A Buffer Overflow exists within ERDAS ER Viewer due to a boundary error within the rf_report_error() function in (ermapper_u.dll) when parsing a specially crafted ERS file. This module runs a malicious web site on the Core Impact Console and waits for an unsuspecting user to trigger the exploit by connecting to the web site.
A Buffer Overflow exists within ERDAS ER Viewer due to a boundary error within the ERM_convert_to_correct_webpath() function in (ermapper_u.dll) when parsing file paths via a specially crafted ERS file. This module runs a malicious web site on the Core Impact Console and waits for an unsuspecting user to trigger the exploit by connecting to the web site.
This module exploits a vulnerability in the kwedit.dll control included in the EnjoySAP application. The exploit is triggered when the PrepareToPostHTML() method processes a long string argument resulting in a stack-based buffer overflow. This module runs a malicious web site on the Core Impact Console and waits for an unsuspecting user to trigger the exploit by connecting to the web site. This module runs a web server waiting for vulnerable clients (Internet Explorer) to connect to it. When the client connects, it will try to install an agent by exploiting this vulnerability.
This module exploits a vulnerability in the keyhelp.ocx control included in EMC Captiva QuickScan application. The vulnerability is triggered when the JumpURL() method processes a long string argument resulting in a stack-based buffer overflow. This module runs a web server waiting for vulnerable clients (Internet Explorer) to connect to it. When the client connects, it will try to install an agent by exploiting this vulnerability.
By providing an overly long string when handling loadExtensionFactory method, an attacker may be able to overflow the static stack buffer. The attacker may then execute code on the target device remotely. This module runs a web server waiting for vulnerable clients (Internet Explorer 6, 7, 8) to connect to it.
Elecard MPEG Player contains a buffer prone to exploitation via an overly long string. The vulnerability is caused due to a boundary error in Elecard MPEG Player when handling .m3u files. This situation that leads to a buffer overflow and allows an attacker to overwrite an SEH Pointer. This can be exploited via a specially crafted .m3u file. This module runs a malicious web server on the Core Impact Console and waits for an unsuspecting user to trigger the exploit by connecting to it.
EffectMatrix Magic Morph contains a buffer prone to exploitation via an overly long string. The vulnerability is caused due to a boundary error in EffectMatrix Magic Morph when handling .MOR files. This can be exploited to cause a stack-based buffer overflow via a specially crafted .MOR file. This module runs a malicious web server on the Core Impact Console and waits for an unsuspecting user to trigger the exploit by connecting to it.
Effective File Search is prone to a vulnerability that may allow the execution of any library file named ztvunrar36.dll, if this dll is located in the same folder than a .EFS file. The attacker must entice a victim into opening a specially crafted .EFS file. This file and the associated binary may be delivered to a user through remote WebDAV shares. An attacker may exploit this issue to execute arbitrary code.
eEye Retina WiFi Scanner contains a buffer prone to exploitation via an overly long string. The vulnerability is caused due to a boundary error when handling crafted .RWS files. This module runs a malicious web server on the Core Impact Console and waits for an unsuspecting user to trigger the exploit by connecting to it.
This module exploits a vulnerability in the officeviewer.ocx control included in the Edraw Office Viewer Component ActiveX application. The exploit is triggered when the HttpPost() method processes a long string argument resulting in a stack-based buffer overflow. This module runs a web server waiting for vulnerable clients (Internet Explorer) to connect to it. When the client connects, it will try to install an agent by exploiting this vulnerability.
Pagination
- Previous page
- Page 173
- Next page