[Forgot Password]
Login  Register Subscribe

30389

 
 

423868

 
 

247085

 
 

909

 
 

194218

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

ActiveX Object Memory Corruption Vulnerability

ID: oval:org.mitre.oval:def:5481Date: (C)2008-02-13   (M)2022-10-10
Class: VULNERABILITYFamily: windows




Stack-based buffer overflow in certain ActiveX controls in (1) FPOLE.OCX 6.0.8450.0 and (2) Foxtlib.ocx, as used in the Microsoft Visual FoxPro 6.0 fpole 1.0 Type Library; and Internet Explorer 5.01, 6 SP1 and SP2, and 7; allows remote attackers to execute arbitrary code via a long first argument to the FoxDoCmd function.

Platform:
Microsoft Windows 2000
Microsoft Windows XP
Microsoft Windows Server 2003
Microsoft Windows Vista
Product:
Microsoft Internet Explorer
Reference:
CVE-2007-4790
CVE    1
CVE-2007-4790
CPE    22
cpe:/o:microsoft:windows_xp
cpe:/a:microsoft:ie:5
cpe:/o:microsoft:windows_2003_server::sp1:itanium
cpe:/a:microsoft:ie:5.00.3700.1000
...

© SecPod Technologies