This module exploits a vulnerability in the keyhelp.ocx control included in EMC Captiva QuickScan application. The vulnerability is triggered when the JumpURL() method processes a long string argument resulting in a stack-based buffer overflow. This module runs a web server waiting for vulnerable clients (Internet Explorer) to connect to it. When the client connects, it will try to install an agent by exploiting this vulnerability.
Elecard MPEG Player contains a buffer prone to exploitation via an overly long string. The vulnerability is caused due to a boundary error in Elecard MPEG Player when handling .m3u files. This situation that leads to a buffer overflow and allows an attacker to overwrite an SEH Pointer. This can be exploited via a specially crafted .m3u file. This module runs a malicious web server on the Core Impact Console and waits for an unsuspecting user to trigger the exploit by connecting to it.
EffectMatrix Magic Morph contains a buffer prone to exploitation via an overly long string. The vulnerability is caused due to a boundary error in EffectMatrix Magic Morph when handling .MOR files. This can be exploited to cause a stack-based buffer overflow via a specially crafted .MOR file. This module runs a malicious web server on the Core Impact Console and waits for an unsuspecting user to trigger the exploit by connecting to it.
Effective File Search is prone to a vulnerability that may allow the execution of any library file named ztvunrar36.dll, if this dll is located in the same folder than a .EFS file. The attacker must entice a victim into opening a specially crafted .EFS file. This file and the associated binary may be delivered to a user through remote WebDAV shares. An attacker may exploit this issue to execute arbitrary code.
eEye Retina WiFi Scanner contains a buffer prone to exploitation via an overly long string. The vulnerability is caused due to a boundary error when handling crafted .RWS files. This module runs a malicious web server on the Core Impact Console and waits for an unsuspecting user to trigger the exploit by connecting to it.
This module exploits a vulnerability in the officeviewer.ocx control included in the Edraw Office Viewer Component ActiveX application. The exploit is triggered when the HttpPost() method processes a long string argument resulting in a stack-based buffer overflow. This module runs a web server waiting for vulnerable clients (Internet Explorer) to connect to it. When the client connects, it will try to install an agent by exploiting this vulnerability.
Easy RM to MP3 Converter is vulnerable to a stack-based buffer overflow, caused by improper bounds checking when parsing specially crafted .pls files. This module runs a web server on the Core Impact Console and waits for an unsuspecting user to trigger the exploit by connecting to it.
A stack-based buffer overflow in easyHDR PRO allows an attacker to execute arbitrary code via an invalid Flexible Image Transport System (FITS) file. This module runs a malicious web server on the Core Impact Console and waits for an unsuspecting user to trigger the exploit by connecting to it.