Skip to content

Commit 399955a

Browse files
authored
Update README.md
1 parent 0f56e65 commit 399955a

File tree

1 file changed

+9
-7
lines changed

1 file changed

+9
-7
lines changed

README.md

Lines changed: 9 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -1,4 +1,12 @@
11
# SettingContent-MS-File-Execution
2+
SettingContent-MS File Execution vulnerability in Windows 10 <BR />
3+
Proof of concept for SettingContent-MS File Execution Vulnerability in Windows 10 <BR />
4+
Download and execute LoadWebsite.SettingContent-MS <BR />
5+
Website will automatically load Internet Explorer, load a specific site and maximize the screen.
6+
This can be used to leverage existing vulnerabilities in Internet Explorer or target via an online payload <BR />
7+
Vulnerability first discovered by Matt Nelson <BR />
8+
Documented: https://posts.specterops.io/the-tale-of-settingcontent-ms-files-f1ea253e4d39
9+
210
Created by: Brad Voris<BR />
311

412
<img alt="GitHub" src="https://img.shields.io/github/license/bvoris/SettingContent-MS-File-Execution">
@@ -10,13 +18,7 @@ Created by: Brad Voris<BR />
1018
<img alt="GitHub top language" src="https://img.shields.io/github/languages/top/bvoris/SettingContent-MS-File-Execution">
1119

1220

13-
SettingContent-MS File Execution vulnerability in Windows 10 <BR />
14-
Proof of concept for SettingContent-MS File Execution Vulnerability in Windows 10 <BR />
15-
Download and execute LoadWebsite.SettingContent-MS <BR />
16-
Website will automatically load Internet Explorer, load a specific site and maximize the screen.
17-
This can be used to leverage existing vulnerabilities in Internet Explorer or target via an online payload <BR />
18-
Vulnerability first discovered by Matt Nelson <BR />
19-
Documented: https://posts.specterops.io/the-tale-of-settingcontent-ms-files-f1ea253e4d39
21+
2022

2123
## Connect with me at
2224

0 commit comments

Comments
 (0)