Format string vulnerability in the ActiveX control (ATXCONSOLE.OCX) in TrendMicro OfficeScan Corporate Edition (OSCE) before 7.3 Patch 1 allows remote attackers to execute arbitrary code via format string identifiers in the "Management Console's Remote Client Install name search".
References
Configurations
History
21 Nov 2024, 00:18
Type | Values Removed | Values Added |
---|---|---|
References | () http://secunia.com/advisories/22224 - Patch, Vendor Advisory | |
References | () http://securityreason.com/securityalert/1682 - | |
References | () http://securitytracker.com/id?1016963 - Patch | |
References | () http://www.kb.cert.org/vuls/id/788860 - US Government Resource | |
References | () http://www.layereddefense.com/TREND01OCT.html - Patch | |
References | () http://www.securityfocus.com/archive/1/447498/100/0/threaded - | |
References | () http://www.securityfocus.com/bid/20284 - Patch | |
References | () http://www.vupen.com/english/advisories/2006/3870 - | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/29308 - |
Information
Published : 2006-10-05 04:04
Updated : 2024-11-21 00:18
NVD link : CVE-2006-5157
Mitre link : CVE-2006-5157
CVE.ORG link : CVE-2006-5157
JSON object : View
Products Affected
trend_micro
- officescan
CWE