A malformed .SPD document allows an attacker to execute arbitrary code. This module runs a malicious web server on the Core Impact Console and waits for an unsuspecting user to trigger the exploit by connecting to it.
Webkit, as used in Apple Safari before 5.06 is prone to a memory corruption vulnerability caused by a web site with a crafted SVG graphic. This allows remote attackers to execute arbitrary code. This module runs a web server waiting for vulnerable clients to connect to it. When the client connects, it will try to install an agent by exploiting this vulnerability.
A policy issue existed in Apple Safari before 5.1 when handling of file:// URLs. This module runs a web server waiting for vulnerable clients to connect to it. When the client connects, it will try to install an agent by exploiting this vulnerability.
The vulnerability is caused due to boundary errors in Rosoft Media Player within the processing of M3U files. Rosoft Media Player fails to check the length of the string in M3U playlist archives, allowing an attacker to cause a stack overflow in order to execute arbitrary code.
A malformed REC file allows an attacker to execute arbitrary code. This module runs a malicious web server on the Core Impact Console and waits for an unsuspecting user to trigger the exploit by connecting to it.
The vulnerability is caused due to a boundary error in the processing of .WJR files. This can be exploited to cause a stack-based buffer overflow by tricking the user into opening a .WJR file containing an overly long Save To field. This module runs a malicious web server on the Core Impact Console and waits for an unsuspecting user to trigger the exploit by connecting to it.
This module exploits a vulnerability caused due to a boundary error in the wallclock functionality in "SmilTimeValue::parseWallClockValue()" when handling time formats. This module runs a malicious web site on the Core Impact Console and waits for an unsuspecting user to trigger the exploit by connecting to the web site. This module runs a web server waiting for vulnerable clients (Internet Explorer) to connect to it. When the client connects, it will try to install an agent by exploiting this vulnerability.
This module exploits a vulnerability caused due to an error in the MPC::HTML::UrlUnescapeW() function in helpctr.exe when escaping URLs, and add attack vector directly from Real Player to original Internet Explorer attack This module runs a web server waiting for vulnerable clients (Internet Explorer) to connect to it. When the client connects, it will try to install an agent by exploiting this vulnerability.
This module exploits an arbitrary file download vulnerability in the RecordingManager Control included in RealPlayer SP. This module runs a web server waiting for vulnerable clients (Internet Explorer 6 and 7) to connect to it. When the client connects, it will try to install an agent by exploiting this vulnerability.
This module exploits a vulnerability caused due to a boundary error in the ierpplug.dll of the RealPlayer application. This module runs a malicious web site on the Core Impact Console and waits for an unsuspecting user to trigger the exploit by connecting to the web site. This module runs a web server waiting for vulnerable clients (Internet Explorer) to connect to it. When the client connects, it will try to install an agent by exploiting this vulnerability.
Pagination
- Previous page
- Page 181
- Next page