This module exploits a vulnerability in Apple IrfanView which is caused due to a boundary error in the processing of jp2 files. This can be exploited to cause a stack-based buffer overflow when a specially crafted file is opened. This module runs a malicious web site on the Core Impact Console and waits for an unsuspecting user to trigger the exploit by connecting to the web site.
This module exploits a buffer overflow on IrfanView Formats plugin when parsing a specially crafted .XCF file.
This module exploits a vulnerability in IrfanView FlashPix plugin (.fpx files). The vulnerability is caused due to boundary error in fpx.dll within the processing of fpx files. This can be exploited to cause a heap-based buffer overflow when a specially crafted file is opened. This module runs a malicious web site on the Core Impact Console and waits for an unsuspecting user to trigger the exploit by connecting to the web site.
This module exploits a buffer overflow on IrfanView Formats plugin when parsing a specially crafted .TTF file.
The vulnerability is caused due to a boundary error within the Formats plug-in (Formats.dll) when handling IFF files. This can be exploited to cause a stack-based buffer overflow via a specially crafted IFF file. This module runs a malicious web server on the Core Impact Console and waits for an unsuspecting user to trigger the exploit by connecting to it.
IRAI AUTOMGEN SCADA is prone to a vulnerability that may allow execution of mfc71enu if this dll is located in the same folder than .AGN file. The attacker must entice a victim into opening a specially crafted .AGN file. This file and the associated binary may be delivered to a user through remote WebDAV shares. An attacker may exploit this issue to execute arbitrary code.
This module exploits a vulnerability caused due to boundary errors in IntelliTamper within the processing of HTML files when the program scans a site. IntelliTamper fails to check in the image tag on supplied data, allowing an attacker to cause a stack overflow in order to execute arbitrary code.
IntegraXor is prone to a vulnerability that may allow execution of dwmapi.dll if this dll is located in the same folder as a .IGX file. The attacker must entice a victim into opening a specially crafted .IGX file. This file and the associated binary may be delivered to a user through remote WebDAV shares. An attacker may exploit this issue to execute arbitrary code.
This module runs a web server waiting for vulnerable clients (Internet Explorer) to connect to it. When the client connects, it will try to install an agent by instancing ISUSWEB.DLL and calling the DownloadAndExecute() insecure method.
InduSoft Web Studio SCADA is prone to a vulnerability that may allow execution of REVERB1 if this dll is located in the same folder than .APP file. The attacker must entice a victim into opening a specially crafted .APP file. This file and the associated binary may be delivered to a user through remote WebDAV shares. An attacker may exploit this issue to execute arbitrary code.
Pagination
- Previous page
- Page 164
- Next page