Vulmon
Recent Vulnerabilities
Product List
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
microsoft activex vulnerabilities and exploits
(subscribe to this query)
NA
CVE-1999-0669
The Eyedog ActiveX control is marked as "safe for scripting" for Internet Explorer, which allows a remote malicious user to execute arbitrary commands as demonstrated by Bubbleboy.
Microsoft Internet Explorer 4.0
Microsoft Internet Explorer 5.0
1 EDB exploit
NA
CVE-2002-0647
Buffer overflow in a legacy ActiveX control used to display specially formatted text in Microsoft Internet Explorer 5.01, 5.5, and 6.0 allows remote malicious users to execute arbitrary code, aka "Buffer Overrun in Legacy Text Formatting ActiveX Control".
Microsoft Internet Explorer 5.01
Microsoft Internet Explorer 5.5
Microsoft Internet Explorer 6.0
1 EDB exploit
NA
CVE-2008-5232
Buffer overflow in the CallHTMLHelp method in the Microsoft Windows Media Services ActiveX control in nskey.dll 4.1.00.3917 in Windows Media Services on Microsoft Windows NT and 2000, and Avaya Media and Message Application servers, allows remote malicious users to execute arbitr...
Microsoft Windows Nt 4.0
Microsoft Windows 2000 -
1 EDB exploit
NA
CVE-2008-1933
Absolute path traversal vulnerability in a certain ActiveX control in Zune allows user-assisted remote malicious users to overwrite arbitrary files via the SaveToFile method. NOTE: the victim must explicitly allow the code to run.
Microsoft Zune Software
1 EDB exploit
NA
CVE-2006-4685
The XMLHTTP ActiveX control in Microsoft XML Parser 2.6 and XML Core Services 3.0 up to and including 6.0 does not properly handle HTTP server-side redirects, which allows remote user-assisted malicious users to access content from other domains.
Microsoft Xml Core Services 3.0
Microsoft Xml Core Services 4.0
Microsoft Xml Core Services 6.0
Microsoft Xml Parser 2.6
NA
CVE-2009-2493
The Active Template Library (ATL) in Microsoft Visual Studio .NET 2003 SP1, Visual Studio 2005 SP1 and 2008 Gold and SP1, and Visual C++ 2005 SP1 and 2008 Gold and SP1; and Windows 2000 SP4, XP SP2 and SP3, Server 2003 SP2, Vista Gold, SP1, and SP2, and Server 2008 Gold and SP2; ...
Microsoft Visual C++ 2008
Microsoft Visual C++ 2005
Microsoft Windows Xp
Microsoft Windows Server 2008 -
Microsoft Windows 2000
Microsoft Windows Vista -
Microsoft Windows Vista
Microsoft Windows Server 2008
Microsoft Windows 2003 Server
Microsoft Visual Studio 2005
Microsoft Visual Studio 2003
Microsoft Visual Studio 2008
1 Article
NA
CVE-2010-4588
The WBEMSingleView.ocx ActiveX control 1.50.1131.0 in Microsoft WMI Administrative Tools 1.1 and previous versions allows remote malicious users to execute arbitrary code via a crafted argument to the ReleaseContext method, a different vector than CVE-2010-3973, possibly an untru...
Microsoft Wmi Administrative Tools
1 EDB exploit
NA
CVE-2007-0940
Unspecified vulnerability in the Cryptographic API Component Object Model Certificates ActiveX control (CAPICOM.dll) in Microsoft CAPICOM and BizTalk Server 2004 SP1 and SP2 allows remote malicious users to execute arbitrary code via unspecified vectors, aka the "CAPICOM.Cer...
Microsoft Biztalk Server 2004
Microsoft Capicom
NA
CVE-2008-0236
An ActiveX control for Microsoft Visual FoxPro (vfp6r.dll 6.0.8862.0) allows remote malicious users to execute arbitrary commands by invoking the DoCmd method.
Microsoft Visual Foxpro 6.0
1 EDB exploit
NA
CVE-2006-5559
The Execute method in the ADODB.Connection 2.7 and 2.8 ActiveX control objects (ADODB.Connection.2.7 and ADODB.Connection.2.8) in the Microsoft Data Access Components (MDAC) 2.5 SP3, 2.7 SP1, 2.8, and 2.8 SP1 does not properly track freed memory when the second argument is a BSTR...
Microsoft Data Access Components 2.5
Microsoft Data Access Components 2.8
Microsoft Data Access Components 2.7
1 EDB exploit
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-37884
CVE-2024-6003
remote
brute force
information disclosure
CVE-2024-27801
CVE-2024-30078
CVE-2024-31870
CVE-2024-6042
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
8
9
10
NEXT »