Foxit PDF Reader is prone to a vulnerability that may allow the execution of any library file named dwmapi.dll, if this dll is located in the same folder than a .PDF file. The attacker must entice a victim into opening a specially crafted .HEX file. This file and the associated binary may be delivered to a user through remote WebDAV shares. An attacker may exploit this issue to execute arbitrary code.
A vulnerability has been identified in Foxit Reader, which could be exploited by attackers to compromise a vulnerable system. This issue is caused by a stack-based buffer overflow error when processing Compact Font Format (CFF) data within a PDF document, which could be exploited by attackers to execute arbitrary code by tricking a user into opening a specially crafted PDF document. This vulnerability is the same that is currently being exploited to jailbreak the iPhone 4 OS.
Foxit Phantom PDF Suite is prone to a buffer-overflow vulnerability that occurs because it fails to perform adequate boundary checks on user-supplied data via a crafted .PDF document. This module runs a malicious web server on the Core Impact Console and waits for an unsuspecting user to trigger the exploit by connecting to it.
This exploit takes advantage of a vulnerability that allows attackers to cause FlashGet to execute arbitrary code via a malformed FTP PWD response.
This module exploits a vulnerability in Mozilla Firefox when serializing XML to a DOM object. A certain method used during this process is likely to create a dangling pointer. Remote attackers can take advantage of this memory and use it to execute arbitrary code. This module runs a web server waiting for vulnerable clients (Mozilla Firefox) to connect to it. When the client connects, it will try to install an agent by exploiting this vulnerability.
This module runs a web server waiting for vulnerable clients (Firefox v1.04 or earlier) to connect to it. When the client connects, it will try to install an agent by triggering the InstallVersion.compareTo() vulnerability. When InstallVersion.compareTo() is passed an object rather than a string it assumed the object was another InstallVersion without verifying it. This condition can be leveraged to take control of the instruction pointer.
This module exploits a buffer overflow in the ffdshow codec when processing a specially crafted, long URL. This module triggers the bug through web browser by loading the Windows Media Player object. This module runs a web server waiting for vulnerable clients (Internet Explorer or Mozilla Firefox) to connect to it. When the client connects, it will try to install an agent by exploiting this vulnerability.
FeedDemon is prone to a remote buffer-overflow vulnerability because the application fails to perform adequate boundary checks on user-supplied input This module runs a malicious web server on the Core Impact Console and waits for an unsuspecting user to trigger the exploit by connecting to it.
This module exploits a client-side command execution vulnerability in the ActiveX control of the FaceBook Image Uploader. The module will run a malicious website in the Core Impact console and wait for a user to connect and trigger the exploit. This module runs a web server waiting for vulnerable clients (Internet Explorer) to connect to it. When the client connects, it will try to install an agent by exploiting this vulnerability.
A stack-based buffer overflow in eZip Wizard allows an attacker to execute arbitrary code via a crafted .ZIP file that contains a file with a long name. This module runs a malicious web server on the Core Impact Console and waits for an unsuspecting user to trigger the exploit by connecting to it.
Pagination
- Previous page
- Page 66
- Next page