Use-after-free vulnerability in Microsoft Internet Explorer allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via vectors related to the CMarkup::IsConnectedToPrimaryMarkup function. This module runs a web server waiting for vulnerable clients (Internet Explorer) to connect to it.
This module exploits a use after free vulnerability exists in Internet Explorer. The vulnerability is due to accessing a freed CInput object in memory. This module runs a web server waiting for vulnerable clients (Internet Explorer 8) to connect to it. When the client connects, it will try to install an agent by exploiting this vulnerability.
Microsoft Internet Explorer is prone to a use after free vulnerability caused by an object that was not properly allocated or is deleted. This module runs a web server waiting for vulnerable clients (Internet Explorer) to connect to it. When the client connects, it will try to install an agent by exploiting this vulnerability.
This module exploits a memory corruption vulnerability when Internet Explorer attempts to access an object that has been deleted. This module runs a web server waiting for vulnerable clients (Internet Explorer) to connect to it. When the client connects, it will try to install an agent by exploiting this vulnerability.
Use after free in Internet Explorer when an invalid reference to CFlatMarkupPointer is used. Successful control of the freed memory may leverage arbitrary code execution under the context of the user. This module runs a web server waiting for vulnerable clients (Internet Explorer 9) to connect to it. When the client connects, it will try to install an agent by exploiting this vulnerability.
Use after free in Internet Explorer when handling a CDisplayPointer object via the use of a "onpropertychange" event handler. Successful control of the freed memory may leverage arbitrary code execution under the context of the user. This module runs a web server waiting for vulnerable clients (Internet Explorer) to connect to it. When the client connects, it will try to install an agent by exploiting this vulnerability.
Use after free in Internet Explorer when handling the caret (text cursor) object. Successful control of the freed memory may leverage arbitrary code execution under the context of the user. This module runs a web server waiting for vulnerable clients (Internet Explorer) to connect to it. When the client connects, it will try to install an agent by exploiting this vulnerability.
Microsoft Internet Explorer is prone to a use after free vulnerability caused by an object that was not properly allocated or is deleted. This module runs a web server waiting for vulnerable clients (Internet Explorer) to connect to it. When the client connects, it will try to install an agent by exploiting this vulnerability.
An integer overflow in the ActiveX control icardie.dll in Internet Explorer allows remote attackers to execute arbitrary code. This module runs a web server waiting for vulnerable clients (Internet Explorer 8) to connect to it. When the client connects, it will try to install an agent by exploiting this vulnerability.
This module exploits a vulnerability in Microsoft HTML Help Workshop. The vulnerability is caused due to a boundary error in Microsoft HTML Help Workshop within the processing of .HHP files. This can be exploited to cause a stack-based buffer overflow when a specially crafted file is opened. This module runs a malicious web site on the Core Impact Console and waits for an unsuspecting user to trigger the exploit by connecting to the web site.
Pagination
- Previous page
- Page 158
- Next page