This is the first time we've seen a URL Moniker used to load an IE exploit, and we believe this technique will be used heavily by malware authors in the future. Despite a Word document being the initial attack vector, the vulnerability is actually in VBScript, not in Microsoft Word. ) is not in the list, which is why the MSHTML COM server is successfully created in Word context.\n\nThis is where it becomes interesting.
0 Comments
Leave a Reply. |