MS15-100 Microsoft Windows Media Center MCL Code Execution

Discussion in 'News Aggregator' started by Packet Storm, 15 Sep 2015.

  1. Packet Storm

    Packet Storm Guest

    This Metasploit module exploits a vulnerability in Windows Media Center. By supplying an UNC path in the *.mcl file, a remote file will be automatically downloaded, which can result in arbitrary code execution.

    Continue reading...
     

Share This Page

Loading...