Microsoft Address Book is prone to a vulnerability that may allow execution of wab32res.dll if this dll is located in the same folder than .WAB file. The attacker must entice a victim into opening a specially crafted .WAB file. This file and the associated binary may be delivered to a user through remote WebDAV shares. An attacker may exploit this issue to execute arbitrary code.
This module exploits an arbitrary file download vulnerability in the Snapshot Viewer ActiveX Control included in Microsoft Access. This module runs a web server waiting for vulnerable clients (Internet Explorer) to connect to it. When the client connects, it will try to install an agent by exploiting this vulnerability.
This module exploits a vulnerability in MicroP which is caused due to a boundary error in the processing of mppl files. This can be exploited to cause a stack-based buffer overflow when a specially crafted file is opened This module runs a malicious web site on the Core Impact Console and waits for an unsuspecting user to trigger the exploit by connecting to the web site.
Microchip MPLAB IDE is prone to a vulnerability that may allow execution of pegrc32b.dll if this dll is located in the same folder than .MCP file. The attacker must entice a victim into opening a specially crafted .MCP file. This file and the associated binary may be delivered to a user through remote WebDAV shares. An attacker may exploit this issue to execute arbitrary code.
Microchip MPLAB contains a buffer prone to exploitation via an overly long string in the path of the project file. The vulnerability is caused due to a boundary error in Microchip MPLAB when handling .MCP files. This can be exploited to cause a stack-based buffer overflow via a specially crafted .MCP file. This module runs a malicious web server on the Core Impact Console and waits for an unsuspecting user to trigger the exploit by connecting to it.
Media Player Classic is prone to a vulnerability that may allow the execution of any library file named iacenc.dll, if this dll is located in the same folder as an .FLV file. The attacker must entice a victim into opening a specially crafted .FLV file. This file and the associated binary may be delivered to a user through remote WebDAV shares. An attacker may exploit this issue to execute arbitrary code.
This module runs a web server waiting for vulnerable clients (Firefox/Opera) to connect to it. When the client connects, it will try to install an agent by triggering a Windows Media Player vulnerability. When the EMBED tag is used to embed the Media Player plugin, it doesn't properly check the src parameter. This condition can be leveraged to take control of the instruction pointer.
The vulnerability is caused due to a boundary error in MediaCoder when handling .M3U files. This can be exploited to cause a stack-based buffer overflow via a specially crafted .M3U file. This module runs a malicious web server on the Core Impact Console and waits for an unsuspecting user to trigger the exploit by connecting to it.
The vulnerability is caused due to a boundary error in MediaCoder when handling .LST files. This can be exploited to cause a stack-based buffer overflow via a specially crafted .LST file. This module runs a malicious web server on the Core Impact Console and waits for an unsuspecting user to trigger the exploit by connecting to it.