CVE-2007-2987

EXPLOITED

Zenturi Programchecker - Memory Corruption

Title source: rule

Description

Multiple buffer overflows in certain ActiveX controls in sasatl.dll in Zenturi ProgramChecker allow remote attackers to execute arbitrary code via unspecified vectors, possibly involving the (1) DebugMsgLog or (2) DoFileProperties methods.

Exploits (4)

exploitdb WORKING POC VERIFIED
by Metasploit · rubyremotewindows
https://www.exploit-db.com/exploits/16540
exploitdb WORKING POC VERIFIED
by shinnai · htmlremotewindows
https://www.exploit-db.com/exploits/4021
exploitdb WORKING POC
htmlremotewindows
https://www.exploit-db.com/exploits/4214
metasploit WORKING POC EXCELLENT
by MC · rubypocwin
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/windows/browser/zenturiprogramchecker_unsafe.rb

Scores

EPSS 0.7365
EPSS Percentile 98.8%

Details

VulnCheck KEV 2010-05-01
CWE
CWE-119
Status published
Products (1)
zenturi/zenturi_programchecker
Published Jun 01, 2007
Tracked Since Feb 18, 2026