A security scanner used to discover computers and services on a computer network, thus creating a "map" of the network
Capable of discovering passive services on a network despite the fact that such services aren't advertising themselves
May be able to determine various details about the remote computers. These include operating system, device type, uptime, software product used to run a service, exact version number of that product, etc.
A development platform for creating security tools and exploits
Used by network security professionals to perform penetration tests, system administrators to verify patch installations, product vendors to perform regression testing, and security researchers world-wide
The issue is due to insufficient bounds checking of client DCOM object activation requests. Exploitation of this issue could result in execution of malicious instructions with Local System privileges on an affected system
Exploits a vulnerability in an application (MS Internet Explorer)
Microsoft Internet Explorer is prone to a remote buffer-overflow vulnerability in the 'IsComponentInstalled()' method. A successful exploit results in arbitrary code execution in the context of the user running the browser