The Active Network
ActiveMac Anonymous | Create a User | Reviews | News | Forums | Advertise  
 

  *  

  FrontPage Server Vulnerability Fix
Time: 18:19 EST/23:19 GMT | News Source: Microsoft TechNet Security | Posted By: Viper

Microsoft has released a patch for a FrontPage Server Vulnerability to address an unchecked buffer issue. This is a buffer overrun vulnerability. The vulnerability could enable an attacker to run a program of his choice on the server. The program would, at the least, have the privileges associated with a user who could log onto the server at the console, and potentially could have gain system-level privileges. The vulnerability results because of an unchecked buffer in a subcomponent of FrontPage Server Extensions called the Visual InterDev RAD Remote Deployment Support sub-component.

Write Comment
Return to News

  Displaying 576 through 578 of 578
Prev | First
  The time now is 1:32:40 PM ET.
Any comment problems? E-mail us
#576 By 4240821 (82.115.4.230) at 8/1/2025 10:04:53 AM
https://justpaste.me/cnXB4
https://justpaste.me/fylJ2
https://justpaste.me/Yixg4
https://justpaste.me/e0OQ
https://justpaste.me/bqOv2
https://justpaste.me/ZIDA1
https://justpaste.me/fw5T
https://justpaste.me/aKGz2
https://justpaste.me/cY1D3
https://justpaste.me/e6312

#577 By 4240821 (82.115.4.230) at 8/2/2025 5:16:23 AM
https://justpaste.me/dwvV3
https://justpaste.me/eebJ3
https://justpaste.me/fJK5
https://justpaste.me/ZiGp
https://justpaste.me/c13d
https://justpaste.me/at2L1
https://justpaste.me/dJij1
https://justpaste.me/fD1l2
https://justpaste.me/aFBh2
https://justpaste.me/Zu2v2

#578 By 4240821 (82.115.4.230) at 8/2/2025 9:06:29 AM
https://justpaste.me/fTXJ5
https://justpaste.me/ef0a1
https://justpaste.me/alk6
https://justpaste.me/ekvg4
https://justpaste.me/fQmp5
https://justpaste.me/eenV2
https://justpaste.me/Z4R91
https://justpaste.me/eykJ3
https://justpaste.me/abYw2
https://justpaste.me/f1yJ1

Write Comment
Return to News
  Displaying 576 through 578 of 578
Prev | First
  The time now is 1:32:40 PM ET.
Any comment problems? E-mail us
User name and password:

 

  *  
  *   *