The (1) SetDebugging and (2) RunEgatherer methods in IBM Access Support eGatherer ActiveX control 2.0.0.16 allow remote attackers to create files with arbitrary content, as demonstrated by creating a .hta file in a Startup folder.
References
Configurations
Information
Published : 2004-12-30 21:00
Updated : 2017-07-19 18:29
NVD link : CVE-2004-2663
Mitre link : CVE-2004-2663
JSON object : View
CWE
Products Affected
ibm
- egatherer