Intrusion Prevention



This indicates an attack attempt to exploit a remote command-execution vulnerability in Windows Script Host Runtime Library.
The vulnerability is located in the "wshom.ocx" ActiveX control through misuse of the "Exec" method. It may allow remote attackers to execute arbitrary command in the context of the application using the affected ActiveX control.

Affected Products

Windows Script Host Runtime Library


System Compromise: Remote attackers can gain control of vulnerable systems.

Recommended Actions

Disable this ActiveX Control by setting its kill bit.

CVE References