IE HTML Help Control exploit

This module runs a web server waiting for vulnerable clients (Internet Explorer) to connect to it. When the client connects, it will try to install an agent by sending a specially crafted HTML page which exploits the Windows ActiveX Help Control Vulnerability. When Outlook Express is used as mail user agent, Internet Explorer can be exploited through sending the target an e-mail that contains a link to the specially designed HTML page that triggers the attack. This exploit relies on a flaw in Windows ActiveX Help Control that allows untrusted content to access the Local Zone.
Exploit Platform
Exploit Type
Product Name