Microsoft Internet Explorer 5.01 and...

- AV AC AU C I A
发布: 2000-06-27
修订: 2025-04-13

Hazardous ActiveX objects may be executed in Internet Explorer 5.01 through the use of Excel and Powerpoint 2000 and certain OBJECT tags on web pages and HTML messages utilizing IFRAME. An example would be the SaveAs object. It has the capability of saving an Excel or Powerpoint file on any location on a remote system unknowingly to a user, including the start up folder which would force the file to open the next time the user started up windows. If the file was an *.hta file, execution of any application on the system is feasible. Other objects aside from SaveAs may also be exploited with similar methods.

0%
当前有1条漏洞利用/PoC
当前有0条受影响产品信息