The (1) SetDebugging and (2) RunEgatherer methods in IBM Access Support eGatherer ActiveX control 2.0.0.16 allow remote attackers to create files with arbitrary content, as demonstrated by creating a .hta file in a Startup folder.
marc.info/?l=bugtraq&m=108746693619324&w=2
marc.info/?l=full-disclosure&m=108741557604568&w=2
research.eeye.com/html/advisories/published/AD20040615B.html
secunia.com/advisories/11072
www.eeye.com/html/research/advisories/AD20040615B.html
www.osvdb.org/7090
www.securityfocus.com/bid/10562
exchange.xforce.ibmcloud.com/vulnerabilities/16428