This indicates an attack attempt to exploit a remote command-execution vulnerability in Windows Script Host Runtime Library.
The vulnerability is located in the "wshom.ocx" ActiveX control through misuse of the "Exec" method. It may allow remote attackers to execute arbitrary command in the context of the application using the affected ActiveX control.
Windows Script Host Runtime Library
System Compromise: Remote attackers can gain control of vulnerable systems.
Disable this ActiveX Control by setting its kill bit.