The vulnerability is caused due to a boundary error in MUSE when handling .PLS files. This can be exploited to cause a stack-based buffer overflow via a specially crafted .PLS file. This module runs a malicious web server on the Core Impact Console and waits for an unsuspecting user to trigger the exploit by connecting to it.
An error in the handling of packed objects in a Visio file can be exploited to corrupt memory via a specially crafted Visio file. This module will generate a specially crafted file within a zip archive and sent it through email or make it available to download from Core Impact's Web Server.
The vulnerability is caused due to boundary errors in PUBCONV.DLL within the processing of older version PUB files. This can be exploited to cause a two stage pointer overwrite when a specially crafted file is opened. This module will generate a specially crafted file within a zip archive and sent it through email or make it available to download from Core Impact's Web Server.
This module exploits a stack-based buffer overflow in the DirectShow Synchronized Accessible Media Interchange (SAMI) parser in quartz.dll of Microsoft DirectX. This module runs a web server waiting for vulnerable clients (Internet Explorer) to connect to it. When the client connects, it will try to install an agent by exploiting this vulnerability.
This module exploits a vulnerability in MPlayer. The vulnerability is caused due to boundary error in MPlayer.EXE within the processing of MOV archives. This can be exploited to cause an arbitrary memory corruption when a specially crafted file is opened. This module runs a malicious web site on the Core Impact Console and waits for an unsuspecting user to trigger the exploit by connecting to the web site. This Exploit doesn't work with Internet Explorer.
This module exploits a vulnerability in MPlayer. A stack-based buffer overflow in the sub_read_line_sami function in MPlayer SVN Versions before 33471 and SMPlayer 0.6.9 and older versions allows remote attackers to execute arbitrary code via a SAMI subtitle file. This module runs a malicious web site on the Core Impact Console and waits for an unsuspecting user to trigger the exploit by connecting to the web site.
Mozilla Thunderbird is prone to a vulnerability that may allow execution of dwmapi.dll if this dll is located in the same folder than .EML file. The attacker must entice a victim into opening a specially crafted .EML file. This file and the associated binary may be delivered to a user through remote WebDAV shares. An attacker may exploit this issue to execute arbitrary code.
This module exploits a heap based buffer overflow vulnerability in Mozilla Firefox via a WOFF font file embedded in a HTML. This module runs a web server waiting for vulnerable clients (Internet Explorer) to connect to it. When the client connects, it will try to install an agent by exploiting this vulnerability.
This module exploits a buffer overflow in Mozilla Firefox when parsing a malformed UTF-8 encoded URL. This module runs a web server waiting for vulnerable clients to connect to it. When the client connects, it will try to install an agent by exploiting this vulnerability.
This module exploits a remote code injection in Mozilla Firefox by using vulnerabilities CVE-2013-0758 and CVE-2013-0757. This module runs a web server waiting for vulnerable clients (Mozilla Firefox) to connect to it. When the client connects, it will try to install an agent by exploiting this vulnerability.
Pagination
- Previous page
- Page 146
- Next page