The vulnerability is caused due to a use-after-free error when handling events when the object firing the event is removed from the markup.

WARNING: This is an early release module. This is not the final version of this module.

It is a pre-released version in order to deliver a module as quickly as possible to our customers that may be useful in some situations. Since this module is not the final version it may contain bugs or have limited functionality and may not have complete or accurate documentation.
This module sends a malformed NetBIOS packet which causes the execution of an infinite loop in the target system.



This update adds support to Microsoft Windows 2008 and more Microsoft Windows 7 versions.



This update adds support to Microsoft Windows as source agent spoofing a network address.
This module exploits a vulnerability in Adobe Reader and Adobe Acrobat Professional .PDF files. The vulnerability is caused due to boundary errors in newplayer() method in multimedia.api. This can be exploited to cause a buffer overflow when a specially crafted .PDF file is opened.



This module runs a malicious web site on the CORE IMPACT Console and waits for an unsuspecting user to trigger the exploit by connecting to the web site.



This Update adds support for Windows XP SP3 and Vista.
This module exploits a vulnerability in Adobe Reader and Adobe Acrobat Professional .PDF files. The vulnerability is caused due to boundary errors in newplayer() method in multimedia.api. This can be exploited to cause a buffer overflow when a specially crafted .PDF file is opened.



This module runs a malicious web site on the CORE IMPACT Console and waits for an unsuspecting user to trigger the exploit by connecting to the web site.



WARNING: This is an early release module. This is not the final version of this module.

It is a pre-released version in order to deliver a module as quickly as possible to our customers that may be useful in some situations.

Since this module is not the final version it may contain bugs or have limited functionality and may not have complete or accurate documentation.
A vulnerability has been identified in IBM Access Support ActiveX, which could be exploited by remote attackers to compromise an affected system. This issue is caused by a buffer overflow error in the "IbmEgath.dll" module when processing malformed data passed to the "GetXMLValue()" method, which could be exploited by remote attackers to execute arbitrary code by tricking a user into visiting a specially crafted web page.