This module exploits a XSS vulnerability in JOnAS which allows CORE Core Impact to perform remote command injection impersonating an administrator and uploading a plugin to the JOnAS server. This module runs a web server waiting for a JOnAS administrator to connect to it. When the client connects, it will retrieve the JOnAS administrator cookie and try to install an agent on the JOnAS server by installing a custom plugin in JOnAS.
This module exploits a vulnerability in the JetAudio ActiveX Control (JetFlExt.dll). The exploit is triggered when a special string argument is processed by the DownloadFromMusicStore() method resulting in a stack-based buffer overflow. This module runs a malicious web site on the Core Impact Console and waits for an unsuspecting user to trigger the exploit by connecting to the web site. This module runs a web server waiting for vulnerable clients (Internet Explorer) to connect to it. When the client connects, it will try to install an agent by exploiting this vulnerability.
This module exploits a memory corruption vulnerability in Oracle Java SE when jsound.dll parses a specially crafted .RMF file.
IZArc is prone to a vulnerability that may allow the execution of any library file named wintab32.dll, if this dll is located in the same folder than a .ARJ file. The attacker must entice a victim into opening a specially crafted .ARJ file. This file and the associated binary may be delivered to a user through remote WebDAV shares. An attacker may exploit this issue to execute arbitrary code.
This module exploits a vulnerability in ispVM system. The vulnerability is caused due to boundary error in the processing of xcf files. This can be exploited to cause a stack-based buffer overflow when a specially crafted file is opened. This module runs a malicious web site on the Core Impact Console and waits for an unsuspecting user to trigger the exploit by connecting to the web site.
A stack-based buffer overflow in IrfanView (MrSID plug-in MrSID.dll) allows an attacker to execute arbitrary code via an specially crafted a .SID file. This module runs a malicious web server on the Core Impact Console and waits for an unsuspecting user to trigger the exploit by connecting to it.
This module exploits a vulnerability in Apple IrfanView which is caused due to a boundary error in the processing of jp2 files. This can be exploited to cause a stack-based buffer overflow when a specially crafted file is opened. This module runs a malicious web site on the Core Impact Console and waits for an unsuspecting user to trigger the exploit by connecting to the web site.
This module exploits a buffer overflow on IrfanView Formats plugin when parsing a specially crafted .XCF file.
This module exploits a vulnerability in IrfanView FlashPix plugin (.fpx files). The vulnerability is caused due to boundary error in fpx.dll within the processing of fpx files. This can be exploited to cause a heap-based buffer overflow when a specially crafted file is opened. This module runs a malicious web site on the Core Impact Console and waits for an unsuspecting user to trigger the exploit by connecting to the web site.
This module exploits a buffer overflow on IrfanView Formats plugin when parsing a specially crafted .TTF file.
Pagination
- Previous page
- Page 57
- Next page