This Metasploit module exploits a buffer overflow in A-PDF WAV to MP3 version 1.0.0. When the application is used to import a specially crafted m3u file, a buffer overflow occurs allowing arbitrary code execution.
ba4f9a99330879edcc62acfb1503ab93
LiquidXML Studio 2012 active-x insecure method executable file creation exploit.
8481a1111059e71512f4a866d43e0218
LiquidXML Studio 2010 active-x insecure method executable file creation exploit.
de59a2c491a2cad4f76688d832403f75
Mitsubishi MX Component version 3 remote exploit that binds a shell to port 5500.
e7ca83c4de0fa9f98a40525df59be727
EastFTP Active-X control version 4.6.02 code execution exploit.
511aeafa23744b085ad01574f55df3a7
This Metasploit module exploits a heap based buffer overflow in the CrystalPrintControl ActiveX, while handling the ServerResourceVersion property. The affected control can be found in the PrintControl.dll component as included with Crystal Reports 2008. This Metasploit module has been tested successfully on IE 6, 7 and 8 on Windows XP SP3 and IE 8 on Windows 7 SP1. The module uses the msvcr71.dll library, loaded by the affected ActiveX control, to bypass DEP and ASLR.
531840a38d272b1140c2fabb863d3a4f
This Metasploit module exploits a stack based buffer overflow in the Active control file ImageViewer2.OCX by passing a overly long argument to an insecure TifMergeMultiFiles() method. Exploitation results in code execution with the privileges of the user who browsed to the exploit page. The victim will first be required to trust the publisher Viscom Software. This Metasploit module has been designed to bypass DEP and ASLR under XP IE8, Vista and Win7 with Java support.
4682a02bd6d485a684e4c2af85471375
IDEAL Administration 2011 version 11.4 local SEH buffer overflow exploit that binds a shell to port 4444.
0eecad49865dc7c41ff2f464429bc606
This Metasploit module exploits a stack buffer overflow in Novell iPrint Client 5.52. When sending an overly long string to the GetDriverSettings() property of ienipp.ocx an attacker may be able to execute arbitrary code.
6e5b7d89656e28da58044591f77af2cd
Novell iPrint versions 5.52 and below active-x GetDriverSettings() remote exploit.
903c80b245e292e846cf4387c7c284e1
Crystal Reports Viewer version 12.0.0.549 Active-X exploit that leverages PrintControl.dll.
ce2a9fcd21ac051892d7522e6d89e611
AVG Internet Security 2011 Safe Search for Internet Explorer suffers from a denial of service vulnerability.
19790bc358c7e03b63a4215162f3ca61
Flash Player (Flash6.ocx) AllowScriptAccess denial of service proof of concept exploit.
b0e575f7d7ca638cb5911634b1fc57d0
Image Viewer CP Gold 6 active-x TifMergeMultiFiles() buffer overflow exploit.
0e333faf3867e0023c2493a4b17a629f
J-Integra version 2.11 active-x SetIdentity() buffer overflow exploit.
476c61f66b8ad5a2957b1ec1ccb95dce
Trend Micro Internet Security 2010 Active-X remote exploit that leverages UfPBCtrl.DLL.
f25e0ae8d9e79321b1e00c58fe063d67
MinaliC Webserver 1.0 suffers from remote source disclosure and file download vulnerabilities.
0f936d16876ea0c5e0f76ac9db1cfb3f
uTorrent versions 2.0.3 and below DLL hijacking exploit.
9bb45bcef8659961825686d5c32cb10b
This Metasploit module exploits a buffer overflow in A-PDF WAV to MP3 v1.0.0. When the application is used to import a specially crafted m3u file, a buffer overflow occurs allowing arbitrary code execution.
6fb153c1815fbfa9b3f3219cc142878f
Httpdx version 1.5.4 suffers from a denial of service vulnerability.
ac4dd81e2c95ede3f176ea2958b04f11
A-PDF WAV to MP3 version 1.0.0 universal local SEH exploit.
06293fe4885456c9244f7cf9341d91eb
Mediacoder version 0.7.5.4710 universal SEH buffer overflow exploit.
6bd93ffcc0ff3df58eb2568189ab6692
AoA Audio Extractor version 2.0.0 Active-X SEH JIT-spray exploit with ASLR-DEP bypass.
5eafd875b90fea2edc20379b9491e2db
Barcodewiz version 3.29 Barcode Active-X control remote heap spray exploit for IE6 / IE7.
60f4f3a1dcfaf33975ebcccc5a39fcf0
Home FTP Server version 1.10.3 (build 144) denial of service exploit.
2c92aebd026f8c2ce49b284c02021d6a