This module exploits a buffer overflow in the Microsoft Excel file via a hyperlink bigger than 8000 bytes of length.
This module exploits a stack-based buffer overflow vulnerability in the PostScript processor included in GNOME Evince. The vulnerability is caused by the get_next_text() function not properly validating overly long fields in aPostScript file. The exploit is triggered when an unsuspecting user opens a specially crafted file distributed via an email.
EViews Enterprise Edition is prone to a vulnerability that may allow the execution of any library file named dwmapi.dll, if this dll is located in the same folder than a .PRG file. The attacker must entice a victim into opening a specially crafted .PRG file. This file and the associated binary may be delivered to a user through remote WebDAV shares. An attacker may exploit this issue to execute arbitrary code.
This exploit takes advantage of a vulnerability that allows attackers to cause Eureka Mail Client to execute arbitrary code via a malformed server response.
Euphonics Audio Player contains a buffer prone to exploitation via an overly long string. The vulnerability is caused due to a boundary error when handling .PLS files. This module runs a malicious web server on the Core Impact Console and waits for an unsuspecting user to trigger the exploit by connecting to it.
ALZip is vulnerable to a stack buffer overflow in libETC.dll due to improper parsing of the filename or name parameter within MIM file headers if an overly long filename is provided. The exploit is triggered when the user opens the malicious MIM file using from the windows explorer or from the main interface of the program. This module runs a malicious web server on the Core Impact Console and waits for an unsuspecting user to trigger the exploit by opening the file.
eSignal is prone to a buffer overflow when parsing malformed QUO files. This module runs a malicious web server on the Core Impact Console and waits for an unsuspecting user to trigger the exploit by connecting to it.
A Buffer Overflow exists within ERDAS ER Viewer due to a boundary error within the rf_report_error() function in (ermapper_u.dll) when parsing a specially crafted ERS file. This module runs a malicious web site on the Core Impact Console and waits for an unsuspecting user to trigger the exploit by connecting to the web site.
A Buffer Overflow exists within ERDAS ER Viewer due to a boundary error within the ERM_convert_to_correct_webpath() function in (ermapper_u.dll) when parsing file paths via a specially crafted ERS file. This module runs a malicious web site on the Core Impact Console and waits for an unsuspecting user to trigger the exploit by connecting to the web site.
This module exploits a vulnerability in the kwedit.dll control included in the EnjoySAP application. The exploit is triggered when the PrepareToPostHTML() method processes a long string argument resulting in a stack-based buffer overflow. This module runs a malicious web site on the Core Impact Console and waits for an unsuspecting user to trigger the exploit by connecting to the web site. This module runs a web server waiting for vulnerable clients (Internet Explorer) to connect to it. When the client connects, it will try to install an agent by exploiting this vulnerability.
Pagination
- Previous page
- Page 67
- Next page