Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
spdr vulnerabilities and exploits
(subscribe to this query)
6.8
CVSSv2
CVE-2008-4048
Heap-based buffer overflow in a certain ActiveX control in fwRemoteCfg.dll 3.3.3.1 in Friendly Technologies FriendlyPPPoE Client 3.0.0.57 allows remote malicious users to execute arbitrary code via a long third argument to the CreateURLShortcut method.
Friendly Technologies Friendly Pppoe Client 3.0.0.57
1 EDB exploit
6.8
CVSSv2
CVE-2008-4049
A certain ActiveX control in fwRemoteCfg.dll 3.3.3.1 in Friendly Technologies FriendlyPPPoE Client 3.0.0.57 allows remote malicious users to execute arbitrary programs via arguments to the RunApp method.
Friendly Technologies Friendly Pppoe Client 3.0.0.57
1 EDB exploit
9.3
CVSSv2
CVE-2008-4050
A certain ActiveX control in fwRemoteCfg.dll 3.3.3.1 in Friendly Technologies FriendlyPPPoE Client 3.0.0.57 allows remote malicious users to (1) create and read arbitrary registry values via the RegistryValue method, and (2) read arbitrary files via the GetTextFile method.
Friendly Technologies Friendly Pppoe Client 3.0.0.57
1 EDB exploit
4.3
CVSSv2
CVE-2008-7135
toolbaru.dll in ICQ Toolbar (ICQToolbar) 2.3 allows remote malicious users to cause a denial of service (toolbar crash) via a long argument to the IsChecked method, a different vector than CVE-2008-7136.
Icq Icq Toolbar 2.3
1 EDB exploit
4.3
CVSSv2
CVE-2008-7136
toolbaru.dll in ICQ Toolbar (ICQToolbar) 2.3 allows remote malicious users to cause a denial of service (toolbar crash) via a long argument to the (1) RequestURL, (2) GetPropertyById, or (3) SetPropertyById method, different vectors than CVE-2008-7135.
Icq Icq Toolbar 2.3
1 EDB exploit
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2023-49223
CVE-2024-0044
information disclosure
CVE-2024-35753
HTML injection
CVE-2024-21306
CVE-2024-35733
SQL injection
CVE-2024-35732
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started