Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
elazar vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2008-0220
Multiple stack-based buffer overflows in the WebLaunch.WeblaunchCtl.1 (aka CWebLaunchCtl) ActiveX control in weblaunch.ocx 1.0.0.1 in Gateway Weblaunch allow remote malicious users to execute arbitrary code via a long string in the (1) second or (2) fourth argument to the DoWebLa...
Gateway Cweblaunchctl Activex Control 1.0.0.1
Gateway Weblaunch
2 EDB exploits
NA
CVE-2007-4474
Multiple stack-based buffer overflows in the IBM Lotus Domino Web Access ActiveX control, as provided by inotes6.dll, inotes6w.dll, dwa7.dll, and dwa7w.dll, in Domino 6.x and 7.x allow remote malicious users to execute arbitrary code, as demonstrated by an overflow from a long Ge...
Ibm Domino Web Access 6.0.1.1
Ibm Domino Web Access 6.0.2
Ibm Domino Web Access 6.5.3
Ibm Domino Web Access 6.5.4
Ibm Domino Web Access 6.0
Ibm Domino Web Access 6.0.1
Ibm Domino Web Access 6.5.1
Ibm Domino Web Access 6.5.2
Ibm Lotus Domino Web Access 7.0.34.1
Ibm Domino Web Access 6.0.3
Ibm Domino Web Access 6.0.4
Ibm Domino Web Access 6.5.5
Ibm Domino Web Access 7.0
Ibm Domino Web Access 6.0.5
Ibm Domino Web Access 6.5
Ibm Domino Web Access 7.0.1
Ibm Lotus Domino Web Access 7.0.1
4 EDB exploits
NA
CVE-2007-6654
Buffer overflow in a certain ActiveX control in Macrovision InstallShield Update Service Web Agent 5.1.100.47363 allows remote malicious users to execute arbitrary code via a long string in the ProductCode argument (second argument) to the DownloadAndExecute method, a different v...
Macrovision Update Service 5.1.100 47363
1 EDB exploit
NA
CVE-2008-0221
Directory traversal vulnerability in the WebLaunch.WeblaunchCtl.1 (aka CWebLaunchCtl) ActiveX control in weblaunch.ocx 1.0.0.1 in Gateway Weblaunch allows remote malicious users to execute arbitrary programs via a ..\ (dot dot backslash) in the second argument to the DoWebLaunch ...
Gateway Weblaunch 1.0.0.1
1 EDB exploit
NA
CVE-2008-4587
Insecure method vulnerability in the MSVNClientDownloadManager61Lib.DownloadManager.1 ActiveX control (ISDM.exe 6.1.100.61372) in Macrovision FLEXnet Connect 6.1 allows remote malicious users to force the download and execution of arbitrary files via the AddFile and RunScheduledJ...
Acresso Flexnet Connect 6.1
1 EDB exploit
NA
CVE-2007-5941
Stack-based buffer overflow in the SWCtl.SWCtl ActiveX control in Adobe Shockwave allows remote malicious users to cause a denial of service and possibly execute arbitrary code via a long argument to the ShockwaveVersion method.
Adobe Shockwave Player
1 EDB exploit
NA
CVE-2008-0443
Heap-based buffer overflow in the FileUploader.FUploadCtl.1 ActiveX control in FileUploader.dll 2.0.0.2 in Lycos FileUploader Module allows remote malicious users to execute arbitrary code via a long HandwriterFilename property value. NOTE: some of these details are obtained from...
Lycos Fileuploader.dll 2.0.2
1 EDB exploit
NA
CVE-2008-4586
Insecure method vulnerability in the MVSNCLientWebAgent61.WebAgent.1 ActiveX control (isusweb.dll 6.1.100.61372) in Macrovision FLEXnet Connect 6.1 allows remote malicious users to force the download and execution of arbitrary files via the DownloadAndExecute method.
Acresso Flexnet Connect 6.1
1 EDB exploit
NA
CVE-2008-0248
Buffer overflow in an ActiveX control in ccpm_0237.dll for StreamAudio ChainCast ProxyManager allows remote malicious users to execute arbitrary code via a long URL argument to the InternalTuneIn method.
Streamaudio Chaincast Proxymanager Activex Control
1 EDB exploit
NA
CVE-2008-0625
Buffer overflow in the MediaGrid ActiveX control (mediagrid.dll) in Yahoo! Music Jukebox 2.2.2.56 allows remote malicious users to execute arbitrary code via a long argument to the AddBitmap method.
Yahoo Music Jukebox 2.2.2.56
1 EDB exploit
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-22460
CVE-2024-4646
CVE-2024-29212
IMAP
CVE-2023-36672
CVE-2024-34547
command injection
CVE-2024-4651
stored XSS
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
3
4
NEXT »