ImageStation ActiveX buffer overflow exploit that makes use of SonylSUpload.cab version 1.0.0.38 and can spawn calc.exe or bind a shell.
a6215b0f3a202526e37c51a8390a8b16f7e0e1d6ffb248d6acf3395b5f6b098e
FaceBook PhotoUploader buffer overflow exploit that takes advantage of ImageUploader4.ocx version 4.5.57.0.
42fb0f9d6161ea73e9064b8284554afa3a1f7b7af22a5e77cc3700b89c59e5d0
Yahoo! Music Jukebox AddButton() ActiveX buffer overflow exploit.
a3419039c882d33450d5327b6f52f73c0e91ae33be3c254256fa434a0d6d2d77
Yahoo! Music Jukebox MediaGrid AddBitmap() ActiveX buffer overflow exploit.
9b40df0fea37d0246f373edb8b1cc7aee7ec989be93b5338156f280fc1f25508
MySpace Uploader buffer overflow exploit that makes use of MySpaceUploader.ocx version 1.0.0.4.
0b62e36cf45cd2607fde09ef20cf1c940d8c50f3e3e370ebc11acc40e94ae76d
Persits XUpload version 3.0 AddFile() remote buffer overflow exploit with calc.exe and port binding shellcode.
1fea1e695df1df31dfd3cf0867850309b9b7714aaf0ccca6d5403f4254ffba7f
Gateway WebLaunch ActiveX remote buffer overflow exploit with calc.exe and port binding shellcode.
61cc61f42d754de986e78603ee82b033708006bd45966dae20ec804a1c5c4a15
Move Networks Upgrade Manager Control buffer overflow exploit with calc.exe and port binding shellcode.
eb391e1312896df08ac560b017fa949ab213b20eb3acddab8213885994fecbe6
Lycos FileUploader Control buffer overflow exploit that can bind a shell to port 4444.
eeb507f6b97c9fdbb1d1f9f4a434fbbe12bc7ec5751927cafa8975907655166a
The hpvirtualrooms14.dll version 1.0.0.100 from HP Virtual Rooms suffers from ActiveX related buffer overflow vulnerabilities.
967ba5b931e167bdadc6d761cfbf07307a9f510c9ba9d1b58decb34998c264bd
Macrovision FlexNet DownloadAndExecute method exploit that makes use of isusweb.dll.
14a7637bd708a534a8b2879facd3018665a38bcfdd56d23b73e124e12663d3ca
Macrovision FlexNet Connect download manager is susceptible to an arbitrary file download/overwrite vulnerability.
8656555b01e9b0c8e79ba5f966804d2fc68fd444657ea0fcadbb3c73f9b8cd4f
The StreamAudio ChainCast ProxyManager suffers from a buffer overflow vulnerability in ccpm_0237.dll.
3b5465e121ebbe12c330b5f7cffa431fa2a7602ba008f4f39ebebcaa83875c5a
Gateway Weblaunch ActiveX control insecure method exploit.
d2eb43365020a9d361b6f129aee527ecc567063762665cba85591340d8fab689
Move Networks Quantum Streaming player SEH overwrite exploit that spawns calc.exe.
992465625ee6de48ff658f7e6381b37fa6c5462bacfdd40c50f8e383aa73a731
IBM Domino Web Access upload module inotes6.dll SEH overwrite exploit that has the same offset as the dwa7w exploit but the same class id as the original inotes6 exploit.
58ead93457bb90bfbff8414e450da8513143cd665b5b3e055e2f3cc03d82e513
IBM Domino Web Access upload module dwa7w.dll SEH overwrite exploit.
4be19d2899aa0ce523d06bed33750f7f8e3e3c4e6e8c679af4d50895c9aa08c7
Macrovision Installshield isusweb.dll version 5.1.100.47363 SEH overwrite exploit.
c4513a5f573d3d412d6822d22f4f48be3db757a88ca544659ec39a426a8f59d9
IBM Domino Web Access upload module inotes6.dll SEH overwrite exploit.
825727e3aded175ca3e3c3e8ad11b552c824070c5e2b4ab525e18606d3e6a02f
Vantage Linguistics AnswerWorks version 4 API ActiveX control buffer overflow exploit.
654af9fb383cad5bcfe2ab6f2429c65a3ffd4a0ece41a2c25b8012a68707f6d8
Exploit that will spawn winexec or a bindshell when making use of a buffer overflow vulnerability in the AddFolder() method of the Persists Software XUpload control version 2.1.0.1.
5043653f161ae8137723ce775da3699f00c227f5263c45089a2c144ba7528408
The AOL YGP Picture Editor Control (AIM PicEditor Control) version 9.5.1.8 suffers from multiple exploitable buffer overflows in various properties.
0c1692d9f65fb76aec4d13d1b0a6c47c249eddbb97243c5343e54c6ab22d4ab9
There is a buffer overflow vulnerability in the AddFolder() method of the Persists Software XUpload control version 2.1.0.1.
19805b13373efcfc6a0282922e9f632ea2808ac682f87a7ac76c706fd7c73d7f
The InstallShield Update Server Web Agent version 5.1.100.47363 suffers from a buffer overflow vulnerability.
f2a952b237a03fa22d1db234fdff1e79a973065a81e1a06a4ec30976067cdec3
The Domino Web Access Upload Module version 7.0.34.1 seems to suffer from a memory corruption issue that may allow the execution of arbitrary code.
ec0bc8a997b7c201b3139c76a221545f80d3dba24cbadb0ce6e643e76f535b85