2 results (0.006 seconds)

CVSS: 9.3EPSS: 22%CPEs: 4EXPL: 0

Unspecified vulnerability in the SetLicenseInfoEx method in an ActiveX control in mraboutb.dll in IBM SPSS Dimensions 5.5 and SPSS Data Collection 5.6, 6.0, and 6.0.1 allows remote attackers to execute arbitrary code via a crafted HTML document. Vulnerabilidad no especificada en el método SetLicenseInfoEx en un control ActiveX en mraboutb.dll en IBM SPSS Dimensions v5.5 y SPSS Data Collection v5.6, v6.0 y v6.0.1 permite a atacantes remotos ejecutar código de su elección a través de un documento HTML específicamente creado para este fin. This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of IBM SPSS. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within SetLicenseInfoEx() method exposed by the mraboutb.dll ActiveX Control. String data supplied to the first parameter (strInstallDir) of SetLicenseInfoEx() is copied into a 256 byte global buffer without first checking the string length. • http://osvdb.org/78329 http://secunia.com/advisories/47565 http://www-01.ibm.com/support/docview.wss?uid=swg21577956 https://exchange.xforce.ibmcloud.com/vulnerabilities/72118 •

CVSS: 9.3EPSS: 88%CPEs: 4EXPL: 0

Unspecified vulnerability in the Render method in the ExportHTML.ocx ActiveX control in ExportHTML.dll in IBM SPSS Dimensions 5.5 and SPSS Data Collection 5.6, 6.0, and 6.0.1 allows remote attackers to execute arbitrary code via a crafted HTML document. Una vulnerabilidad no especificada en el método Render en el control ActiveX ExportHTML.ocx en la librería ExportHTML.dll de IBM SPSS Dimensiones v5.5 y SPSS Data Collection v5.6, v6.0 y v6.0.1 permite a atacantes remotos ejecutar código de su elección a través de un documento HTML específicamente modificado paratal fin. This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of IBM SPSS. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the Render() method exposed by the ExportHTML.dll ActiveX control. This method causes a file to be written to an arbitrary path specified by the second argument (Output). • http://secunia.com/advisories/47565 http://www-01.ibm.com/support/docview.wss?uid=swg21577956 https://exchange.xforce.ibmcloud.com/vulnerabilities/72121 •