Buffer overflow in file conversion TextBox processing of Microsoft Office Publisher allows remote attackers to execute arbitrary code via a crafted Publisher file.

WARNING: This is an early release module. This is not the final version of this module. It is a pre-released version in order to deliver a module as quickly as possible to our customers that may be useful in some situations. Since this module is not the final version it may contain bugs or have limited functionality and may not have complete or accurate documentation.
This module exploits a vulnerability in the CTSUEng.ocx control included in the Creative Software AutoUpdate application. The exploit is triggered when the CacheFolder property processes a long string argument resulting in a stack-based buffer overflow. This module runs a malicious web site on the CORE IMPACT Console and waits for an unsuspecting user to trigger the exploit by connecting to the web site.

This update add support till 2.0.12.0 version of CTSUEng.ocx.

This module exploits a stack-based buffer overflow vulnerability in Oracle Java SE when jsound.dll parses a specially crafted Soundbank file.



WARNING: This is an early release module. This is not the final version of this module.

It is a pre-released version in order to deliver a module as quickly as possible to our customers that may be useful in some situations. Since this module is not the final version it may contain bugs or have limited functionality and may not have complete or accurate documentation.
This vulnerability allows remote attackers to execute arbitrary code on

vulnerable installations of Microsoft Internet Explorer.

The specific flaw exists within the Tabular Data Control ActiveX module.

Specifically, if provided a malicious DataURL parameter a stack

corruption may occur in the function CTDCCtl::SecurityCHeckDataURL. This

can be leveraged to execute arbitrary code under the context of the

current user.

WARNING: This is an early release module. This is not the final version of this module. It is a pre-released version in order to deliver a module as quickly as possible to our customers that may be useful in some situations. Since this module is not the final version it may contain bugs or have limited functionality and may not have complete or accurate documentation.
This module exploits a heap based buffer overflow vulnerability in Mozilla Firefox via a WOFF font file embedded in a HTML.

WARNING:This is an early release module. This is not the final version of this module.It is a pre-released version in order to deliver a module as quickly as possible to our customers that may be useful in some situations. Since this module is not the final version it may contain bugs or have limited functionality and may not have complete or accurate documentation.