Vulmon
Recent Vulnerabilities
Product List
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
akamai download manager 2.2.0.0 vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2008-1770
CRLF injection vulnerability in Akamai Download Manager ActiveX control prior to 2.2.3.6 allows remote malicious users to force the download and execution of arbitrary files via a URL parameter containing an encoded LF followed by a malicious target line.
Akamai Download Manager 2.0.4.4
Akamai Download Manager 2.2.0.0
Akamai Download Manager 2.2.1.0
Akamai Download Manager
1 EDB exploit
NA
CVE-2009-2582
Stack-based buffer overflow in manager.exe in Akamai Download Manager (aka DLM or dlmanager) prior to 2.2.4.8 allows remote web servers to execute arbitrary code via a malformed HTTP response during a Redswoosh download, a different vulnerability than CVE-2007-1891 and CVE-2007-1...
Akamai Technologies Download Manager
Akamai Technologies Download Manager 2.0.4.4
Akamai Technologies Download Manager 2.2.3.6
Akamai Technologies Download Manager 2.2.1.0
Akamai Technologies Download Manager 2.2.0.0
Akamai Technologies Download Manager 2.2.3.5
NA
CVE-2007-1891
Stack-based buffer overflow in the GetPrivateProfileSectionW function in Akamai Technologies Download Manager ActiveX Control (DownloadManagerV2.ocx) after 2.0.4.4 but prior to 2.2.1.0 allows remote malicious users to execute arbitrary code, related to misinterpretation of the nS...
Akamai Technologies Download Manager 2.2.0.0
NA
CVE-2007-1892
Stack-based buffer overflow in Akamai Technologies Download Manager ActiveX Control (DownloadManagerV2.ocx) prior to 2.2.1.0 allows remote malicious users to execute arbitrary code via unspecified vectors, a different issue than CVE-2007-1891.
Akamai Technologies Download Manager 2.2.0.0
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
type confusion
IMAP
CVE-2024-36103
CVE-2024-28995
CVE-2024-37325
CVE-2024-30078
CVE-2024-30082
SQL injection
CVE-2024-30052
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started