R-200: Vulnerability in Microsoft Agent


 
Thread Tools Search this Thread
Special Forums Cybersecurity Security Advisories (RSS) R-200: Vulnerability in Microsoft Agent
# 1  
Old 12-24-2007
R-200: Vulnerability in Microsoft Agent

A remote code execution vulnerability exists in Microsoft Agent in the way that it handles certain specially crafted URLs. The risk is HIGH. Remote code execution.


More...
Login or Register to Ask a Question

Previous Thread | Next Thread
Login or Register to Ask a Question
Agent::Tag::String(3pm) 				User Contributed Perl Documentation				   Agent::Tag::String(3pm)

NAME
Log::Agent::Tag::String - a constant tag string SYNOPSIS
require Log::Agent::Tag::String; # Inherits from Log::Agent::Tag. my $tag = Log::Agent::Tag::String->make( -name => "session id", -value => $session, -postfix => 1, -separator => " -- ", ); DESCRIPTION
This class represents a constant tag string. CREATION ROUTINE PARAMETERS
The following parameters are defined, in alphabetical order: "-name" => name The name of this tag. Currently unused. "-postfix" => flag Whether tag should be placed after or before the log message. By default, it is prepended to the log message, i.e. this parameter is false. "-separator" => string The separation string between the tag and the log message. A single space by default. "-value" => string The tag's value. AUTHOR
Raphael Manfredi <Raphael_Manfredi@pobox.com> SEE ALSO
Log::Agent::Tag(3), Log::Agent::Message(3). perl v5.10.0 2002-03-09 Agent::Tag::String(3pm)