CVE-2019-19164 – Dext5 Upload ActiveX Arbitrary File Execution Vulnerability
https://notcve.org/view.php?id=CVE-2019-19164
dext5.ocx ActiveX Control in Dext5 Upload 5.0.0.112 and earlier versions contains a vulnerability that could allow remote files to be executed by setting the arguments to the activex method. A remote attacker could induce a user to access a crafted web page, causing damage such as malicious code infection. dext5.ocx ActiveX Control en Dext5 Upload versión 5.0.0.112 y versiones anteriores, contiene una vulnerabilidad que podría permitir que archivos remotos sean ejecutados mediante la configuración de los argumentos en el método activex. Un atacante remoto podría inducir a un usuario para que acceda a una página web diseñada, causando un daño tal y como una infección de código malicioso. • http://www.dext5.com/page/support/notice_view.aspx?pSeq=23 https://www.boho.or.kr/krcert/secNoticeView.do?bulletin_writing_sequence=35344 • CWE-20: Improper Input Validation •
CVE-2019-19168
https://notcve.org/view.php?id=CVE-2019-19168
Dext5.ocx ActiveX 5.0.0.116 and eariler versions contain a vulnerability, which could allow remote attacker to download and execute remote arbitrary file by setting the arguments to the activex method. This can be leveraged for code execution. Dext5.ocx ActiveX versiones 5.0.0.116 y anteriores, contiene una vulnerabilidad que podría permitir a un atacante remoto descargar y ejecutar archivos arbitrarios remotos al configurar los argumentos en el método activex. Esto puede ser aprovechado para una ejecución de código. • http://www.dext5.com/page/support/notice_view.aspx?pSeq=26 https://www.krcert.or.kr/krcert/secNoticeView.do?bulletin_writing_sequence=35352 •
CVE-2019-19169
https://notcve.org/view.php?id=CVE-2019-19169
Dext5.ocx ActiveX 5.0.0.116 and eariler versions contain a vulnerability, which could allow remote attacker to download arbitrary file by setting the arguments to the activex method. This can be leveraged for code execution. Dext5.ocx ActiveX versiones 5.0.0.116 y anteriores, contiene una vulnerabilidad que podría permitir a un atacante remoto descargar un archivo arbitrario al configurar los argumentos en el método activex. Esto puede ser aprovechado para una ejecución de código. • http://www.dext5.com/page/support/notice_view.aspx?pSeq=26 https://www.krcert.or.kr/krcert/secNoticeView.do?bulletin_writing_sequence=35353 •
CVE-2007-6387 – Vantage Linguistics AnswerWorks 4 - API ActiveX Control Buffer Overflow
https://notcve.org/view.php?id=CVE-2007-6387
Multiple stack-based buffer overflows in the awApi4.AnswerWorks.1 ActiveX control in awApi4.dll 4.0.0.42, as used by Vantage Linguistics AnswerWorks, and Intuit Clearly Bookkeeping, ProSeries, QuickBooks, Quicken, QuickTax, and TurboTax, allow remote attackers to execute arbitrary code via long arguments to the (1) GetHistory, (2) GetSeedQuery, (3) SetSeedQuery, and possibly other methods. NOTE: some of these details are obtained from third party information. Múltiples desbordamientos de búfer basados en pila en el control ActiveX awApi4.AnswerWorks.1 en awApi4.dll 4.0.0.42, como el utilizado por Vantage Linguistics AnswerWorks, y Intuit Clearly Bookkeeping, ProSeries, QuickBooks, Quicken, QuickTax, y TurboTax, permite a atacantes remotos ejecutar código de su elección mediante argumentos largos a (1) GetHistory, (2) GetSeedQuery, (3) SetSeedQuery, y posiblemente otros métodos. NOTA: algunos de estos detalles se han obtenido de información de terceros. • https://www.exploit-db.com/exploits/4825 http://secunia.com/advisories/26566 http://secunia.com/advisories/26670 http://support.quickbooks.intuit.com/support/qbupdate2007/Default.aspx http://www.intuit.com/support/security http://www.securityfocus.com/bid/26815 http://www.vantagelinguistics.com/answerworks/release http://www.vupen.com/english/advisories/2007/4194 http://www.vupen.com/english/advisories/2007/4195 https://exchange.xforce.ibmcloud.com/vulnerabilities/39004 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •