The vulnerability is caused due to a boundary error within the parsing of disturbance .CFG and .DAT files, This can be exploited to cause a stack-based buffer overflow via a .CFG file with an overly long file string and clicking in Channel list window. This module runs a malicious web server on the Core Impact Console and waits for an unsuspecting user to trigger the exploit by connecting to it.
The vulnerability is caused due to a boundary error within the parsing of disturbance .CFG and .DAT files, This can be exploited to cause a heap-based buffer overflow via a .CFG file with an overly long ASCII argument. This module runs a malicious web server on the Core Impact Console and waits for an unsuspecting user to trigger the exploit by connecting to it.
A stack-based buffer overflow in Schneider Electric OFS Client allows an attacker to execute arbitrary code via a crafted .TXT configuration file. This module runs a malicious web server on the Core Impact Console and waits for an unsuspecting user to trigger the exploit by connecting to it.
SCADA Engine BACnet OPC Client is prone to a buffer-overflow vulnerability that occurs because it fails to perform adequate boundary checks on user-supplied data via a crafted .CSV document. This module runs a malicious web server on the Core Impact Console and waits for an unsuspecting user to trigger the exploit by connecting to it.
This module exploits a vulnerability in ScadaTEC ScadaPhone. The vulnerability is caused due to boundary error within the processing of .ZIP project files. This can be exploited to cause a stack-based buffer overflow when a specially crafted .ZIP file is opened. This module runs a malicious web site on the Core Impact Console and waits for an unsuspecting user to trigger the exploit by connecting to the web site.
This module exploits a vulnerability in ScadaTEC ModbusTagServer. The vulnerability is caused due to boundary error within the processing of .ZIP project files. This can be exploited to cause a stack-based buffer overflow when a specially crafted .ZIP file is opened. This module runs a malicious web site on the Core Impact Console and waits for an unsuspecting user to trigger the exploit by connecting to the web site.
This module exploits a stack overflow in Siemens Unigraphics Solutions Teamcenter Visualization EAI WebViewer3D ActiveX control that is bundled with SAPgui. When passing an overly long string the SaveViewToSessionFile() method, arbitrary code may be executed.This module runs a malicious web site on the Core Impact Console and waits for an unsuspecting user to trigger the exploit by connecting to the web site. This module runs a web server waiting for vulnerable clients (Internet Explorer) to connect to it. When the client connects, it will try to install an agent by exploiting this vulnerability.