A remote code execution vulnerability exists in the way that Windows handles cursor, animated cursor, and icon formats. An attacker could try to exploit the vulnerability by constructing a malicious cursor or icon file that could potentially allow remote code execution if a user visited a malicious Web site or viewed a specially crafted e-mail message (MS07-017). This update adds support for default installs of Windows XP from sp0 to sp2, Windows Vista and Windows 2003 from sp0 to sp2.
This module runs a server waiting for vulnerable clients to connect to it. When the client connects, it will try to install an agent by exploiting a vulnerability in Apple QuickTime, which allows unauthenticated attackers to execute arbitrary code or cause a denial of service condition.
This updates adds Vista as a supported platform for Quicktime 7.3 and
also targets Quicktime version 7.2 in both Windows XP and Windows Vista.
This updates adds Vista as a supported platform for Quicktime 7.3 and
also targets Quicktime version 7.2 in both Windows XP and Windows Vista.
This module runs a server waiting for vulnerable clients to connect to it. When the client connects, it will try to install an agent by exploiting a vulnerability in Apple QuickTime, which allows unauthenticated attackers to execute arbitrary code or cause a denial of service condition.
This module exploits a vulnerability in the InstallShield Update Service ActiveX control (isusweb.dll) in MacroVision FLEXnet Connect and InstallShield 2008.
This module exploits a vulnerability in the PDWizard.ocx of the Visual Studio application. The module will run a malicious website in the CORE IMPACT console and wait for a user to connect and trigger the exploit.
This module exploits a vulnerability in the JetAudio ActiveX Control (JetFlExt.dll). The exploit is triggered when a special string argument is processed by the DownloadFromMusicStore() method resulting in a stack-based buffer overflow.
This module exploits a vulnerability in Microsoft Access 2000 and 2003 when parsing a malformed mdb file.
This module exploits a vulnerability caused due to a boundary error in the ierpplug.dll of the Real Player application. This module runs a malicious web site on the CORE IMPACT Console and waits for an unsuspecting user to trigger the exploit by connecting to the web site.
This module sends a mail with a specially crafted .pmd attachment. Once open, vulnerable versions of Adobe PageMaker will install an agent.
This module sends a mail with a specially crafted .pmd attachment. Once open, vulnerable versions of Adobe PageMaker will install an agent.
Pagination
- Previous page
- Page 96
- Next page