CVE-2007-2987
EXPLOITEDZenturi Programchecker - Memory Corruption
Title source: ruleDescription
Multiple buffer overflows in certain ActiveX controls in sasatl.dll in Zenturi ProgramChecker allow remote attackers to execute arbitrary code via unspecified vectors, possibly involving the (1) DebugMsgLog or (2) DoFileProperties methods.
Exploits (4)
metasploit
WORKING POC
EXCELLENT
by MC · rubypocwin
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/windows/browser/zenturiprogramchecker_unsafe.rb
exploitdb
WORKING POC
VERIFIED
by shinnai · htmlremotewindows
https://www.exploit-db.com/exploits/4021
exploitdb
WORKING POC
VERIFIED
by Metasploit · rubyremotewindows
https://www.exploit-db.com/exploits/16540
References (6)
Scores
EPSS
0.7147
EPSS Percentile
98.7%
Exploitation Intel
VulnCheck KEV
2010-05-01
Classification
CWE
CWE-119
Status
draft
Affected Products (1)
zenturi/zenturi_programchecker
Timeline
Published
Jun 01, 2007
Tracked Since
Feb 18, 2026