File tree Expand file tree Collapse file tree 1 file changed +9
-7
lines changed Expand file tree Collapse file tree 1 file changed +9
-7
lines changed Original file line number Diff line number Diff line change 11# SettingContent-MS-File-Execution
2+ SettingContent-MS File Execution vulnerability in Windows 10 <BR />
3+ Proof of concept for SettingContent-MS File Execution Vulnerability in Windows 10 <BR />
4+ Download and execute LoadWebsite.SettingContent-MS <BR />
5+ Website will automatically load Internet Explorer, load a specific site and maximize the screen.
6+ This can be used to leverage existing vulnerabilities in Internet Explorer or target via an online payload <BR />
7+ Vulnerability first discovered by Matt Nelson <BR />
8+ Documented: https://posts.specterops.io/the-tale-of-settingcontent-ms-files-f1ea253e4d39
9+
210Created by: Brad Voris<BR />
311
412<img alt =" GitHub " src =" https://img.shields.io/github/license/bvoris/SettingContent-MS-File-Execution " >
@@ -10,13 +18,7 @@ Created by: Brad Voris<BR />
1018<img alt =" GitHub top language " src =" https://img.shields.io/github/languages/top/bvoris/SettingContent-MS-File-Execution " >
1119
1220
13- SettingContent-MS File Execution vulnerability in Windows 10 <BR />
14- Proof of concept for SettingContent-MS File Execution Vulnerability in Windows 10 <BR />
15- Download and execute LoadWebsite.SettingContent-MS <BR />
16- Website will automatically load Internet Explorer, load a specific site and maximize the screen.
17- This can be used to leverage existing vulnerabilities in Internet Explorer or target via an online payload <BR />
18- Vulnerability first discovered by Matt Nelson <BR />
19- Documented: https://posts.specterops.io/the-tale-of-settingcontent-ms-files-f1ea253e4d39
21+
2022
2123## Connect with me at
2224
You can’t perform that action at this time.
0 commit comments