The (1) SetDebugging and (2) RunEgatherer methods in IBM Access Support eGatherer ActiveX control 2.0.0.16 allow remote attackers to create files with arbitrary content, as demonstrated by creating a .hta file in a Startup folder.
References
Configurations
History
No history.
Information
Published : 2004-12-31 05:00
Updated : 2017-07-20 01:29
NVD link : CVE-2004-2663
Mitre link : CVE-2004-2663
CVE.ORG link : CVE-2004-2663
JSON object : View
Products Affected
ibm
- egatherer
CWE