S-324: BackWeb Lite Install Runner ActiveX Vulnerabilities


 
Thread Tools Search this Thread
Special Forums Cybersecurity Security Advisories (RSS) S-324: BackWeb Lite Install Runner ActiveX Vulnerabilities
# 1  
Old 06-19-2008
S-324: BackWeb Lite Install Runner ActiveX Vulnerabilities

The BackWeb Lite Install Runner ActiveX control contains multiple stack buffer overflows, which can allow a remote, unauthenticated attacker to execute arbitrary code on a vulnerable system. The risk is MEDIUM. By convincing a user to view a specially crafted HTMl document (e.g., a web page or an HTML email message or attachment), an attacker may be able to execute arbitrary code with the privileges of the user.


More...
Login or Register to Ask a Question

Previous Thread | Next Thread

3 More Discussions You Might Find Interesting

1. What is on Your Mind?

Tapatalk/Forum Runner

I was wondering if there was support for Tapatalk or Forum Runner? I tried both, Tapatalk found you guys but it crashes when I try to log in. I log in at the computer no problem (as you can tell) but Tapa refuses to log me in. I even cleared all my tapatalk data and still nothing. Thank you for the... (4 Replies)
Discussion started by: JHutson456
4 Replies

2. Windows & DOS: Issues & Discussions

Shut down runner

How do i get win98 to run a script just before shutdown? (2 Replies)
Discussion started by: perleo
2 Replies

3. Windows & DOS: Issues & Discussions

Boot runner

i have a perl script that i want win98 to run evry time at boot. where should i get it up in windows to do that ??? without using task manager. (1 Reply)
Discussion started by: perleo
1 Replies
Login or Register to Ask a Question
XMLRPCSH(1p)						User Contributed Perl Documentation					      XMLRPCSH(1p)

NAME
XMLRPCsh - Interactive shell for XMLRPC calls SYNOPSIS
perl XMLRPCsh http://betty.userland.com/RPC2 > examples.getStateName(2) > examples.getStateNames(1,2,3,7) > examples.getStateList([1,9]) > examples.getStateStruct({a=>1, b=>24}) > Ctrl-D (Ctrl-Z on Windows) or # all parameters after uri will be executed as methods perl XMLRPCsh http://betty.userland.com/RPC2 examples.getStateName(2) > Ctrl-D (Ctrl-Z on Windows) DESCRIPTION
XMLRPCsh is a shell for making XMLRPC calls. It takes one parameter, endpoint (actually it will tell you about it if you try to run it). Additional commands can follow. After that you'll be able to run any methods of XMLRPC::Lite, like autotype, readable, etc. You can run it the same way as you do it in your Perl script. You'll see output from method, result of XMLRPC call, detailed info on XMLRPC faulure or transport error. For full list of available methods see documentation for XMLRPC::Lite. Along with methods of XMLRPC::Lite you'll be able (and that's much more interesting) run any XMLRPC methods you know about on remote server and see processed results. You can even switch on debugging (with call something like: "on_debug(sub{print@_})") and see XMLRPC code with headers sent and received. COPYRIGHT
Copyright (C) 2000 Paul Kulchenko. All rights reserved. AUTHOR
Paul Kulchenko (paulclinger@yahoo.com) perl v5.12.4 2010-06-03 XMLRPCSH(1p)