Skip to content

Files

Latest commit

26459c5 · Feb 13, 2025

History

History
18 lines (13 loc) · 1.53 KB

File metadata and controls

18 lines (13 loc) · 1.53 KB

SettingContent-MS-File-Execution

SettingContent-MS File Execution vulnerability in Windows 10
Proof of concept for SettingContent-MS File Execution Vulnerability in Windows 10
Download and execute LoadWebsite.SettingContent-MS
Website will automatically load Internet Explorer, load a specific site and maximize the screen. This can be used to leverage existing vulnerabilities in Internet Explorer or target via an online payload
Vulnerability first discovered by Matt Nelson
Documented: https://posts.specterops.io/the-tale-of-settingcontent-ms-files-f1ea253e4d39

Created by: Brad Voris

Connect with me at

Victim Of Technology

GitHubGitHub commit activityGitHub All ReleasesGitHub repo sizeGitHub language countGitHub issuesGitHub top language