Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
microsoft activex vulnerabilities and exploits
(subscribe to this query)
2.6
CVSSv2
CVE-2004-1324
The Microsoft Windows Media Player 9.0 ActiveX control may allow remote malicious users to execute arbitrary web script in the Local computer zone via the (1) artist or (2) song fields of a music file, if the file is processed using Internet Explorer.
Microsoft Windows Media Player 9
1 EDB exploit
7.5
CVSSv2
CVE-2000-0419
The Office 2000 UA ActiveX Control is marked as "safe for scripting," which allows remote malicious users to conduct unauthorized activities via the "Show Me" function in Office Help, aka the "Office 2000 UA Control" vulnerability.
Microsoft Photodraw 2000 1.0
Microsoft Powerpoint 2000
Microsoft Project 2000
Microsoft Access 2000
Microsoft Word 2000
Microsoft Works 2000
Microsoft Office 2000
Microsoft Outlook 2000
Microsoft Excel 2000
Microsoft Frontpage 2000
5.1
CVSSv2
CVE-2006-0003
Unspecified vulnerability in the RDS.Dataspace ActiveX control, which is contained in ActiveX Data Objects (ADO) and distributed in Microsoft Data Access Components (MDAC) 2.7 and 2.8, allows remote malicious users to execute arbitrary code via unknown attack vectors.
Microsoft Data Access Components 2.5
Microsoft Data Access Components 2.8
Microsoft Data Access Components 2.7
3 EDB exploits
2 Articles
9.3
CVSSv2
CVE-2009-1929
Heap-based buffer overflow in the Microsoft Terminal Services Client ActiveX control running RDP 6.1 on Windows XP SP2, Vista SP1 or SP2, or Server 2008 Gold or SP2; or 5.2 or 6.1 on Windows XP SP3; allows remote malicious users to execute arbitrary code via unspecified parameter...
Microsoft Windows 2003 Server Sp2
Microsoft Windows Xp -
Microsoft Windows Server 2008 -
Microsoft Windows Xp
Microsoft Windows Server 2008
Microsoft Windows Vista
Microsoft Windows Vista -
10
CVSSv2
CVE-1999-0702
Internet Explorer 5.0 and 5.01 allows remote malicious users to modify or execute files via the Import/Export Favorites feature, aka the "ImportExportFavorites" vulnerability.
Microsoft Internet Explorer 4.0.1
Microsoft Internet Explorer 5.0
1 EDB exploit
7.5
CVSSv2
CVE-2007-3493
A certain ActiveX control in NCTWavChunksEditor2.dll 2.6.1.148 in NCTAudioStudio (NCTAudioStudio2) 2.7, as used by Sienzo DMM and probably other products, allows remote malicious users to create or overwrite arbitrary files via a full pathname in the argument to the CreateFile me...
Microsoft Internet Explorer 7.0
Nctsoft Products Nctaudiostudio 2.7
Nctsoft Products Nctwavchunkseditor2.dll 2.6.1.148
1 EDB exploit
9.3
CVSSv2
CVE-2006-4695
Unspecified vulnerability in certain COM objects in Microsoft Office Web Components 2000 allows user-assisted remote malicious users to execute arbitrary code via a crafted URL, aka "Office Web Components URL Parsing Vulnerability."
Microsoft Office Web Components 2000
5
CVSSv2
CVE-2008-0090
A certain ActiveX control in npUpload.dll in DivX Player 6.6.0 allows remote malicious users to cause a denial of service (Internet Explorer 7 crash) via a long argument to the SetPassword method.
Divx Divx Player 6.6.0
Microsoft Internet Explorer 7
1 EDB exploit
4.3
CVSSv2
CVE-2017-0242
An information disclosure vulnerability exists in the way some ActiveX objects are instantiated, aka "Microsoft ActiveX Information Disclosure Vulnerability."
Microsoft Windows Server 2008 -
Microsoft Windows 7 -
Microsoft Windows Server 2008 R2
9.3
CVSSv2
CVE-2009-2519
The DHTML Editing Component ActiveX control in Microsoft Windows 2000 SP4, XP SP2 and SP3, and Server 2003 SP2 does not properly format HTML markup, which allows remote malicious users to execute arbitrary code via a crafted web site that triggers "system state" corrupt...
Microsoft Windows 2000 -
Microsoft Windows Xp
Microsoft Windows Xp -
Microsoft Windows Server 2003
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-3380
CVE-2024-1694
local file inclusion
CVE-2024-5645
CVE-2024-24919
XSS
CVE-2024-36774
CVE-2024-21306
SQL
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
4
5
6
7
8
9
10
NEXT »