This module abuses the scripting functionality in Autodesk Maya to trigger remote code execution via a specially crafted file.
Autodesk 3D Studio Max allows users to bind script to application callbacks. This functionality could be exploited by an attacker by making a victim open a seemingly innocuous .MAX file with malicious script embedded.
This module abuses the scripting functionality in Autodesk Softimage to trigger remote code execution via a project with an embedded script.
UltraVNC client is prone to integer-overflow vulnerabilities because they fail to properly validate data supplied by the VNC server.
This module exploits a vulnerability in the AeXNSConsoleUtilities.dll control included in the Symantec ConsoleUtilities application. The exploit is triggered when the BrowseAndSaveFile method processes a long string argument resulting in a stack-based buffer overflow.
This module exploits a stack based buffer overflow vulnerability in Sun Java SE in JDK and JRE when the HsbParser.getSoundBank function in jsound.dll handles a specially crafted .JAR file.
This module causes a DoS in win32k.sys when attempts to render an embedded font.
WARNING: This is an early release module.
WARNING: This is an early release module.
This module sends a malformed NetBIOS packet executing an infinite loop in the target.
This is an early release module. This is not the final version of this module.
It is a pre-released version in order to deliver a module as quickly as possible to our customers that may be useful in some situations.
Since this module is not the final version it may contain bugs or have limited functionality and may not have complete or accurate documentation.
This is an early release module. This is not the final version of this module.
It is a pre-released version in order to deliver a module as quickly as possible to our customers that may be useful in some situations.
Since this module is not the final version it may contain bugs or have limited functionality and may not have complete or accurate documentation.
Boundary errors exists in HP LoadRunner in Persits.XUpload.2 ActiveX control (XUpload.ocx) when processing arguments passed to the "AddFile()" method. This can be exploited to cause stack-based buffer overflows by passing specially crafted, overly-long strings as argument to the affected method.
This module runs a web server waiting for vulnerable clients to connect to it. When the client connects, it will try to install an agent by instantiating the "iim" uri handler with a malicious DLL(impact.dll) as parameter.
Pagination
- Previous page
- Page 74
- Next page