Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
microsoft activex vulnerabilities and exploits
(subscribe to this query)
935
VMScore
CVE-2007-2238
Multiple stack-based buffer overflows in the Whale Client Components ActiveX control (WhlMgr.dll), as used in Microsoft Intelligent Application Gateway (IAG) prior to 3.7 SP2, allow remote malicious users to execute arbitrary code via long arguments to the (1) CheckForUpdates or ...
Microsoft Intelligent Application Gateway 2007
1 EDB exploit
935
VMScore
CVE-2008-4388
The LaunchObj ActiveX control prior to 5.2.2.865 in launcher.dll in Symantec AppStream Client 5.2.x prior to 5.2.2 SP3 MP1 does not properly validate downloaded files, which allows remote malicious users to execute arbitrary code via the installAppMgr method and unspecified other...
Symantec Appstream Client 5.2
1 EDB exploit
935
VMScore
CVE-2008-4255
Heap-based buffer overflow in mscomct2.ocx (aka Windows Common ActiveX control or Microsoft Animation ActiveX control) in Microsoft Visual Basic 6.0, Visual Studio .NET 2002 SP1 and 2003 SP1, Visual FoxPro 8.0 SP1 and 9.0 SP1 and SP2, and Office Project 2003 SP3 and 2007 Gold and...
Microsoft Visual Studio .net 2002
Microsoft Visual Studio .net 2003
Microsoft Visual Basic 6.0
Microsoft Project 2007
Microsoft Office Frontpage 2002
Microsoft Project 2003
Microsoft Visual Foxpro 8.0
Microsoft Visual Foxpro 9.0
1 EDB exploit
935
VMScore
CVE-2008-5232
Buffer overflow in the CallHTMLHelp method in the Microsoft Windows Media Services ActiveX control in nskey.dll 4.1.00.3917 in Windows Media Services on Microsoft Windows NT and 2000, and Avaya Media and Message Application servers, allows remote malicious users to execute arbitr...
Microsoft Windows 2000 -
Microsoft Windows Nt 4.0
1 EDB exploit
935
VMScore
CVE-2008-4699
Insecure method vulnerability in the ActiveX control (PAWWeb11.ocx) in Peachtree Accounting 2004 allows remote malicious users to execute arbitrary programs via the ExecutePreferredApplication method.
Microsoft Peachtree Accounting 2004
1 EDB exploit
935
VMScore
CVE-2008-2959
Buffer overflow in a certain ActiveX control (vb6skit.dll) in Microsoft Visual Basic Enterprise Edition 6.0 SP6 might allow remote malicious users to execute arbitrary code via a long lpstrLinkPath argument to the fCreateShellLink function.
Microsoft Visual Basic Enterprise Edition 6.0
1 EDB exploit
935
VMScore
CVE-2008-0551
The NamoInstaller.NamoInstall.1 ActiveX control in NamoInstaller.dll 3.0.0.1 and previous versions in Namo Web Editor in Sejoong Namo ActiveSquare 6 allows remote malicious users to execute arbitrary code via a URL in the argument to the Install method. NOTE: some of these detail...
Sejoong Namo Activesquare 6
Microsoft Activex
1 EDB exploit
935
VMScore
CVE-2008-0470
A certain ActiveX control in Comodo AntiVirus 2.0 allows remote malicious users to execute arbitrary commands via the ExecuteStr method.
Comodo Comodo Antivirus 2.0
Microsoft Activex
1 EDB exploit
935
VMScore
CVE-2007-6387
Multiple stack-based buffer overflows in the awApi4.AnswerWorks.1 ActiveX control in awApi4.dll 4.0.0.42, as used by Vantage Linguistics AnswerWorks, and Intuit Clearly Bookkeeping, ProSeries, QuickBooks, Quicken, QuickTax, and TurboTax, allow remote malicious users to execute ar...
Intuit Quicken
Intuit Quicktax
Intuit Bookkeeping
Vantage Linquistics Answerworks
Intuit Turbo Tax
Microsoft Activex 4.0.0.42
Intuit Proseries
Intuit Quickbooks
1 EDB exploit
935
VMScore
CVE-2007-6332
The HPInfoDLL.HPInfo.1 ActiveX control in HPInfoDLL.dll 1.0, as shipped with HP Info Center (hpinfocenter.exe) 1.0.1.1 in HP Quick Launch Button (QLBCTRL.exe, aka QLB) 6.3 and previous versions, on Microsoft Windows before Vista allows remote malicious users to create or modify a...
Hp Info Center 1.0.1.1
Hp Quick Launch Button
1 EDB exploit
VMScore
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2023-40673
CVE-2024-36674
CVE-2024-27348
unspecified
CVE-2024-24919
CVE-2024-4870
malicious code
CVE-2024-2019
hard-coded
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
8
9
NEXT »