CVE-2007-2987

EXPLOITED

Zenturi Programchecker - Memory Corruption

Title source: rule

Description

Multiple buffer overflows in certain ActiveX controls in sasatl.dll in Zenturi ProgramChecker allow remote attackers to execute arbitrary code via unspecified vectors, possibly involving the (1) DebugMsgLog or (2) DoFileProperties methods.

Exploits (4)

metasploit WORKING POC EXCELLENT
by MC · rubypocwin
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/windows/browser/zenturiprogramchecker_unsafe.rb
exploitdb WORKING POC VERIFIED
by shinnai · htmlremotewindows
https://www.exploit-db.com/exploits/4021
exploitdb WORKING POC VERIFIED
by Metasploit · rubyremotewindows
https://www.exploit-db.com/exploits/16540
exploitdb WORKING POC
htmlremotewindows
https://www.exploit-db.com/exploits/4214

Scores

EPSS 0.7147
EPSS Percentile 98.7%

Exploitation Intel

VulnCheck KEV 2010-05-01

Classification

CWE
CWE-119
Status draft

Affected Products (1)

zenturi/zenturi_programchecker

Timeline

Published Jun 01, 2007
Tracked Since Feb 18, 2026