This Metasploit module exploits a vulnerability found in ICONICS WebHMI's ActiveX control. By supplying a long string of data to the 'SetActiveXGUID' parameter, GenVersion.dll fails to do any proper bounds checking before this input is copied onto the stack, which causes a buffer overflow, and results arbitrary code execution under the context of the user.
627c824b526df4f9b075cf7631d7fbdbd9747ed69a817b804cc5b007faa0cb03
This Metasploit module exploits a vulnerability in SPlayer versions 3.7 and below. When SPlayer requests the URL of a media file (video or audio), it is possible to gain arbitrary remote code execution due to a buffer overflow caused by an exceeding length of data as the 'Content-Type' parameter.
6f2550278cc4becee8ea4249e308c87e89641d1cb88d107eb931d8849ab4c457