lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-Id: <201304250243.r3P2hr6X011024@sf01web1.securityfocus.com> Date: Thu, 25 Apr 2013 02:43:53 GMT From: nospam@...il.it To: bugtraq@...urityfocus.com Subject: Borland Silk Central 12.1 TeeChart Pro Activex control AddSeries Remote Code Execution Borland Silk Central 12.1 TeeChart Pro Activex control AddSeries Remote Code Execution ActiveX Settings: Binary path: C:\Program Files\Silk\Shared Files\teechart.ocx CLSID: {008BBE7E-C096-11D0-B4E3-00A0C901D681} ProgID: TeeChart.TChart Version: 4.0.0.7 Safe for Scripting (IObjectSafety): True Safe for Initialization (IObjectSafety): True AddSeries method is vulnerable, see http://www.osvdb.org/show/osvdb/74446 //rgod
Powered by blists - more mailing lists