The vulnerability is caused due to a boundary error in VideoCharge Studio when handling .VSC files. This can be exploited to cause a stack-based buffer overflow via a specially crafted .VSC file. This module runs a malicious web server on the Core Impact Console and waits for an unsuspecting user to trigger the exploit by connecting to it.
VideoCharge Studio is prone to a vulnerability that may allow execution of dwmapi.dll if this dll is located in the same folder than a .VSC file. The attacker must entice a victim into opening a specially crafted .VSC file. This file and the associated binary may be delivered to a user through remote WebDAV shares. An attacker may exploit this issue to execute arbitrary code.
This module exploits a vulnerability in the UFileUploaderD.dll control included in the HTTP File Upload ActiveX Control. The exploit is triggered when the AddFile() method processes a long string argument resulting in a stack-based buffer overflow. This module runs a malicious web site on the Core Impact Console and waits for an unsuspecting user to trigger the exploit by connecting to the web site. This module runs a web server waiting for vulnerable clients (Internet Explorer) to connect to it. When the client connects, it will try to install an agent by exploiting this vulnerability.
This module exploits a heap-based buffer overflow in VBE.DLL and VBE6.DLL of Microsoft Visual Basic for Applications (VBA) SDK 5.0 through 6.3, via a document with a long ID parameter.
VariCAD is prone to a remote buffer-overflow vulnerability because the application fails to perform adequate boundary checks on user-supplied input This module runs a malicious web server on the Core Impact Console and waits for an unsuspecting user to trigger the exploit by connecting to it.
uTorrent is prone to a vulnerability that may allow execution of plugin_dll.dll if this dll is located in the same folder as a .TORRENT file. The attacker must entice a victim into opening a specially crafted .TORRENT file. This file and the associated binary may be delivered to a user through remote WebDAV shares. An attacker may exploit this issue to execute arbitrary code.
This module exploits a stack-based buffer overflow in uTorrent 1.6 when parsing a malformed "announce" tag in a .torrent file.
This module exploits an argument injection vulnerability in Microsoft Internet Explorer, when running on systems with Firefox installed and certain URIs registered, allows remote attackers to conduct cross-browser scripting attacks and execute arbitrary commands via shell metacharacters in a FirefoxURL or FirefoxHTML URI, which are inserted into the command line that is created when invoking firefox.exe.
The Ultra Office Control ActiveX control (OfficeCtrl.ocx) is vulnerable to a stack-based buffer overflow. By persuading a victim to visit a specially-crafted Web page that passes an overly long string to the HttpUpload() method, a remote attacker could overflow a buffer and execute arbitrary code on the system with the privileges of the current user or cause the victim's browser to crash.
UltraVNC Viewer is prone to a vulnerability that may allow execution of vnclang.dll if this dll is located in the same folder than .VNC file. The attacker must entice a victim into opening a specially crafted .VNC file. This file and the associated binary may be delivered to a user through remote WebDAV shares. An attacker may exploit this issue to execute arbitrary code.
Pagination
- Previous page
- Page 174
- Next page