Hellcode Research

5 exploits Active since Aug 2025
CVE-2010-10015 EXPLOITDB HIGH html WORKING POC
AOL <9.5 - Buffer Overflow
AOL versions up to and including 9.5 includes an ActiveX control (Phobos.dll) that exposes a method called Import() via the Phobos.Playlist COM object. This method is vulnerable to a stack-based buffer overflow when provided with an excessively long string argument. Exploitation allows remote attackers to execute arbitrary code in the context of the user, but only when the malicious HTML file is opened locally, due to the control not being marked safe for scripting or initialization. AOL remains an active and supported brand offering services like AOL Mail and AOL Desktop Gold, but the legacy AOL 9.5 desktop software—specifically the version containing the vulnerable Phobos.dll ActiveX control—is long discontinued and no longer maintained.
CVE-2010-10015 EXPLOITDB HIGH text WORKING POC
AOL <9.5 - Buffer Overflow
AOL versions up to and including 9.5 includes an ActiveX control (Phobos.dll) that exposes a method called Import() via the Phobos.Playlist COM object. This method is vulnerable to a stack-based buffer overflow when provided with an excessively long string argument. Exploitation allows remote attackers to execute arbitrary code in the context of the user, but only when the malicious HTML file is opened locally, due to the control not being marked safe for scripting or initialization. AOL remains an active and supported brand offering services like AOL Mail and AOL Desktop Gold, but the legacy AOL 9.5 desktop software—specifically the version containing the vulnerable Phobos.dll ActiveX control—is long discontinued and no longer maintained.
EIP-2026-115994 EXPLOITDB text SUSPICIOUS
OpenOffice - '.slk' Parsing Null Pointer
EIP-2026-102709 EXPLOITDB text WRITEUP
OpenOffice 3.1 - '.csv' Remote Denial of Service
EIP-2026-102710 EXPLOITDB text WRITEUP
OpenOffice 3.1 - '.slk' Null Pointer Dereference Remote Denial of Service