7.6
CVSSv2

CVE-2006-4777

Published: 14/09/2006 Updated: 17/10/2018
CVSS v2 Base Score: 7.6 | Impact Score: 10 | Exploitability Score: 4.9
VMScore: 770
Vector: AV:N/AC:H/Au:N/C:C/I:C/A:C

Vulnerability Summary

Heap-based buffer overflow in the DirectAnimation Path Control (DirectAnimation.PathControl) COM object (daxctle.ocx) for Internet Explorer 6.0 SP1, on Chinese and possibly other Windows distributions, allows remote malicious users to execute arbitrary code via unknown manipulations in arguments to the KeyFrame method, possibly related to an integer overflow, as demonstrated by daxctle2, and a different vulnerability than CVE-2006-4446.

Vulnerable Product Search on Vulmon Subscribe to Product

microsoft ie 6.0

Exploits

## # $Id: ms06_067_keyframerb 9842 2010-07-16 02:33:25Z jduck $ ## ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions Please see the Metasploit # Framework web site for more information on licensing and terms of use # metasploitcom/framework/ ## require 'msf/core' clas ...
/* *----------------------------------------------------------------------- * * daxctle2c - Internet Explorer COM Object Heap Overflow Download Exec Exploit * !!! 0day !!! Public Version !!! * * Copyright (C) 2006 XSec All Rights Reserved * * Author : nop * : nop#xsecorg * : wwwxsecorg * : * Tested : Wind ...

Github Repositories

malware del lado del cliente de explotacion de vulnerabilidad de internet explorer 6.0 SP1 en windows xp SP2. No requiere de consentimiento por parte del usuario y no descarga ningun archivo

js-driveby-download-CVE-2006-4777 malware del lado del cliente de explotacion de vulnerabilidad de internet explorer 60 SP1 en windows xp SP2 No requiere de consentimiento por parte del usuario y no descarga ningun archivo Injeccion de Codigo Shell en la RAM desde JavaScript con IE en Windows XP Fileless, drive-by-download, client side malware