The file names showed in WinRAR when opening a ZIP file come from the central directory, but the file names used to extract and open contents come from the Local File Header. This allows to spoof file names when opening ZIP files

and can be abused to execute arbitrary code.
Quick View Plus contains a buffer prone to exploitation via an overly long string. The vulnerability is caused due to a boundary error in Quick View Plus when handling .MDB files. This can be exploited to cause a stack-based buffer overflow via a specially crafted .MDB file.

This module runs a malicious web server on the CORE IMPACT Console and waits for an unsuspecting user to trigger the exploit by connecting to it by opening the crafted MDB file with Quick View Plus.
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of software utilizing CATIA.

The vulnerability is caused due to a boundary error when copying a user supplied input to a fixed size stack buffer. The copying procedure stops when a null byte is found and no size check is proceeded.
This module exploits a vulnerability in Windows kernel ("ndproxy.sys" driver) by calling to the "DeviceIoControl" function with crafted parameters.



This module is an update of the original "Microsoft Windows NDProxy DeviceIoControl Vulnerability Exploit" module.

Besides, this module adds support to Windows 2003 SP2 64 bits edition.

This module exploits a vulnerability in Adobe Flash Player triggered when processing a SWF file and this load a crafted dll module. This module runs a malicious web site on the CORE IMPACT Console and waits for an unsuspecting user to trigger the exploit by connecting to the web site.

This update improves the reliability of the exploit.