CVE-2006-4777
EXPLOITEDInternet Explorer 6.0 SP1 - Buffer Overflow
Title source: llmDescription
Heap-based buffer overflow in the DirectAnimation Path Control (DirectAnimation.PathControl) COM object (daxctle.ocx) for Internet Explorer 6.0 SP1, on Chinese and possibly other Windows distributions, allows remote attackers to execute arbitrary code via unknown manipulations in arguments to the KeyFrame method, possibly related to an integer overflow, as demonstrated by daxctle2, and a different vulnerability than CVE-2006-4446.
Exploits (4)
exploitdb
WORKING POC
VERIFIED
by Metasploit · rubyremotewindows
https://www.exploit-db.com/exploits/16506
nomisec
WORKING POC
by Mario1234 · client-side
https://github.com/Mario1234/js-driveby-download-CVE-2006-4777
metasploit
WORKING POC
NORMAL
rubypocwin
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/windows/browser/ms06_067_keyframe.rb
References (18)
Scores
EPSS
0.8757
EPSS Percentile
99.5%
Details
VulnCheck KEV
2006-11-14
CWE
CWE-119
Status
published
Products (1)
microsoft/ie
6.0 sp1
Published
Sep 14, 2006
Tracked Since
Feb 18, 2026