AutoPlay远程代码执行漏洞
Tags
Common Information
Type | Value |
---|---|
UUID | 91a98e9f-22b1-4e90-812c-7a2be5440cbe |
Fingerprint | 5392fe6afd68e5f4 |
Analysis status | DONE |
Considered CTI value | 0 |
Text language | |
Published | Nov. 17, 2016, midnight |
Added to db | Jan. 19, 2023, 12:06 a.m. |
Last updated | Nov. 17, 2024, 6:49 p.m. |
Headline | UNKNOWN |
Title | AutoPlay远程代码执行漏洞 |
Detected Hints/Tags/Attributes | 19/0/18 |
Source URLs
Redirection | Url | |
---|---|---|
Details | Source | http://whereisk0shl.top/post/2016-11-17-1 |
URL Provider
Attributes
Details | Type | #Events | CTI | Value |
---|---|---|---|---|
Details | Domain | 132 | www.exploit-db.com |
|
Details | Domain | 1 | 6dea54a32a14690f2bb930e9a37ea9fb-autoplay.zip |
|
Details | File | 1 | 6dea54a32a14690f2bb930e9a37ea9fb-autoplay.zip |
|
Details | File | 1 | 'autoplay.ini |
|
Details | File | 1 | 利用poc生成一个.ini |
|
Details | File | 1 | 覆盖autoplay下的.ini |
|
Details | File | 1 | 首先我们通过提供的exploit生成一个存在漏洞的autoplay.ini |
|
Details | File | 1 | 我们重新打开autoplay.ini |
|
Details | File | 1 | autoplay.ico |
|
Details | File | 1 | drumroll.wav |
|
Details | File | 1 | explode.wav |
|
Details | File | 1 | splash.jpg |
|
Details | File | 1260 | explorer.exe |
|
Details | File | 1 | hoversel.wav |
|
Details | File | 1 | c:\documents and settings\administrator\桌面\autoplay.ini |
|
Details | File | 1 | autoplay.ini |
|
Details | md5 | 1 | 6dea54a32a14690f2bb930e9a37ea9fb |
|
Details | Url | 1 | https://www.exploit-db.com/apps/6dea54a32a14690f2bb930e9a37ea9fb-autoplay.zip |