测试对象:DjVu ActiveX Control 3.0 ImageURL Property Overflow Exploit
漏洞说明:http://www.milw0rm.com/exploits/6878
测试地址:http://www.milw0rm.com/exploit.php?id=6878
测试软件:瑞星RIS 2009 21.01.02(10月27日未升级的版本)
http://download.rising.com.cn/for_down/ceshi/ris/ris_setup.exe