This module exploits a buffer overflow in the ffdshow codec when processing a specially crafted, long URL. This module triggers the bug through web browser by loading the Windows Media Player object. This module runs a web server waiting for vulnerable clients (Internet Explorer or Mozilla Firefox) to connect to it. When the client connects, it will try to install an agent by exploiting this vulnerability.
FeedDemon is prone to a remote buffer-overflow vulnerability because the application fails to perform adequate boundary checks on user-supplied input This module runs a malicious web server on the Core Impact Console and waits for an unsuspecting user to trigger the exploit by connecting to it.
This module exploits a client-side command execution vulnerability in the ActiveX control of the FaceBook Image Uploader. The module will run a malicious website in the Core Impact console and wait for a user to connect and trigger the exploit. This module runs a web server waiting for vulnerable clients (Internet Explorer) to connect to it. When the client connects, it will try to install an agent by exploiting this vulnerability.
A stack-based buffer overflow in eZip Wizard allows an attacker to execute arbitrary code via a crafted .ZIP file that contains a file with a long name. This module runs a malicious web server on the Core Impact Console and waits for an unsuspecting user to trigger the exploit by connecting to it.
EViews Enterprise Edition is prone to a vulnerability that may allow the execution of any library file named dwmapi.dll, if this dll is located in the same folder than a .PRG file. The attacker must entice a victim into opening a specially crafted .PRG file. This file and the associated binary may be delivered to a user through remote WebDAV shares. An attacker may exploit this issue to execute arbitrary code.
Euphonics Audio Player contains a buffer prone to exploitation via an overly long string. The vulnerability is caused due to a boundary error when handling .PLS files. This module runs a malicious web server on the Core Impact Console and waits for an unsuspecting user to trigger the exploit by connecting to it.
ALZip is vulnerable to a stack buffer overflow in libETC.dll due to improper parsing of the filename or name parameter within MIM file headers if an overly long filename is provided. The exploit is triggered when the user opens the malicious MIM file using from the windows explorer or from the main interface of the program. This module runs a malicious web server on the Core Impact Console and waits for an unsuspecting user to trigger the exploit by opening the file.