Easy RM to MP3 Converter is vulnerable to a stack-based buffer overflow, caused by improper bounds checking when parsing specially crafted .pls files. This module runs a web server on the Core Impact Console and waits for an unsuspecting user to trigger the exploit by connecting to it.
A stack-based buffer overflow in easyHDR PRO allows an attacker to execute arbitrary code via an invalid Flexible Image Transport System (FITS) file. This module runs a malicious web server on the Core Impact Console and waits for an unsuspecting user to trigger the exploit by connecting to it.
DX Studio Player plugin for Firefox is vulnerable to a remote command execution vulnerability. Remote attackers can exploit this vulnerability via an specially crafted .dxstudio file.
This module runs a web server waiting for vulnerable clients (Internet Explorer) to connect to it. When the client connects, it will try to install an agent by instancing DXTLIPI.DLL and setting the SourceUrl property to trigger a buffer overflow, overwriting a function pointer to install an agent.
The vulnerability is caused due to a boundary error in DVD X Player Professional when handling .PLF files. This can be exploited to cause a stack-based buffer overflow via a specially crafted file of said extension.
This module exploits a vulnerability in Download Accelerator Plus when importing a M3U file (MP3 Playlist) and verify option is used, may allow a remote unprivileged user who provides a crafted M3U document that is opened by a local user to execute arbitrary commands on the system with the privileges of the user running Download Accelerator Plus. This can be exploited to cause a stack based buffer overflow when a specially crafted file is imported and the verify button is used in DAP. This module runs a malicious web server on the Core Impact Console and waits for an unsuspecting user to trigger the exploit by connecting to it.
DJ Studio Pro contains a buffer prone to exploitation via an overly long string. The vulnerability is caused due to a boundary error in the application when handling .pls files. This can be exploited to cause a stack-based buffer overflow via a specially crafted .pls file. This overflow allows to overwrite an SEH pointer, generate and exception and execute arbitrary code. This module runs a malicious web server on the Core Impact Console and waits for an unsuspecting user to trigger the exploit by connecting to it.
The vulnerability is caused due to boundary errors in PlaybackModule2.dll within the processing of SRT subtitles. This can be exploited to cause a stack-based buffer overflow when the victim opens a specially crafted file with an overly long subtitle line.
This module exploits a vulnerability in Diamond Programmer. The vulnerability is caused due to boundary error in the processing of xcf files. This can be exploited to cause a stack-based buffer overflow when a specially crafted file is opened. This module runs a malicious web site on the Core Impact Console and waits for an unsuspecting user to trigger the exploit by connecting to the web site.
Destiny Media Player contains a buffer prone to exploitation via an overly long string. The vulnerability is caused due to a boundary error in Destiny Media Player when handling .LST files. This can be exploited to cause a stack-based buffer overflow via a specially crafted .LST file. This module runs a malicious web server on the Core Impact Console and waits for an unsuspecting user to trigger the exploit by connecting to it.
Pagination
- Previous page
- Page 174
- Next page