HP.LoadRunner.micWebAjax.dll.ActiveX.Control.Code.Execution
Description
This indicates an attack attempt to exploit a remote Code Execution vulnerability in HP LoadRunner.
The vulnerability, which is located in the "micWebAjax.dll" ActiveX control, can be exploited through misuse of a vulnerable method. An attacker can exploit this by tricking an unsuspecting user into visiting a malicious webpage and execute arbitrary code within the context of the application.
Affected Products
HP LoadRunner v11.52 and earlier versions
Impact
System Compromise: Remote attackers can gain control of vulnerable systems.
Recommended Actions
Apply the most recent upgrade or patch from the vendor.
https://h20566.www2.hp.com/portal/site/hpsc/template.PAGE/public/kb/docDisplay/?spf_p.tpst=kbDocDisplay&spf_p.prp_kbDocDisplay=wsrp-navigationalState%3DdocId%253Demr_na-c03862772-2%257CdocLocale%253D%257CcalledBy%253D&javax.portlet.begCacheTok=com.vignette.cachetoken&javax.portlet.endCacheTok=com.vignette.cachetoken
Telemetry
Coverage
IPS (Regular DB) | |
IPS (Extended DB) |