1 results (0.003 seconds)

CVSS: 6.8EPSS: 97%CPEs: 3EXPL: 3

The Microsoft Office Snapshot Viewer ActiveX control in snapview.ocx 10.0.5529.0, as distributed in the standalone Snapshot Viewer and Microsoft Office Access 2000 through 2003, allows remote attackers to download arbitrary files to a client machine via a crafted HTML document or e-mail message, probably involving use of the SnapshotPath and CompressedPath properties and the PrintSnapshot method. NOTE: this can be leveraged for code execution by writing to a Startup folder. El control ActiveX Microsoft Office Snapshot Viewer en snapview.ocx, distribuido en Snapshot Viewer and Microsoft Office Access 2000 through 2003, permite a atacantes remotos descargar archivos de su elección a un equipo cliente a través de un documento HTML o mensaje de correo manipulados. NOTA: esto puede ser aprovechado para ejecutar código si se escribe la carpeta de inicio (StartUp). • https://www.exploit-db.com/exploits/6124 https://www.exploit-db.com/exploits/16605 http://marc.info/?l=bugtraq&m=121915960406986&w=2 http://secunia.com/advisories/30883 http://www.exploit-db.com/exploits/6124 http://www.kb.cert.org/vuls/id/837785 http://www.microsoft.com/technet/security/advisory/955179.mspx http://www.securityfocus.com/bid/30114 http://www.securitytracker.com/id?1020433 http://www.us-cert.gov/cas/techalerts/TA08-189A.html http://www.us • CWE-94: Improper Control of Generation of Code ('Code Injection') •