• ICONICS WebHMI ActiveX Buffer Overflow
    Disclosure Date: 2011-05-05
    First seen: 2020-04-26
    exploit/windows/scada/iconics_webhmi_setactivexguid
    This module exploits a vulnerability found in ICONICS WebHMI's ActiveX control. By supplying a long string of data to the 'SetActiveXGUID' parameter, GenVersion.dll fails to do any proper bounds checking before this input is copied onto the stack, which causes a buffer overflow, and results arbitrary code execution under the context of the user. Authors: - Scoot Bell <scott.bell@security-assessment.com> - Blair Strang <blair.strang@security-assessment.com> - sinn3r <sinn3r@metasploit.com>
1 metasploit modules found
Please note: Metasploit modules are only matched by CVE numbers. Visit metasploit web site for more details
This web site uses cookies for managing your session, storing preferences, website analytics and additional purposes described in our privacy policy.
By using this web site you are agreeing to CVEdetails.com terms of use!