Lucene search

K

Xunlei XPPlayer <= 5.9.14.1246 ActiveX Remote Exec 0day POC

๐Ÿ—“๏ธย 17 Jan 2010ย 00:00:00Reported byย superliTypeย 
zdt
ย zdt
๐Ÿ”—ย 0day.today๐Ÿ‘ย 8ย Views

Xunlei XPPlayer ActiveX Remote Execution 0day PO

Show more

AI Insights are available for you today

Leverage the power of AI to quickly understand vulnerabilities, impacts, and exploitability

Code
===========================================================
Xunlei XPPlayer <= 5.9.14.1246 ActiveX Remote Exec 0day POC
===========================================================

# Author: superli
# Version: <= 5.9.14.1246
# Tested on: xpsp3 ie6
# Greeting to Xunlei Security Center guys,your guys still not yet # release patch or new version to fix the vunl which also can #attack Xunlei KanKan Player(http://dl.xunlei.com/xmp.html).
# I exposed this vunl two weeks ago,are you really responsible for # the security of millions users?
# Exploit Code :
 
http://inj3ct0r.com/sploits/10130.zip



#  0day.today [2018-01-03]  #

Transform Your Security Services

Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contactย us for a demo andย discover the difference comprehensive, actionable intelligence can make in your security strategy.

Book a live demo
17 Jan 2010 00:00Current
7High risk
Vulners AI Score7
8
.json
Report