Yet another remotely exploitable flaw has been discovered in the HP notebook preinstalled software. This particular vulnerability takes advantage of an Active-X control. Exploits included.
0938f61f030446326f1fe8a640b91330ddb96c48edfd101bc39fe524d7822fbf
Multiple Hewlett-Packard notebook series are prone to a remote code execution attack. The manufacturer's preinstalled software contains a critical flaw within the software built to support one-touch button quick feature access. This exploit takes advantage of this issue.
f8a884d19a803a1f671c6424c652cfe1d289e0a558f068b80368e115afd2c057
Microsoft Visual C++ 6.0 is prone to a stack based memory corruption vulnerability during the processing of .RC resource files. Exploit included.
8696e5a5416cd2f40b051e194616ca6a631f2a6140fa34b75255ec156816cf72
Proof of concept exploit for the .HPJ project file buffer overflow vulnerability in Microsoft Help Workshop version 4.03.0002.
2176350da42f6699691043843040ceb6141b11c25ebe25cf004b226832127ea2
Microsoft Help Workshop is prone to stack based memory corruption vulnerability during processing (.HPJ) help project files. This vulnerability could be exploited to execute arbitrary code within the remote user context.
9526f9c77e0380edc2c0eb2b0975468780e4be72aa61b3f7d912c2d771fd4f8e
There is a stack based memory corruption flaw in Microsoft Help Workshop version 4.03.0002 while processing .CNT Help Contents files.
28e74c4a2361a0b2c829f60c9ac1aabe3af7d1601df5e32a1159e08b9c459611
There is a vulnerability in the Internet Explorer java applet handling engine. It occurs while running the Sun Microsystems Java VM and is caused by improper HTML 'INPUT' control focus handling.
7fc80c9a3057321503601fb3558a3314e44fb3cb052789ba63e99397266d1ddd