ID |
CVE-2006-5658
|
Summary |
BlooMooWeb ActiveX control (AidemATL.dll) allows remote attackers to (1) download arbitrary files via a URL in the bstrUrl parameter to the BW_DownloadFile method, (2) execute arbitrary local files via a file path in the bstrParams parameter to the BW_LaunchGame method, and (3) delete arbitrary files via a file path in the filePath parameter to the BW_DeleteTempFile method. |
References |
|
Vulnerable Configurations |
|
CVSS |
Base: | 7.6 (as of 17-10-2018 - 21:44) |
Impact: | |
Exploitability: | |
|
CWE |
NVD-CWE-Other |
CAPEC |
|
Access |
Vector | Complexity | Authentication |
NETWORK |
HIGH |
NONE |
|
Impact |
Confidentiality | Integrity | Availability |
COMPLETE |
COMPLETE |
COMPLETE |
|
cvss-vector
via4
|
AV:N/AC:H/Au:N/C:C/I:C/A:C
|
refmap
via4
|
bid | 20827 | bugtraq | 20061031 ActiveX security leaks in the TV owned web game platform | secunia | 22666 | sreason | 1808 | vupen | ADV-2006-4294 | xf | - bloomooweb-activex-command-execution(29968)
- bloomooweb-bwdeletetempfile-dos(29997)
|
|
Last major update |
17-10-2018 - 21:44 |
Published |
03-11-2006 - 00:07 |
Last modified |
17-10-2018 - 21:44 |