This module exploits a XSS vulnerability in the opera:historysearch page in Opera which leads to remote command injection.
The vulnerability is caused due to a boundary error when parsing format strings containing a floating point specifier in the util.printf() JavaScript function.
This module exploits a stack-based buffer overflow in the Alt-N Security Gateway by sending a specially crafted HTTP request to the TCP port 4000. This module adds support for Windows 2000 Professional SP4.
When the method WmfEnumState::DibCreatePatternBrush in the GDI Plus library processes a WMF file with a malformed CreatePatternBrush record, this produces a stack overflow. This update adds support for Microsoft Windows XP SP0 Home/Professional and Microsoft Windows 2003 SP0 Standard/Enterprise Edition.
CA BrightStor ARCserve Backup is prone to a buffer overflow vulnerability on the RPC interface that could permit the execution of arbitrary remote code. A remote attacker can exploit this vulnerability to execute arbitrary code and completely compromise the computer.
This module exploits a memory allocation error in Microsoft PowerPoint Viewer 2003 that allows remote attackers to execute arbitrary code via a PowerPoint file with a malformed picture index that triggers memory corruption.
This module exploits a vulnerability in Microsoft Excel 2003 SP2 and earlier when parsing a malformed xls file.
This module exploits a vulnerability in VMware shared folders.
This module exploits a vulnerability in the sasatl.dll control included in the Zenturi ProgramChecker ActiveX application. The exploit is triggered when the DebugMsgLog() method processes a long string argument resulting in a stack-based buffer overflow. This module runs a malicious web site on the CORE IMPACT Console and waits for an unsuspecting user to trigger the exploit by connecting to the web site.
This module exploits a stack-based buffer overflow in uTorrent 1.6 when parsing a malformed "announce" tag in a .torrent file.
Pagination
- Previous page
- Page 68
- Next page