• Windows ANI LoadAniIcon() Chunk Size Stack Buffer Overflow (SMTP)
    Disclosure Date: 2007-03-28
    First seen: 2020-04-26
    exploit/windows/email/ms07_017_ani_loadimage_chunksize
    This module exploits a buffer overflow vulnerability in the LoadAniIcon() function of USER32.dll. The flaw is triggered through Outlook Express by using the CURSOR style sheet directive to load a malicious .ANI file. This vulnerability was discovered by Alexander Sotirov of Determina and was rediscovered, in the wild, by McAfee. Authors: - hdm <x@hdm.io> - skape <mmiller@hick.org>
  • MS03-020 Microsoft Internet Explorer Object Type
    Disclosure Date: 2003-06-04
    First seen: 2020-04-26
    exploit/windows/browser/ms03_020_ie_objecttype
    This module exploits a vulnerability in Internet Explorer's handling of the OBJECT type attribute. Authors: - skape <mmiller@hick.org>
  • MS02-065 Microsoft IIS MDAC msadcs.dll RDS DataStub Content-Type Overflow
    Disclosure Date: 2002-11-02
    First seen: 2020-04-26
    exploit/windows/iis/ms02_065_msadc
    This module can be used to execute arbitrary code on IIS servers that expose the /msadc/msadcs.dll Microsoft Data Access Components (MDAC) Remote Data Service (RDS) DataFactory service. The service is exploitable even when RDS is configured to deny remote connections (handsafe.reg). The service is vulnerable to a heap overflow where the RDS DataStub 'Content-Type' string is overly long. Microsoft Data Access Components (MDAC) 2.1 through 2.6 are known to be vulnerable. Authors: - aushack <patrick@osisecurity.com.au>
3 metasploit modules found
Please note: Metasploit modules are only matched by CVE numbers. Visit metasploit web site for more details
This web site uses cookies for managing your session, storing preferences, website analytics and additional purposes described in our privacy policy.
By using this web site you are agreeing to CVEdetails.com terms of use!