A stack-based buffer overflow in UltraISO allows an attacker to execute arbitrary code via a specially crafted .MDS file.
This module implements the SMB Relay attack to install an agent in the target machine.
This update adds client side functionality.
This update adds client side functionality.
This module exploits a buffer overflow vulnerability in the Extras Manager ActiveX Control included in Skype. This bug is currently being exploited in the wild.
The vulnerability is caused due to an error in the handling of parent windows and can result in a function call using an invalid pointer. This can be exploited to execute arbitrary code when a user e.g. visits a specially crafted web page and closes opened pop-up windows.
This update correct Linux support error.
This update correct Linux support error.
BlazeDVD is prone to a remote memory-corruption vulnerability because the application fails to handle malformed playlist files.
This version add support for BlazeDVD 6 and Windows 7.
This version add support for BlazeDVD 6 and Windows 7.
This module exploits a stack-based buffer overflow vulnerability in Oracle Java SE when jsound.dll parses a specially crafted Soundbank file.
This update improves the reliability of the exploit and adds support for Windows 7, Windows Vista and Windows 2000.
This update improves the reliability of the exploit and adds support for Windows 7, Windows Vista and Windows 2000.
This module exploits a buffer overflow in Mozilla Firefox when parsing a malformed UTF-8 encoded URL.
This update appends info to the "Supported systems notes" section.
This update appends info to the "Supported systems notes" section.
CastRipper contains a buffer prone to exploitation via an overly long string. The vulnerability is caused due to a boundary error in CastRipper when handling .PLS files. This can be exploited to cause a stack-based buffer overflow via a specially crafted .PLS file.
This module exploits a vulnerability in the GomWeb3.dll control included in the GoM Player ActiveX application. The exploit is triggered when the OpenURL() method processes a long string argument resulting in a stack-based buffer overflow.
This module exploits a vulnerability in Adobe Reader when parsing .PDF files. The vulnerability is caused due to a boundary error in authplay.dll when handling crafted malicious Flash (.SWF) file or by embedding a malicious Flash application in a .PDF file.
This version add Windows Vista support.
This version add Windows Vista support.
Pagination
- Previous page
- Page 66
- Next page