공격자가 특수하게 제작된 웹 페이지를 사용하여 원격으로 코드를 실행할 수 있는 DHTML Editing Component ActiveX 컨트롤의 취약성을 해결합니다.
微软的一个编程控件。使用这个控件允许WEB或应用程序开发者在应用程序中增加所见即所得(WYSIWYG)动HTML编辑的能力,这个编辑控件使用Microsoft‘39;s Component Object Model (COM)技术提供存取编辑网页能力,它提供强大的编辑能力,对网页文字格式、表格、图象、超级链接等进行编辑,可以选择多种语言来进行开...
Resolves a vulnerability in the DHTML Editing Component ActiveX control in which an attacker could use a specially crafted Web page that could allow remote code execution.
Installing the control will add a "DHTML Editing Component" entry to the Add or Remove Programs application in the Windows Control Panel. After the Windows Vista versions of the binary components are installed, the user experience with the DHTML Editing Control for Application and TriEdit will be...
DHTML Editing Control (Safe for Scripting). This version of the control is marked safe to script, and can be used to provide visual editing of HTML content when browsing a web site in the Internet Explorer browser. The component GUID for this flavor of the control is: 2D360201-FFF5-11d...
Sigma grid-Ajax editable data grid v.2.0.1Written in pure javascript, Sigma Grid is an Ajax data grid for displaying and inline editing data in a scrollable and sortable table.Pure javascript codes. Inline editing, keyboard data navigation, nested multiline headers, sortable and frozen ... Sig...
DHTML Editing Control (Safe for Scripting). This version of the control is marked safe to script, and can be used to provide visual editing of HTML content when browsing a web site in the Internet Explorer browser. The component GUID for this flavor of the control is: 2D360201-FFF5-11d...
Resolves a vulnerability in the DHTML Editing Component ActiveX control in which an attacker could use a specially crafted Web page that could allow remote code execution.
Resolves a vulnerability in the DHTML Editing Component ActiveX control in which an attacker could use a specially crafted Web page that could allow remote code execution.
Resolves a vulnerability in the DHTML Editing Component ActiveX control in which an attacker could use a specially crafted Web page that could allow remote code execution.