The (1) SetDebugging and (2) RunEgatherer methods in IBM Access Support eGatherer ActiveX control 2.0.0.16 allow remote attackers to create files with arbitrary content, as demonstrated by creating a .hta file in a Startup folder.
References
Configurations
History
20 Nov 2024, 23:53
Type | Values Removed | Values Added |
---|---|---|
References | () http://marc.info/?l=bugtraq&m=108746693619324&w=2 - | |
References | () http://marc.info/?l=full-disclosure&m=108741557604568&w=2 - | |
References | () http://research.eeye.com/html/advisories/published/AD20040615B.html - | |
References | () http://secunia.com/advisories/11072 - | |
References | () http://www.eeye.com/html/research/advisories/AD20040615B.html - Exploit, Patch, Vendor Advisory | |
References | () http://www.osvdb.org/7090 - | |
References | () http://www.securityfocus.com/bid/10562 - | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/16428 - |
Information
Published : 2004-12-31 05:00
Updated : 2025-04-03 01:03
NVD link : CVE-2004-2663
Mitre link : CVE-2004-2663
CVE.ORG link : CVE-2004-2663
JSON object : View
Products Affected
ibm
- egatherer
CWE