiting for vulnerable clients to connect to it. When the client connects, it will try to install an agent by exploiting this vulnerability.
This module exploits an arbitrary pointer dereference on Microsoft Office Excel XP while parsing a malformed .XLS file with a specially crafted DBQueryExt record.
This module exploits a memory corruption on Microsoft Office Excel XP when parsing a malformed .XLS file with a specially crafted DbOrParamQry record.
This module exploits a memory corruption in Microsoft Office Powerpoint when parsing a .PPT document with a specially crafted msofbtOPT record type. This module runs a web server waiting for vulnerable clients to connect to it. When the client connects, it will try to install an agent by exploiting this vulnerability.
A remote code execution vulnerability exists in the way that Microsoft Office Powerpoint handles specially crafted Powerpoint files. An attacker who successfully exploited this vulnerability could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights.
Microsoft Access contains a vulnerability in the way it handles compiled queries that are stored in .acdb files. It mistakenly interprets certain fields in the file as pointers and produce memory corruption. This module runs a web server waiting for vulnerable clients to connect to it. When the client connects, it will try to install an agent by exploiting this vulnerability.
Microsoft Notepad is prone to a vulnerability that may allow execution of wab32res.dll.
Pagination
- Previous page
- Page 49
- Next page