Microsoft Internet Explorer is prone to a use after free vulnerability caused by an object that was not properly allocated or is deleted. This module runs a web server waiting for vulnerable clients (Internet Explorer) to connect to it. When the client connects, it will try to install an agent by exploiting this vulnerability.
An integer overflow in the ActiveX control icardie.dll in Internet Explorer allows remote attackers to execute arbitrary code. This module runs a web server waiting for vulnerable clients (Internet Explorer 8) to connect to it. When the client connects, it will try to install an agent by exploiting this vulnerability.
This module exploits a vulnerability in Microsoft HTML Help Workshop. The vulnerability is caused due to a boundary error in Microsoft HTML Help Workshop within the processing of .HHP files. This can be exploited to cause a stack-based buffer overflow when a specially crafted file is opened. This module runs a malicious web site on the Core Impact Console and waits for an unsuspecting user to trigger the exploit by connecting to the web site.
This module exploits a stack-based buffer overflow in GDI in Microsoft Windows, allowing remote attackers to execute arbitrary code via a specially crafted EMF image file.
Microsoft Expression Design is prone to a vulnerability that may allow the execution of any library file named wintab32.dll, if this dll is located in the same folder than a .DESIGN file. The attacker must entice a victim into opening a specially crafted .DESIGN file. This file and the associated binary may be delivered to a user through remote WebDAV shares. An attacker may exploit this issue to execute arbitrary code.
A malformed Microsoft Excel document allows an attacker to execute arbitrary code when processing XLB files. This module runs a malicious web server on the Core Impact Console and waits for an unsuspecting user to trigger the exploit by connecting to it.
Buffer overflow in Microsoft Office Excel allows remote attackers to execute arbitrary code via a crafted .SLK file. This module runs a malicious web server on the Core Impact Console and waits for an unsuspecting user to trigger the exploit by connecting to it.
This module exploits a buffer overflow on Microsoft Office Excel when parsing a malformed .XLS file.
This module exploits a vulnerability in Microsoft Excel 2003 SP2 and earlier when parsing a malformed xls file. The module will send an e-mail with an attached .xls file. This file will deploy an agent when opened by the user.
This module exploits a buffer overflow on Microsoft Office Excel when parsing a malformed .XLS file.
Pagination
- Previous page
- Page 53
- Next page