CuteZIP is prone to a stack based buffer overflow when opening specially crafted ZIP files. This module runs a malicious web server on the Core Impact Console and waits for an unsuspecting user to trigger the exploit by connecting to it.
GE Proficy Historian is prone to a Code execution vulnerability in the KeyScript ActiveX control from keyhelp.ocx. The function LaunchTriPane use the -decompile option and can be abused to write arbitrary files on the remote system. The attacker must entice a victim into browsing a specially crafted web page. The LaunchTriPane ActiveX method request crafted chm files and write the embeded binaries in a controlled location may be delivered to a user through remote WebDAV shares. An attacker may exploit this issue to execute arbitrary code.
GetRight is prone to a vulnerability that may allow the execution of any library file named SvcTagLib.dll, if this dll is located in the same folder than a .GRX file. The attacker must entice a victim into opening a specially crafted .GRX file. This file and the associated binary may be delivered to a user through remote WebDAV shares. An attacker may exploit this issue to execute arbitrary code.
This module runs a web server waiting for vulnerable clients (Internet Explorer, Outlook) to connect to it. When the client connects, it will try to install an agent by sending a specially crafted JPEG file which exploits the GDI JPEG vulnerability. You can force vulnerable clients to connect to the web server automatically by using this module to send them an specially designed e-mail to exploit this vulnerability if the client uses Outlook Express to read their mails.
Free MP3 CD Ripper contains a buffer prone to exploitation via an overly long string. The vulnerability is caused due to a boundary error in Free MP3 CD Ripper when handling .WAV files. This can be exploited to cause a stack-based buffer overflow via a specially crafted .WAV file. This module runs a malicious web server on the Core Impact Console and waits for an unsuspecting user to trigger the exploit by connecting to it.
This module exploits a vulnerability in Free Download Manager. The vulnerability is caused due to a boundary error within the processing of torrent files. This can be exploited to cause a stack-based buffer overflow when a specially crafted file is opened. This module runs a malicious web site on the Core Impact Console and waits for an unsuspecting user to trigger the exploit by connecting to the web site.
Free CD to MP3 Converter by Eusing Software contains a buffer prone to exploitation via a specially crafted WAV file. This module runs a malicious web server on the Core Impact Console and waits for an unsuspecting user to trigger the exploit by connecting to it.
This module exploits a vulnerability in FreeAmp 2.0.7. The buffer overflow is triggered when a specially crafted theme file is opened. This module runs a malicious web site on the Core Impact Console and waits for an unsuspecting user to download the attack file. For convenience reasons the exploit file is send zipped to the victim who should then import the .fat.
Foxit Reader is prone to a buffer-overflow vulnerability that occurs because it fails to perform adequate boundary checks on user-supplied data via a crafted .PDF document. This module runs a malicious web server on the Core Impact Console and waits for an unsuspecting user to trigger the exploit by connecting to it.
This module exploits a buffer overflow vulnerability in Foxit Reader. If an Open/Execute a file action is defined in the PDF file with an overly long file name argument, when the trigger condition is satisfied it will cause a stack-based buffer overflow, because the application tries to copy the file name argument to a fixed-size buffer in the stack without properly checking that the buffer is large enough to hold the file name string. This module runs a malicious web site on the Core Impact Console and waits for an unsuspecting user to trigger the exploit by connecting to the web site.
Pagination
- Previous page
- Page 170
- Next page