This module exploits a vulnerability in the NCTAudioFile2.AudioFile ActiveX Control (NCTAudioFile2.dll) used by various multimedia applications. The exploit is triggered when a long string argument is processed by the SetFormatLikeSample() method resulting in a stack-based buffer overflow. This module runs a malicious web site on the CORE IMPACT Console and waits for an unsuspecting user to trigger the exploit by connecting to the web site.
This update adds support for Windows Vista. This module exploits a vulnerability in the Yahoo Messenger Webcam 8.1 ActiveX Control (ywcvwr.dll). When the Receive() method processes a long string argument, a stack based buffer overflow occurs allowing execution of arbitrary code. This exploit is triggered when an unsuspecting user is lured into visiting a malicious web-site hosted by CORE IMPACT.
This module exploits a buffer overflow in Norton Internet Security 2004, via a bug in ISLAert.dll, an ActiveX control installed by default.
This module exploits a vulnerability in XVoice.dll included in the Microsoft Text to Speech Control. The exploit is triggered when the FindEngine() method processes a long string argument resulting in a stack-based buffer overflow. This module runs a malicious web site on the CORE IMPACT Console and waits for an unsuspecting user to trigger the exploit by connecting to the web site.
This module exploits a memory corruption vulnerability in the Java QuickTime for Java (QtJava.dll) browser plug-in. The module runs a malicious web server on the CORE IMPACT Console and waits for an unsuspecting user(s) to connect to it with a Java-enabled browser using the vulnerable plug-in. When a user connects to the site they trigger the exploit and the module attempts to install an agent on their computer.
This module exploits a vulnerability in the Yahoo Messenger Webcam 8.1 ActiveX Control (ywcvwr.dll). When the Receive() method processes a long string argument, a stack based buffer overflow occurs allowing execution of arbitrary code. This exploit is triggered when an unsuspecting user is lured into visiting a malicious web-site hosted by CORE IMPACT.
This module exploits a stack-based buffer overflow vulnerability in the PostScript processor included in GNOME Evince. The vulnerability is caused by the get_next_text() function not properly validating overly long fields in a PostScript file. The exploit is triggered when an unsuspecting user opens a specially crafted file distributed via an email.
This module exploits a buffer overflow vulnerability in the Advanced Search
(Finder.exe) feature of Microsoft Outlook (MS07-003). A remote attacker can
compromise the vulnerable system by luring unsuspecting users into opening a
specially crafted Outlook Saved Searches (OSS) file.
(Finder.exe) feature of Microsoft Outlook (MS07-003). A remote attacker can
compromise the vulnerable system by luring unsuspecting users into opening a
specially crafted Outlook Saved Searches (OSS) file.
This module exploits a vulnerability in the SiteManager ActiveX Control (sitemanager.dll). A validation error in the ExportSiteList() method allows an attacker to run arbitrary code on the target system. The module runs a web server waiting for vulnerable clients (Internet Explorer) to connect to it. When a client connects, it will try to install a Level0v2 agent by exploiting this vulnerability.
This module exploits a heap overflow vulnerability in Mozilla Thunderbird; the exploit is triggered when the user opens an attachment with a specially crafted Content-Type headers using the Thunderbird email client.
Pagination
- Previous page
- Page 100
- Next page