«
Expand/Collapse
203 items tagged "activex"
Related tags:
microsoft [+],
control stack [+],
arbitrary code execution [+],
multiple buffer overflow [+],
iconics [+],
dll [+],
buffer overflow vulnerabilities [+],
buffer [+],
webhmi [+],
safer use [+],
heap [+],
poc [+],
msvcr71 dll [+],
memory address [+],
magnetosoft [+],
gateway [+],
command execution [+],
citrix [+],
attackers [+],
arbitrary files [+],
teechart [+],
remote [+],
print [+],
playerpt [+],
memory corruption [+],
magneto [+],
issymbol [+],
indusoft [+],
exploit [+],
cisco linksys [+],
txt [+],
seh [+],
oracle [+],
leadtools [+],
insecure method [+],
icmp [+],
day [+],
client [+],
activex control buffer overflow [+],
Software [+],
zero day [+],
zero [+],
x setsource [+],
viscom [+],
viewer [+],
victim machine [+],
usermanager [+],
typical interaction [+],
trust issue [+],
target [+],
strcat [+],
stopmodule [+],
stack overflow [+],
stack buffer [+],
software movie player [+],
silverlight [+],
sap gui [+],
safenet [+],
remote buffer overflow [+],
proper bounds [+],
professional [+],
privilege [+],
privagent [+],
overflow [+],
ocx [+],
novell zenworks [+],
novell iprint [+],
novell [+],
networkresources [+],
multiple [+],
microsoft silverlight [+],
microsoft data analyzer [+],
microsoft activex technology [+],
method [+],
max [+],
malicious web [+],
launchhelp [+],
kim tags [+],
iprint [+],
integer overflow [+],
integer [+],
input validation [+],
ice [+],
free software updates [+],
dvrobot [+],
drawtext method [+],
dolphin [+],
dldrv [+],
default security [+],
default [+],
crystalprintcontrol [+],
command [+],
cisco security advisory [+],
cisco security [+],
cisco clientless [+],
cisco [+],
buffer overflows [+],
black ice [+],
black [+],
barcode [+],
autovue [+],
audio [+],
aslr [+],
asa [+],
arithmetic operation [+],
arbitrary value [+],
arbitrary code [+],
aol [+],
aoa [+],
adminstudio [+],
activex controls [+],
active x [+],
activex control [+],
control [+],
buffer overflow vulnerability [+],
zdi [+],
wmitools [+],
vista [+],
usa [+],
uplay [+],
uninitialized pointer [+],
ubisoft [+],
tabular [+],
system privileges [+],
sigplus [+],
security [+],
remote buffer overflow vulnerability [+],
record [+],
proof of concept [+],
photo [+],
newvcommon [+],
multiple products [+],
local privilege escalation [+],
insecure methods [+],
hp photo [+],
head [+],
gigabyte [+],
flow data [+],
fathftp [+],
f secure [+],
edraw [+],
dll library [+],
dell webcam [+],
control microsoft [+],
consona [+],
bof [+],
black hat [+],
barcodewiz [+],
barcode activex [+],
attacker [+],
apple quicktime [+],
absolute path name [+],
exploits [+],
buffer overflow [+],
yong kim [+],
x applicationserver [+],
winning team [+],
windows [+],
webscan [+],
webmoney [+],
webcam software [+],
webcam server [+],
webcam [+],
web access [+],
vulnerabilities [+],
vpn client [+],
vpn [+],
video vista [+],
video [+],
v16 [+],
uusee [+],
uri uninitialized [+],
tv ip [+],
tuxsystem [+],
trendnet [+],
tlist [+],
threedify [+],
tec [+],
symantec antivirus [+],
symantec [+],
storm [+],
stack [+],
sntp [+],
slides [+],
skincrafter [+],
setidentity [+],
server v2 [+],
server [+],
security notice [+],
security event [+],
scanserver [+],
scada [+],
registry [+],
realplayer [+],
reader v3 [+],
reader [+],
raster [+],
punk [+],
psformx [+],
property [+],
promotic [+],
pro v3 [+],
pro [+],
paltalk messenger [+],
paltalk [+],
overwrite [+],
overflow vulnerability [+],
oracle java [+],
office [+],
notice [+],
msn [+],
mscomctl [+],
meta [+],
messenger [+],
marshaled [+],
management [+],
linksys [+],
lcdwritestring [+],
kingview [+],
java [+],
j integra [+],
integer overflow vulnerability [+],
insecure [+],
information disclosure [+],
image [+],
icosetserver [+],
hyleos [+],
hpediag [+],
honeywell [+],
gesytec [+],
foxit [+],
flowchart [+],
flexgrid [+],
extractor [+],
elonfmt [+],
dvd [+],
dvbsexecall [+],
domino web [+],
dnupdater [+],
dns [+],
designer [+],
datev base [+],
crypt [+],
creator [+],
crazytalk [+],
corba [+],
converter [+],
controls [+],
control array [+],
componentone [+],
common [+],
code [+],
class [+],
cisco anyconnect [+],
chilkat [+],
chemviewx [+],
chemview [+],
cad [+],
bundled [+],
bestorm [+],
bennet [+],
bdl [+],
baofeng [+],
backimage [+],
axman [+],
authors [+],
audio extractor [+],
ashampoo [+],
application lifecycle management [+],
aoaaudioextractor [+],
antivirus [+],
advisor [+],
activex plugin [+],
access [+],
abb [+],
s system [+],
code execution [+],
based buffer overflow [+],
vulnerability [+],
ntr [+],
crystal reports [+],
module [+],
sap [+],
activex buffer overflow [+]
-
-
19:17
»
Packet Storm Security Exploits
This Metasploit module exploits a buffer overflow vulnerability on the UploadControl ActiveX. The vulnerability exists in the handling of the "Attachment_Times" property, due to the insecure usage of the _swscanf. The affected ActiveX is provided by the qp2.dll installed with the IBM Lotus Quickr product. This Metasploit module has been tested successfully on IE6-IE9 on Windows XP, Vista and 7, using the qp2.dll 8.1.0.1800. In order to bypass ASLR the no aslr compatible module msvcr71.dll is used. This one is installed with the qp2 ActiveX.
-
19:17
»
Packet Storm Security Exploits
This Metasploit module exploits a buffer overflow vulnerability on the UploadControl ActiveX. The vulnerability exists in the handling of the "Attachment_Times" property, due to the insecure usage of the _swscanf. The affected ActiveX is provided by the qp2.dll installed with the IBM Lotus Quickr product. This Metasploit module has been tested successfully on IE6-IE9 on Windows XP, Vista and 7, using the qp2.dll 8.1.0.1800. In order to bypass ASLR the no aslr compatible module msvcr71.dll is used. This one is installed with the qp2 ActiveX.
-
19:17
»
Packet Storm Security Recent Files
This Metasploit module exploits a buffer overflow vulnerability on the UploadControl ActiveX. The vulnerability exists in the handling of the "Attachment_Times" property, due to the insecure usage of the _swscanf. The affected ActiveX is provided by the qp2.dll installed with the IBM Lotus Quickr product. This Metasploit module has been tested successfully on IE6-IE9 on Windows XP, Vista and 7, using the qp2.dll 8.1.0.1800. In order to bypass ASLR the no aslr compatible module msvcr71.dll is used. This one is installed with the qp2 ActiveX.
-
19:17
»
Packet Storm Security Recent Files
This Metasploit module exploits a buffer overflow vulnerability on the UploadControl ActiveX. The vulnerability exists in the handling of the "Attachment_Times" property, due to the insecure usage of the _swscanf. The affected ActiveX is provided by the qp2.dll installed with the IBM Lotus Quickr product. This Metasploit module has been tested successfully on IE6-IE9 on Windows XP, Vista and 7, using the qp2.dll 8.1.0.1800. In order to bypass ASLR the no aslr compatible module msvcr71.dll is used. This one is installed with the qp2 ActiveX.
-
19:17
»
Packet Storm Security Misc. Files
This Metasploit module exploits a buffer overflow vulnerability on the UploadControl ActiveX. The vulnerability exists in the handling of the "Attachment_Times" property, due to the insecure usage of the _swscanf. The affected ActiveX is provided by the qp2.dll installed with the IBM Lotus Quickr product. This Metasploit module has been tested successfully on IE6-IE9 on Windows XP, Vista and 7, using the qp2.dll 8.1.0.1800. In order to bypass ASLR the no aslr compatible module msvcr71.dll is used. This one is installed with the qp2 ActiveX.
-
19:17
»
Packet Storm Security Misc. Files
This Metasploit module exploits a buffer overflow vulnerability on the UploadControl ActiveX. The vulnerability exists in the handling of the "Attachment_Times" property, due to the insecure usage of the _swscanf. The affected ActiveX is provided by the qp2.dll installed with the IBM Lotus Quickr product. This Metasploit module has been tested successfully on IE6-IE9 on Windows XP, Vista and 7, using the qp2.dll 8.1.0.1800. In order to bypass ASLR the no aslr compatible module msvcr71.dll is used. This one is installed with the qp2 ActiveX.
-
-
7:04
»
SecDocs
Tags:
security Event:
DEFCON 5 Abstract: From the Hacker Jeopardy winning team. He will discuss Issues with Security and Networked Object Systems, looking at some of the recent security issues found with activeX and detail some of the potentials and problems with network objects. Topics will include development of objects, distributed objects, standards, ActiveX, corba, and hacking objects.
-
-
16:00
»
SecuriTeam
SafeNet Privilege is prone to multiple buffer-overflow vulnerabilities because the application fails to perform adequate boundary checks on user-supplied input.
-
-
18:03
»
Packet Storm Security Recent Files
This Metasploit module exploits a heap based buffer overflow in the CrystalPrintControl ActiveX, while handling the ServerResourceVersion property. The affected control can be found in the PrintControl.dll component as included with Crystal Reports 2008. This Metasploit module has been tested successfully on IE 6, 7 and 8 on Windows XP SP3 and IE 8 on Windows 7 SP1. The module uses the msvcr71.dll library, loaded by the affected ActiveX control, to bypass DEP and ASLR.
-
18:03
»
Packet Storm Security Misc. Files
This Metasploit module exploits a heap based buffer overflow in the CrystalPrintControl ActiveX, while handling the ServerResourceVersion property. The affected control can be found in the PrintControl.dll component as included with Crystal Reports 2008. This Metasploit module has been tested successfully on IE 6, 7 and 8 on Windows XP SP3 and IE 8 on Windows 7 SP1. The module uses the msvcr71.dll library, loaded by the affected ActiveX control, to bypass DEP and ASLR.
-
-
11:43
»
Packet Storm Security Exploits
This Metasploit module exploits the default security setting in the Dolphin3D web browser. The default security setting ("cautious") allows arbitrary ActiveX Controls, thus remote command execution.
-
11:43
»
Packet Storm Security Recent Files
This Metasploit module exploits the default security setting in the Dolphin3D web browser. The default security setting ("cautious") allows arbitrary ActiveX Controls, thus remote command execution.
-
11:43
»
Packet Storm Security Misc. Files
This Metasploit module exploits the default security setting in the Dolphin3D web browser. The default security setting ("cautious") allows arbitrary ActiveX Controls, thus remote command execution.
-
-
17:00
»
SecuriTeam
ComponentOne FlexGrid ActiveX Control is prone to a remote buffer-overflow vulnerability because it fails to perform adequate boundary checks on user-supplied data.
-
-
23:44
»
Packet Storm Security Exploits
This Metasploit module exploits a vulnerability found in NTR ActiveX 1.1.8. The vulnerability exists in the Check() method, due to the insecure usage of strcat to build a URL using the bstrParams parameter contents, which leads to code execution under the context of the user visiting a malicious web page. In order to bypass DEP and ASLR on Windows Vista and Windows 7 JRE 6 is needed.
-
23:44
»
Packet Storm Security Recent Files
This Metasploit module exploits a vulnerability found in NTR ActiveX 1.1.8. The vulnerability exists in the Check() method, due to the insecure usage of strcat to build a URL using the bstrParams parameter contents, which leads to code execution under the context of the user visiting a malicious web page. In order to bypass DEP and ASLR on Windows Vista and Windows 7 JRE 6 is needed.
-
23:44
»
Packet Storm Security Misc. Files
This Metasploit module exploits a vulnerability found in NTR ActiveX 1.1.8. The vulnerability exists in the Check() method, due to the insecure usage of strcat to build a URL using the bstrParams parameter contents, which leads to code execution under the context of the user visiting a malicious web page. In order to bypass DEP and ASLR on Windows Vista and Windows 7 JRE 6 is needed.
-
23:43
»
Packet Storm Security Exploits
This Metasploit module exploits a vulnerability found in the NTR ActiveX 1.1.8. The vulnerability exists in the StopModule() method, where the lModule parameter is used to dereference memory to get a function pointer, which leads to code execution under the context of the user visiting a malicious web page.
-
23:43
»
Packet Storm Security Recent Files
This Metasploit module exploits a vulnerability found in the NTR ActiveX 1.1.8. The vulnerability exists in the StopModule() method, where the lModule parameter is used to dereference memory to get a function pointer, which leads to code execution under the context of the user visiting a malicious web page.
-
23:43
»
Packet Storm Security Misc. Files
This Metasploit module exploits a vulnerability found in the NTR ActiveX 1.1.8. The vulnerability exists in the StopModule() method, where the lModule parameter is used to dereference memory to get a function pointer, which leads to code execution under the context of the user visiting a malicious web page.
-
-
17:00
»
SecuriTeam
Ubisoft Uplay ActiveX Control is prone to a remote buffer-overflow vulnerability because the application fails to properly bounds check user-supplied input.
-
-
8:15
»
Packet Storm Security Exploits
This Metasploit module exploits a vulnerability found in the AutoVue.ocx ActiveX control. The vulnerability, due to the insecure usage of an strcpy like function in the SetMarkupMode method, when handling a specially crafted sMarkup argument, allows to trigger a stack based buffer overflow which leads to code execution under the context of the user visiting a malicious web page. The module has been successfully tested against Oracle AutoVue Desktop Version 20.0.0 (AutoVue.ocx 20.0.0.7330) on IE 6, 7, 8 and 9 (Java 6 needed to DEP and ASLR bypass).
-
8:15
»
Packet Storm Security Recent Files
This Metasploit module exploits a vulnerability found in the AutoVue.ocx ActiveX control. The vulnerability, due to the insecure usage of an strcpy like function in the SetMarkupMode method, when handling a specially crafted sMarkup argument, allows to trigger a stack based buffer overflow which leads to code execution under the context of the user visiting a malicious web page. The module has been successfully tested against Oracle AutoVue Desktop Version 20.0.0 (AutoVue.ocx 20.0.0.7330) on IE 6, 7, 8 and 9 (Java 6 needed to DEP and ASLR bypass).
-
8:15
»
Packet Storm Security Misc. Files
This Metasploit module exploits a vulnerability found in the AutoVue.ocx ActiveX control. The vulnerability, due to the insecure usage of an strcpy like function in the SetMarkupMode method, when handling a specially crafted sMarkup argument, allows to trigger a stack based buffer overflow which leads to code execution under the context of the user visiting a malicious web page. The module has been successfully tested against Oracle AutoVue Desktop Version 20.0.0 (AutoVue.ocx 20.0.0.7330) on IE 6, 7, 8 and 9 (Java 6 needed to DEP and ASLR bypass).
-
-
17:00
»
SecuriTeam
Cisco Linksys PlayerPT ActiveX Control is prone to a buffer-overflow vulnerability because the application fails to adequately check boundaries on user-supplied input.
-
-
14:36
»
Packet Storm Security Advisories
Secunia Research has discovered a vulnerability in Cisco Linksys PlayerPT ActiveX Control, which can be exploited by malicious people to compromise a user's system. Successful exploitation allows execution of arbitrary code. Cisco Linksys PlayerPT ActiveX Control version 1.0.0.15 is affected. Other versions may also be affected.
-
14:36
»
Packet Storm Security Recent Files
Secunia Research has discovered a vulnerability in Cisco Linksys PlayerPT ActiveX Control, which can be exploited by malicious people to compromise a user's system. Successful exploitation allows execution of arbitrary code. Cisco Linksys PlayerPT ActiveX Control version 1.0.0.15 is affected. Other versions may also be affected.
-
14:36
»
Packet Storm Security Misc. Files
Secunia Research has discovered a vulnerability in Cisco Linksys PlayerPT ActiveX Control, which can be exploited by malicious people to compromise a user's system. Successful exploitation allows execution of arbitrary code. Cisco Linksys PlayerPT ActiveX Control version 1.0.0.15 is affected. Other versions may also be affected.
-
-
16:52
»
Packet Storm Security Exploits
This Metasploit module exploits a vulnerability in AdminStudio LaunchHelp.dll ActiveX control. The LaunchProcess function found in LaunchHelp.HelpLauncher.1 allows remote attackers to run arbitrary commands on the victim machine. This Metasploit module has been successfully tested with the ActiveX installed with AdminStudio 9.5, which also comes with Novell ZENworks Configuration Management 10 SP2, on IE 6 and IE 8 over Windows XP SP 3.
-
16:52
»
Packet Storm Security Recent Files
This Metasploit module exploits a vulnerability in AdminStudio LaunchHelp.dll ActiveX control. The LaunchProcess function found in LaunchHelp.HelpLauncher.1 allows remote attackers to run arbitrary commands on the victim machine. This Metasploit module has been successfully tested with the ActiveX installed with AdminStudio 9.5, which also comes with Novell ZENworks Configuration Management 10 SP2, on IE 6 and IE 8 over Windows XP SP 3.
-
16:52
»
Packet Storm Security Misc. Files
This Metasploit module exploits a vulnerability in AdminStudio LaunchHelp.dll ActiveX control. The LaunchProcess function found in LaunchHelp.HelpLauncher.1 allows remote attackers to run arbitrary commands on the victim machine. This Metasploit module has been successfully tested with the ActiveX installed with AdminStudio 9.5, which also comes with Novell ZENworks Configuration Management 10 SP2, on IE 6 and IE 8 over Windows XP SP 3.
-
-
19:32
»
Packet Storm Security Advisories
Zero Day Initiative Advisory 12-113 - This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of IBM Rational ClearQuest. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the CQOle ActiveX control. A function prototype mismatch in an ActiveX wrapper results in an extra argument to be pushed onto the stack, thereby misaligning the stack offset. When the function returns, it can be made to jump to a memory address provided via the ActiveX method call. This can be leveraged to execute arbitrary code under the context of the user running the browser.
-
19:32
»
Packet Storm Security Recent Files
Zero Day Initiative Advisory 12-113 - This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of IBM Rational ClearQuest. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the CQOle ActiveX control. A function prototype mismatch in an ActiveX wrapper results in an extra argument to be pushed onto the stack, thereby misaligning the stack offset. When the function returns, it can be made to jump to a memory address provided via the ActiveX method call. This can be leveraged to execute arbitrary code under the context of the user running the browser.
-
19:32
»
Packet Storm Security Misc. Files
Zero Day Initiative Advisory 12-113 - This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of IBM Rational ClearQuest. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the CQOle ActiveX control. A function prototype mismatch in an ActiveX wrapper results in an extra argument to be pushed onto the stack, thereby misaligning the stack offset. When the function returns, it can be made to jump to a memory address provided via the ActiveX method call. This can be leveraged to execute arbitrary code under the context of the user running the browser.
-
-
20:02
»
Packet Storm Security Advisories
Cisco Security Advisory - The Cisco Clientless VPN solution as deployed by Cisco ASA 5500 Series Adaptive Security Appliances (Cisco ASA) uses an ActiveX control on client systems to perform port forwarding operations. Microsoft Windows-based systems that are running Internet Explorer or another browser that supports Microsoft ActiveX technology may be affected if the system has ever connected to a device that is running the Cisco Clientless VPN solution. A remote, unauthenticated attacker who could convince a user to connect to a malicious web page could exploit this issue to execute arbitrary code on the affected machine with the privileges of the web browser. The affected ActiveX control is distributed to endpoint systems by Cisco ASA. However, the impact of successful exploitation of this vulnerability is to the endpoint system only and does not compromise Cisco ASA devices. Cisco has released free software updates that address this vulnerability. Workarounds that mitigate this vulnerability are available.
-
20:02
»
Packet Storm Security Recent Files
Cisco Security Advisory - The Cisco Clientless VPN solution as deployed by Cisco ASA 5500 Series Adaptive Security Appliances (Cisco ASA) uses an ActiveX control on client systems to perform port forwarding operations. Microsoft Windows-based systems that are running Internet Explorer or another browser that supports Microsoft ActiveX technology may be affected if the system has ever connected to a device that is running the Cisco Clientless VPN solution. A remote, unauthenticated attacker who could convince a user to connect to a malicious web page could exploit this issue to execute arbitrary code on the affected machine with the privileges of the web browser. The affected ActiveX control is distributed to endpoint systems by Cisco ASA. However, the impact of successful exploitation of this vulnerability is to the endpoint system only and does not compromise Cisco ASA devices. Cisco has released free software updates that address this vulnerability. Workarounds that mitigate this vulnerability are available.
-
20:02
»
Packet Storm Security Misc. Files
Cisco Security Advisory - The Cisco Clientless VPN solution as deployed by Cisco ASA 5500 Series Adaptive Security Appliances (Cisco ASA) uses an ActiveX control on client systems to perform port forwarding operations. Microsoft Windows-based systems that are running Internet Explorer or another browser that supports Microsoft ActiveX technology may be affected if the system has ever connected to a device that is running the Cisco Clientless VPN solution. A remote, unauthenticated attacker who could convince a user to connect to a malicious web page could exploit this issue to execute arbitrary code on the affected machine with the privileges of the web browser. The affected ActiveX control is distributed to endpoint systems by Cisco ASA. However, the impact of successful exploitation of this vulnerability is to the endpoint system only and does not compromise Cisco ASA devices. Cisco has released free software updates that address this vulnerability. Workarounds that mitigate this vulnerability are available.
-
-
19:46
»
Packet Storm Security Advisories
Secunia Research has discovered a vulnerability in NTR ActiveX control, which can be exploited by malicious people to compromise a user's system. The vulnerability is caused by missing input validation in the handling of the "StopModule()" method and can be exploited via a specially crafted "lModule" parameter to reference an expected module structure at an arbitrary memory address. This can be exploited to dereference an arbitrary value in memory as a function pointer. Successful exploitation allows execution of arbitrary code. NTR ActiveX Control version 1.1.8 is affected.
-
19:46
»
Packet Storm Security Recent Files
Secunia Research has discovered a vulnerability in NTR ActiveX control, which can be exploited by malicious people to compromise a user's system. The vulnerability is caused by missing input validation in the handling of the "StopModule()" method and can be exploited via a specially crafted "lModule" parameter to reference an expected module structure at an arbitrary memory address. This can be exploited to dereference an arbitrary value in memory as a function pointer. Successful exploitation allows execution of arbitrary code. NTR ActiveX Control version 1.1.8 is affected.
-
19:46
»
Packet Storm Security Misc. Files
Secunia Research has discovered a vulnerability in NTR ActiveX control, which can be exploited by malicious people to compromise a user's system. The vulnerability is caused by missing input validation in the handling of the "StopModule()" method and can be exploited via a specially crafted "lModule" parameter to reference an expected module structure at an arbitrary memory address. This can be exploited to dereference an arbitrary value in memory as a function pointer. Successful exploitation allows execution of arbitrary code. NTR ActiveX Control version 1.1.8 is affected.
-
19:33
»
Packet Storm Security Advisories
Secunia Research has discovered four buffer overflows in the NTR ActiveX control, which can be exploited by malicious people to compromise a user's system. NTR ActiveX Control version 1.1.8 is affected.
-
19:33
»
Packet Storm Security Recent Files
Secunia Research has discovered four buffer overflows in the NTR ActiveX control, which can be exploited by malicious people to compromise a user's system. NTR ActiveX Control version 1.1.8 is affected.
-
19:33
»
Packet Storm Security Misc. Files
Secunia Research has discovered four buffer overflows in the NTR ActiveX control, which can be exploited by malicious people to compromise a user's system. NTR ActiveX Control version 1.1.8 is affected.
-
-
21:35
»
Packet Storm Security Exploits
Stack-based buffer overflow in the MOVIEPLAYER.MoviePlayerCtrl.1 ActiveX control in MoviePlayer.ocx 6.8.0.0 in Viscom Software Movie Player Pro SDK ActiveX 6.8 allows remote attackers to execute arbitrary code via a long strFontName parameter to the DrawText method. The victim will first be required to trust the publisher Viscom Software. This Metasploit module has been designed to bypass DEP and ASLR under XP IE8, Vista and Win7 with Java support.
-
21:35
»
Packet Storm Security Recent Files
Stack-based buffer overflow in the MOVIEPLAYER.MoviePlayerCtrl.1 ActiveX control in MoviePlayer.ocx 6.8.0.0 in Viscom Software Movie Player Pro SDK ActiveX 6.8 allows remote attackers to execute arbitrary code via a long strFontName parameter to the DrawText method. The victim will first be required to trust the publisher Viscom Software. This Metasploit module has been designed to bypass DEP and ASLR under XP IE8, Vista and Win7 with Java support.
-
21:35
»
Packet Storm Security Misc. Files
Stack-based buffer overflow in the MOVIEPLAYER.MoviePlayerCtrl.1 ActiveX control in MoviePlayer.ocx 6.8.0.0 in Viscom Software Movie Player Pro SDK ActiveX 6.8 allows remote attackers to execute arbitrary code via a long strFontName parameter to the DrawText method. The victim will first be required to trust the publisher Viscom Software. This Metasploit module has been designed to bypass DEP and ASLR under XP IE8, Vista and Win7 with Java support.
-
-
7:48
»
Packet Storm Security Advisories
Secunia Research has discovered a vulnerability in DVR Remote ActiveX Control version 2.1.0.39, which can be exploited by malicious people to compromise a user's system. The vulnerability is caused by the ActiveX control during instantiation automatically downloading and loading DVRobot.dll from the "manifest" folder of the web server invoking the ActiveX control. Successful exploitation allows execution of arbitrary code via a specially crafted web page and hosted DVRobot.dll file.
-
7:48
»
Packet Storm Security Recent Files
Secunia Research has discovered a vulnerability in DVR Remote ActiveX Control version 2.1.0.39, which can be exploited by malicious people to compromise a user's system. The vulnerability is caused by the ActiveX control during instantiation automatically downloading and loading DVRobot.dll from the "manifest" folder of the web server invoking the ActiveX control. Successful exploitation allows execution of arbitrary code via a specially crafted web page and hosted DVRobot.dll file.
-
7:48
»
Packet Storm Security Misc. Files
Secunia Research has discovered a vulnerability in DVR Remote ActiveX Control version 2.1.0.39, which can be exploited by malicious people to compromise a user's system. The vulnerability is caused by the ActiveX control during instantiation automatically downloading and loading DVRobot.dll from the "manifest" folder of the web server invoking the ActiveX control. Successful exploitation allows execution of arbitrary code via a specially crafted web page and hosted DVRobot.dll file.
-
-
13:47
»
Packet Storm Security Advisories
Secunia Research has discovered multiple buffer overflow vulnerabilities in InduSoft ISSymbol ActiveX control, which can be exploited by malicious people to compromise a user's system.
-
13:47
»
Packet Storm Security Recent Files
Secunia Research has discovered multiple buffer overflow vulnerabilities in InduSoft ISSymbol ActiveX control, which can be exploited by malicious people to compromise a user's system.
-
13:47
»
Packet Storm Security Misc. Files
Secunia Research has discovered multiple buffer overflow vulnerabilities in InduSoft ISSymbol ActiveX control, which can be exploited by malicious people to compromise a user's system.
-
18:31
»
Packet Storm Security Exploits
This Metasploit module exploits a stack based buffer overflow in the Citrix Gateway ActiveX control. Exploitation of this vulnerability requires user interaction. The victim must click a button in a dialog to begin a scan. This is typical interaction that users should be accustom to. Exploitation results in code execution with the privileges of the user who browsed to the exploit page.
-
18:31
»
Packet Storm Security Recent Files
This Metasploit module exploits a stack based buffer overflow in the Citrix Gateway ActiveX control. Exploitation of this vulnerability requires user interaction. The victim must click a button in a dialog to begin a scan. This is typical interaction that users should be accustom to. Exploitation results in code execution with the privileges of the user who browsed to the exploit page.
-
18:31
»
Packet Storm Security Misc. Files
This Metasploit module exploits a stack based buffer overflow in the Citrix Gateway ActiveX control. Exploitation of this vulnerability requires user interaction. The victim must click a button in a dialog to begin a scan. This is typical interaction that users should be accustom to. Exploitation results in code execution with the privileges of the user who browsed to the exploit page.
-
-
13:18
»
Packet Storm Security Exploits
This Metasploit module exploits a integer overflow in TeeChart Pro ActiveX control. When sending an overly large/negative integer value to the AddSeries() property of TeeChart2010.ocx, the code will perform an arithmetic operation that wraps the value and is later directly trusted and called upon. This Metasploit module has been designed to bypass DEP only under IE8 with Java support.
-
13:18
»
Packet Storm Security Recent Files
This Metasploit module exploits a integer overflow in TeeChart Pro ActiveX control. When sending an overly large/negative integer value to the AddSeries() property of TeeChart2010.ocx, the code will perform an arithmetic operation that wraps the value and is later directly trusted and called upon. This Metasploit module has been designed to bypass DEP only under IE8 with Java support.
-
13:18
»
Packet Storm Security Misc. Files
This Metasploit module exploits a integer overflow in TeeChart Pro ActiveX control. When sending an overly large/negative integer value to the AddSeries() property of TeeChart2010.ocx, the code will perform an arithmetic operation that wraps the value and is later directly trusted and called upon. This Metasploit module has been designed to bypass DEP only under IE8 with Java support.
-
-
1:30
»
Packet Storm Security Exploits
This Metasploit module allows remote attackers to place arbitrary files on a users file system by abusing the "DownloadImageFileURL" method in the Black Ice BIImgFrm.ocx ActiveX Control (BIImgFrm.ocx 12.0.0.0).
-
1:30
»
Packet Storm Security Recent Files
This Metasploit module allows remote attackers to place arbitrary files on a users file system by abusing the "DownloadImageFileURL" method in the Black Ice BIImgFrm.ocx ActiveX Control (BIImgFrm.ocx 12.0.0.0).
-
1:30
»
Packet Storm Security Misc. Files
This Metasploit module allows remote attackers to place arbitrary files on a users file system by abusing the "DownloadImageFileURL" method in the Black Ice BIImgFrm.ocx ActiveX Control (BIImgFrm.ocx 12.0.0.0).
-
-
17:45
»
Packet Storm Security Exploits
This Metasploit module exploits a vulnerability found in ICONICS WebHMI's ActiveX control. By supplying a long string of data to the 'SetActiveXGUID' parameter, GenVersion.dll fails to do any proper bounds checking before this input is copied onto the stack, which causes a buffer overflow, and results arbitrary code execution under the context of the user.
-
17:45
»
Packet Storm Security Recent Files
This Metasploit module exploits a vulnerability found in ICONICS WebHMI's ActiveX control. By supplying a long string of data to the 'SetActiveXGUID' parameter, GenVersion.dll fails to do any proper bounds checking before this input is copied onto the stack, which causes a buffer overflow, and results arbitrary code execution under the context of the user.
-
17:45
»
Packet Storm Security Misc. Files
This Metasploit module exploits a vulnerability found in ICONICS WebHMI's ActiveX control. By supplying a long string of data to the 'SetActiveXGUID' parameter, GenVersion.dll fails to do any proper bounds checking before this input is copied onto the stack, which causes a buffer overflow, and results arbitrary code execution under the context of the user.
-
-
16:55
»
SecuriTeam
The component contains insecure methods by which you can overwrite any file in the OS, run executables, kill processes, etc.
-
Make your website safer. Use external penetration testing service. First report ready in one hour!
-
-
17:40
»
SecuriTeam
SAP Crystal Reports Contains a vulnerability caused due to a boundary error in the "CrystalReports12.CrystalPrintControl.1" ActiveX control.
-
Make your website safer. Use external penetration testing service. First report ready in one hour!
-
-
11:05
»
SecuriTeam
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Oracle's Java platform that utilize the ActiveX Plugin.
-
Make your website safer. Use external penetration testing service. First report ready in one hour!
-
10:22
»
Packet Storm Security Exploits
This Metasploit module exploits a memory trust issue in the Microsoft WMI Administration tools ActiveX control. When processing a specially crafted HTML page, the WEBSingleView.ocx ActiveX Control (1.50.1131.0) will treat the 'lCtxHandle' parameter to the 'AddContextRef' and 'ReleaseContext' methods as a trusted pointer. It makes an indirect call via this pointer which leads to arbitrary code execution. This exploit utilizes a combination of heap spraying and the .NET 2.0 'mscorie.dll' module to bypass DEP and ASLR. This Metasploit module does not opt-in to ASLR. As such, this module should be reliable on all Windows versions.
-
10:22
»
Packet Storm Security Recent Files
This Metasploit module exploits a memory trust issue in the Microsoft WMI Administration tools ActiveX control. When processing a specially crafted HTML page, the WEBSingleView.ocx ActiveX Control (1.50.1131.0) will treat the 'lCtxHandle' parameter to the 'AddContextRef' and 'ReleaseContext' methods as a trusted pointer. It makes an indirect call via this pointer which leads to arbitrary code execution. This exploit utilizes a combination of heap spraying and the .NET 2.0 'mscorie.dll' module to bypass DEP and ASLR. This Metasploit module does not opt-in to ASLR. As such, this module should be reliable on all Windows versions.
-
10:22
»
Packet Storm Security Misc. Files
This Metasploit module exploits a memory trust issue in the Microsoft WMI Administration tools ActiveX control. When processing a specially crafted HTML page, the WEBSingleView.ocx ActiveX Control (1.50.1131.0) will treat the 'lCtxHandle' parameter to the 'AddContextRef' and 'ReleaseContext' methods as a trusted pointer. It makes an indirect call via this pointer which leads to arbitrary code execution. This exploit utilizes a combination of heap spraying and the .NET 2.0 'mscorie.dll' module to bypass DEP and ASLR. This Metasploit module does not opt-in to ASLR. As such, this module should be reliable on all Windows versions.
-
-
12:37
»
Packet Storm Security Advisories
Secunia Research has discovered a vulnerability in SAP Crystal Reports, which can be exploited by malicious people to compromise a user's system. The vulnerability is caused due to a boundary error in the "CrystalReports12.CrystalPrintControl.1" ActiveX control (PrintControl.dll) when processing the "ServerResourceVersion" property and can be exploited to cause a heap-based buffer overflow via an overly long string. Successful exploitation allows execution of arbitrary code. Affected is Crystal Reports 2008 SP3 Fix Pack 3.2 Print ActiveX (12.3.2.753).
-
12:37
»
Packet Storm Security Misc. Files
Secunia Research has discovered a vulnerability in SAP Crystal Reports, which can be exploited by malicious people to compromise a user's system. The vulnerability is caused due to a boundary error in the "CrystalReports12.CrystalPrintControl.1" ActiveX control (PrintControl.dll) when processing the "ServerResourceVersion" property and can be exploited to cause a heap-based buffer overflow via an overly long string. Successful exploitation allows execution of arbitrary code. Affected is Crystal Reports 2008 SP3 Fix Pack 3.2 Print ActiveX (12.3.2.753).
-
-
16:13
»
Packet Storm Security Exploits
This Metasploit module allows remote attackers to place arbitrary files on a users file system by abusing the "Comp_Download" method in the SAP KWEdit ActiveX Control (kwedit.dll 6400.1.1.41).
-
16:13
»
Packet Storm Security Recent Files
This Metasploit module allows remote attackers to place arbitrary files on a users file system by abusing the "Comp_Download" method in the SAP KWEdit ActiveX Control (kwedit.dll 6400.1.1.41).
-
16:13
»
Packet Storm Security Misc. Files
This Metasploit module allows remote attackers to place arbitrary files on a users file system by abusing the "Comp_Download" method in the SAP KWEdit ActiveX Control (kwedit.dll 6400.1.1.41).
-
-
10:01
»
Packet Storm Security Recent Files
Secunia Research has discovered a vulnerability in SonicWALL SSL-VPN End-Point Interrogator/Installer ActiveX Control, which can be exploited by malicious people to compromise a user's system. The vulnerability is caused by a boundary error in the Install3rdPartyComponent() method in the Aventail.EPInstaller ActiveX control when creating an absolute path name based on values in the CabURL and Location arguments. This can be exploited to cause a stack-based buffer overflow via overly long values. Successful exploitation allows execution of arbitrary code.
-
10:01
»
Packet Storm Security Advisories
Secunia Research has discovered a vulnerability in SonicWALL SSL-VPN End-Point Interrogator/Installer ActiveX Control, which can be exploited by malicious people to compromise a user's system. The vulnerability is caused by a boundary error in the Install3rdPartyComponent() method in the Aventail.EPInstaller ActiveX control when creating an absolute path name based on values in the CabURL and Location arguments. This can be exploited to cause a stack-based buffer overflow via overly long values. Successful exploitation allows execution of arbitrary code.
-
-
18:40
»
SecuriTeam
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Apple Quicktime.
-
Make your website safer. Use external penetration testing service. First report ready in one hour!
-
-
11:21
»
SecuriTeam
A vulnerability was discovered in GIGABYTE Dldrv2 ActiveX Control, which can be exploited by malicious people to compromise a user's system.
-
Make your website safer. Use external penetration testing service. First report ready in one hour!
-
11:21
»
SecuriTeam
A vulnerability was discovered in GIGABYTE Dldrv2 ActiveX Control, which can be exploited by malicious people to compromise a user's system.
-
Make your website safer. Use external penetration testing service. First report ready in one hour!
-
-
16:47
»
0day.today (was: 1337day, Inj3ct0r, 1337db)
AoAAudioExtractor 2.0.0.0 ActiveX PoC (SEH)
-
-
1:00
»
0day.today (was: 1337day, Inj3ct0r, 1337db)
FathFTP 1.8 (SEH) ActiveX Buffer Overflow
-
-
1:00
»
0day.today (was: 1337day, Inj3ct0r, 1337db)
SigPlus Pro v3.74 ActiveX LCDWriteString() BoF JIT Spray aslr/dep bypass
-
-
1:00
»
0day.today (was: 1337day, Inj3ct0r, 1337db)
BarCodeWiz Barcode ActiveX Control 3.29 BoF (SEH)
-
1:00
»
0day.today (was: 1337day, Inj3ct0r, 1337db)
BarCodeWiz BarCode ActiveX 3.29 PoC
-
-
1:00
»
0day.today (was: 1337day, Inj3ct0r, 1337db)
Windows live msn (V 2009 build 14.0.8117.416) ActiveX ADD & delete user
-
-
22:02
»
Packet Storm Security Advisories
Secunia Research has discovered some vulnerabilities in GIGABYTE Dldrv2 ActiveX Control, which can be exploited by malicious people to compromise a user's system. The unsafe method dl() allows automatically downloading and executing an arbitrary file. Combined usage of the unsafe methods SetDLInfo() and Bdl() allows automatically downloading an arbitrary file to an arbitrary location on the user's system. GIGABYTE Dldrv2 ActiveX Control version 1.4.206.11 is affected.
-
-
1:00
»
0day.today (was: 1337day, Inj3ct0r, 1337db)
Image22 ActiveX v1.1.1 Buffer Overflow Exploit
-
-
1:00
»
0day.today (was: 1337day, Inj3ct0r, 1337db)
FathFTP 1.7 ActiveX Buffer Overflow
-
-
1:00
»
0day.today (was: 1337day, Inj3ct0r, 1337db)
SasCam 2.7 ActiveX Head Buffer Overflow
-
1:00
»
0day.today (was: 1337day, Inj3ct0r, 1337db)
SasCam 2.7 ActiveX Head Buffer Overflow
-
-
1:00
»
0day.today (was: 1337day, Inj3ct0r, 1337db)
Registry OCX v1.5 ActiveX Buffer Overflow Exploit
-
-
1:00
»
0day.today (was: 1337day, Inj3ct0r, 1337db)
SasCam WebCam Server v2.6.5 ActiveX SEH Overwrite
-
-
10:01
»
Packet Storm Security Recent Files
Consona products uses a proprietary ActiveX site-lock mechanism that can be defeated through XSS attacks. Once an attacker can inject arbitrary JS code within the context of an allowed domain, unsafe methods can invoked to download and execute arbitrary binaries. A local privilege escalation flaw discovered in the Consona's Repair Service can be used to bypass IE8 Protected Mode, thus gaining SYSTEM privileges.
-
10:00
»
Packet Storm Security Advisories
Consona products uses a proprietary ActiveX site-lock mechanism that can be defeated through XSS attacks. Once an attacker can inject arbitrary JS code within the context of an allowed domain, unsafe methods can invoked to download and execute arbitrary binaries. A local privilege escalation flaw discovered in the Consona's Repair Service can be used to bypass IE8 Protected Mode, thus gaining SYSTEM privileges.
-
-
17:45
»
SecuriTeam
During the installation of the DATEV Base System (Grundpaket Basis) an ActiveX Control will be installed (DVBSExeCall.ocx), in which the function "ExecuteExe" is vulnerable to a command execution bug.
-
Make your website safer. Use external penetration testing service. First report ready in one hour!
-
1:00
»
0day.today (was: 1337day, Inj3ct0r, 1337db)
MagnetoSoft NetworkResources ActiveX NetConnectionEnum SEH POC
-
1:00
»
0day.today (was: 1337day, Inj3ct0r, 1337db)
MagnetoSoft NetworkResources ActiveX NetShareEnum SEH Overwrite POC
-
1:00
»
0day.today (was: 1337day, Inj3ct0r, 1337db)
MagnetoSoft NetworkResources ActiveX NetSessionDel POC
-
1:00
»
0day.today (was: 1337day, Inj3ct0r, 1337db)
MagnetoSoft DNS ActiveX DNSLookupHostWithServer POC
-
1:00
»
0day.today (was: 1337day, Inj3ct0r, 1337db)
MagnetoSoft SNTP ActiveX SntpGetReply BOF
-
1:00
»
0day.today (was: 1337day, Inj3ct0r, 1337db)
MagnetoSoft ICMP ActiveX AddDestinationEntry BOF
-
-
21:58
»
SecuriTeam
A buffer overflow vulnerability was identified in an ActiveX Control belonging to Symantec Antivirus 10.0.
-
Make your website safer. Use external penetration testing service. First report ready in one hour!
-
-
16:00
»
Packet Storm Security Recent Files
This Metasploit module exploits a memory corruption vulnerability in the Internet Explorer Tabular Data ActiveX Control. Microsoft reports that version 5.01 and 6 of Internet Explorer are vulnerable. By specifying a long value as the DataURL parameter to this control, it is possible to write a NUL byte outside the bounds of an array. By targeting control flow data on the stack, an attacker can execute arbitrary code.
-
16:00
»
Packet Storm Security Exploits
This Metasploit module exploits a memory corruption vulnerability in the Internet Explorer Tabular Data ActiveX Control. Microsoft reports that version 5.01 and 6 of Internet Explorer are vulnerable. By specifying a long value as the DataURL parameter to this control, it is possible to write a NUL byte outside the bounds of an array. By targeting control flow data on the stack, an attacker can execute arbitrary code.