Serenity Audio Player contains a buffer prone to exploitation via an overly long string. The vulnerability is caused due to a boundary error in Serenity Audio Player when handling .M3U files. This can be exploited to cause a stack-based buffer overflow via a specially crafted .M3U file. This module runs a malicious web server on the Core Impact Console and waits for an unsuspecting user to trigger the exploit by connecting to it.
Exploits a vulnerability in the SecureCRT SSH client. The vulnerability is a stack buffer overflow that occurs when parsing the SSH protocol identifier string returned by the server. This exploit proxies TCP connections to a remote (or local) SSH server and monitors the SSH version string of connecting clients. Since the exploit needs to be performed before the client sends it's version string this module only records the IP address of vulnerable clients the first time that they connect. The second time a connection attempt appears from the vulnerable IP address, the module attempts to exploit the vulnerability. After that, regardless of whether the exploitation was successful or not, no further exploitation attempts are made against the vulnerable client. A successful attack depends on the client user dismissing an error dialog that appears. Since the exploitable condition does not occur until after the user has dismissed this dialog the exploit cannot be sure when the attack has completed so it makes 10 attempts to connect at 5 second intervals.
SDP Downloader contains a buffer prone to exploitation via an overly long string. The vulnerability is caused due to a boundary error in SDP Downloader when handling crafted .ASX files. This module runs a malicious web server on the Core Impact Console and waits for an unsuspecting user to trigger the exploit by connecting to it.
The vulnerability is caused due to a boundary error within the parsing of disturbance .CFG and .DAT files, This can be exploited to cause a stack-based buffer overflow via a .CFG file with an overly long file string and clicking in Channel list window. This module runs a malicious web server on the Core Impact Console and waits for an unsuspecting user to trigger the exploit by connecting to it.
The vulnerability is caused due to a boundary error within the parsing of disturbance .CFG and .DAT files, This can be exploited to cause a heap-based buffer overflow via a .CFG file with an overly long ASCII argument. This module runs a malicious web server on the Core Impact Console and waits for an unsuspecting user to trigger the exploit by connecting to it.
The vulnerability exists within the MetaDraw ActiveX control's ObjLinks property. This module runs a web server waiting for vulnerable clients (Internet Explorer 6, 7, 8, 9) to connect to it.
A stack-based buffer overflow in Schneider Electric OFS Client allows an attacker to execute arbitrary code via a crafted .TXT configuration file. This module runs a malicious web server on the Core Impact Console and waits for an unsuspecting user to trigger the exploit by connecting to it.
The vulnerability exists within the isObjectModel ActiveX control's RemoveParameter property. This module runs a web server waiting for vulnerable clients (Internet Explorer 6, 7, 8, 9) to connect to it.
SCADA Engine BACnet OPC Client is prone to a buffer-overflow vulnerability that occurs because it fails to perform adequate boundary checks on user-supplied data via a crafted .CSV document. This module runs a malicious web server on the Core Impact Console and waits for an unsuspecting user to trigger the exploit by connecting to it.
This module exploits a vulnerability in ScadaTEC ScadaPhone. The vulnerability is caused due to boundary error within the processing of .ZIP project files. This can be exploited to cause a stack-based buffer overflow when a specially crafted .ZIP file is opened. This module runs a malicious web site on the Core Impact Console and waits for an unsuspecting user to trigger the exploit by connecting to the web site.
Pagination
- Previous page
- Page 134
- Next page