Executive Summary
Informations | |||
---|---|---|---|
Name | CVE-2007-0319 | First vendor Publication | 2007-08-15 |
Vendor | Cve | Last vendor Modification | 2024-11-21 |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:N/AC:M/Au:N/C:P/I:P/A:P) | |||
---|---|---|---|
Cvss Base Score | 6.8 | Attack Range | Network |
Cvss Impact Score | 6.4 | Attack Complexity | Medium |
Cvss Expoit Score | 8.6 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
Multiple stack-based buffer overflows in the Motive ActiveEmailTest.EmailData (ActiveUtils EmailData) ActiveX control in ActiveUtils.dll in Motive Service Activation Manager 5.1 and Self Service Manager 5.1 and earlier allow remote attackers to execute arbitrary code via unspecified vectors. |
Original Source
Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0319 |
CPE : Common Platform Enumeration
Type | Description | Count |
---|---|---|
Application | 1 | |
Application | 1 |
OpenVAS Exploits
Date | Description |
---|---|
2010-07-08 | Name : Cumulative Security Update for Internet Explorer (937143) File : nvt/ms07-045.nasl |
Open Source Vulnerability Database (OSVDB)
Id | Description |
---|---|
37710 | Motive Service Activation Manager ActiveEmailTest.EmailData ActiveX (ActiveUt... |
Snort® IPS/IDS
Date | Description |
---|---|
2014-01-10 | Microsoft Internet Explorer CSS strings parsing memory corruption attempt RuleID : 17645 - Revision : 9 - Type : BROWSER-IE |
2014-01-10 | Microsoft Package and Deployment Wizard ActiveX function call unicode access RuleID : 13324 - Revision : 7 - Type : WEB-ACTIVEX |
2014-01-10 | Microsoft Package and Deployment Wizard ActiveX function call access RuleID : 13323 - Revision : 11 - Type : BROWSER-PLUGINS |
2014-01-10 | Microsoft Package and Deployment Wizard ActiveX clsid unicode access RuleID : 13322 - Revision : 7 - Type : WEB-ACTIVEX |
2014-01-10 | Microsoft Package and Deployment Wizard ActiveX clsid access RuleID : 13321 - Revision : 17 - Type : BROWSER-PLUGINS |
2014-01-10 | Microsoft Internet Explorer CSS memory corruption exploit RuleID : 12277 - Revision : 19 - Type : BROWSER-IE |
2014-01-10 | Microsoft Visual Basic 6 TypeLibInfo ActiveX function call unicode access RuleID : 12276 - Revision : 6 - Type : WEB-ACTIVEX |
2014-01-10 | Microsoft Visual Basic 6 TypeLibInfo ActiveX function call access RuleID : 12275 - Revision : 9 - Type : BROWSER-PLUGINS |
2014-01-10 | Microsoft Visual Basic 6 TypeLibInfo ActiveX clsid unicode access RuleID : 12274 - Revision : 6 - Type : WEB-ACTIVEX |
2014-01-10 | Microsoft Visual Basic 6 TypeLibInfo ActiveX clsid access RuleID : 12273 - Revision : 10 - Type : BROWSER-PLUGINS |
2014-01-10 | Microsoft Visual Basic 6 TLIApplication ActiveX function call unicode access RuleID : 12272 - Revision : 8 - Type : WEB-ACTIVEX |
2014-01-10 | Microsoft Visual Basic 6 TLIApplication ActiveX function call access RuleID : 12271 - Revision : 8 - Type : WEB-ACTIVEX |
2014-01-10 | Microsoft Visual Basic 6 TLIApplication ActiveX function call RuleID : 12270 - Revision : 16 - Type : BROWSER-PLUGINS |
2014-01-10 | Microsoft Visual Basic 6 TLIApplication ActiveX clsid access RuleID : 12269 - Revision : 19 - Type : BROWSER-PLUGINS |
2014-01-10 | Microsoft Visual Basic 6 SearchHelper ActiveX function call unicode access RuleID : 12268 - Revision : 7 - Type : WEB-ACTIVEX |
2014-01-10 | Microsoft Visual Basic 6 SearchHelper ActiveX function call access RuleID : 12267 - Revision : 10 - Type : BROWSER-PLUGINS |
2014-01-10 | Microsoft Visual Basic 6 SearchHelper ActiveX clsid unicode access RuleID : 12266 - Revision : 7 - Type : WEB-ACTIVEX |
2014-01-10 | Microsoft Visual Basic 6 SearchHelper ActiveX clsid access RuleID : 12265 - Revision : 11 - Type : BROWSER-PLUGINS |
2014-01-10 | Microsoft Visual Basic 6 PDWizard.File ActiveX function call unicode access RuleID : 12264 - Revision : 6 - Type : WEB-ACTIVEX |
2014-01-10 | Microsoft Visual Basic 6 PDWizard.File ActiveX function call access RuleID : 12263 - Revision : 9 - Type : BROWSER-PLUGINS |
2014-01-10 | Microsoft Visual Basic 6 PDWizard.File ActiveX clsid unicode access RuleID : 12262 - Revision : 6 - Type : WEB-ACTIVEX |
2014-01-10 | Microsoft Visual Basic 6 PDWizard.File ActiveX clsid access RuleID : 12261 - Revision : 10 - Type : BROWSER-PLUGINS |
Nessus® Vulnerability Scanner
Date | Description |
---|---|
2007-08-14 | Name : Arbitrary code can be executed on the remote host through the web client. File : smb_nt_ms07-045.nasl - Type : ACT_GATHER_INFO |
Sources (Detail)
Alert History
Date | Informations |
---|---|
2024-11-28 23:16:33 |
|
2024-11-28 12:11:18 |
|
2021-05-04 12:05:15 |
|
2021-04-22 01:05:50 |
|
2020-05-23 00:19:08 |
|
2018-10-13 00:22:36 |
|
2017-07-29 12:01:57 |
|
2016-06-28 16:06:09 |
|
2016-04-26 15:38:48 |
|
2014-02-17 10:38:43 |
|
2013-07-14 17:18:34 |
|
2013-05-11 00:40:55 |
|