|
رد: الدرس الثالث .. فحص المنافذ او البورتات
Current test status
Internet Explorer bait & switch race condition - passed
Internet Explorer createTextRange arbitrary code execution - passed
Windows MDAC ADODB ActiveX control invalid length - passed
Adobe Flash Player video file parsing integer overflow - passed
XMLDOM substringData() heap overflow - passed
Apple QuickTime MOV file JVTCompEncodeFrame heap overflow - not tested yet.
Apple QuickTime 'QTPlugin.ocx' ActiveX Control Multiple Buffer Overflows - not tested yet.
Window location property cross-domain scripting - not tested yet.
Internet Explorer XML nested SPAN elements memory corruption - not tested yet.
Continue the test. Congratulations! The test has found no vulnerabilities in your browser!
الفحص تماااااااااااااااااااااااااااااااااااااااااااااااا ااام :049:
|