Microsoft Windows Image Acquisition Logger ActiveX Control Arbitrary File Overwrite Vulnerability

To exploit this issue, an attacker must entice an unsuspecting victim into viewing a malicious web page.

The following example exploit code is available:


 

Privacy Statement
Copyright 2010, SecurityFocus