Solved

Issues with Version 5.x Scripting engines from Microsoft?

Posted on 2001-07-30
3
246 Views
Last Modified: 2010-04-11
Hello,
 We have a number of NT4 servers runing the IIS that comes with the NT option pack. We would like to run a more recent version of the VB Scripting engine (to get the class support). The IIS 4.0 scripting engine is version 3 I think, but its possible to download and install a later scripting engine from microsoft from http://msdn.microsoft.com/scripting.  

So the question is - are there any know security implications with doing this? Are there any know problems related to the version 5.x scripting engines? I have searched around, but mostly references to version 5.x scripting engines are related to IIS 5.0 and Win2k, we would like to continue to run NT 4.0 at least for the next few months.

Thanks in adavnce,
Nicholas Waltham
0
Comment
Question by:nwaltham
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
3 Comments
 
LVL 12

Expert Comment

by:Housenet
ID: 6334028
-I personally have never heard of a security issue , or any other issue as a matter of fact related to the version of the scripting engine running on an NT machine.
0
 
LVL 12

Accepted Solution

by:
Otta earned 50 total points
ID: 6336788
> are there any known security implications with doing this?

Yes, you can "improve" your security by upgrading to the most-current version of the software.
Since it is a "free" upgrade, it's likely that the older
versions don't get as much attention from Microsoft's
software developers -- only the newest version gets all(!)
of the "security-related" patches.
0
 

Author Comment

by:nwaltham
ID: 6355628
Thanks for your help,
0

Featured Post

Transaction Monitoring Vs. Real User Monitoring

Synthetic Transaction Monitoring Vs. Real User Monitoring: When To Use Each Approach? In this article, we will discuss two major monitoring approaches: Synthetic Transaction and Real User Monitoring.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Keystroke loggers have been around for a very long time. While the threat is old, some of the remedies are new!
Uncontrolled local administrators groups within any organization pose a huge security risk. Because these groups are locally managed it becomes difficult to audit and maintain them.
With Secure Portal Encryption, the recipient is sent a link to their email address directing them to the email laundry delivery page. From there, the recipient will be required to enter a user name and password to enter the page. Once the recipient …
This video Micro Tutorial shows how to password-protect PDF files with free software. Many software products can do this, such as Adobe Acrobat (but not Adobe Reader), Nuance PaperPort, and Nuance Power PDF, but they are not free products. This vide…

691 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question