VYPR

CWE-623

Unsafe ActiveX Control Marked Safe For Scripting

VariantDraft

Description

An ActiveX control is intended for restricted use, but it has been marked as safe-for-scripting.

This might allow attackers to use dangerous functionality via a web page that accesses the control, which can lead to different resultant vulnerabilities, depending on the control's behavior.

Hierarchy (View 1000)

Parents

Children

none

CVEs mapped to this weakness (2)

CVESevRiskCVSSEPSSKEVPublishedDescription
CVE-2011-10028Hig0.650.63Aug 20, 2025The RealNetworks RealArcade platform includes an ActiveX control (InstallerDlg.dll, version 2.6.0.445) that exposes a method named Exec via the StubbyUtil.ProcessMgr COM object. This method allows remote attackers to execute arbitrary commands on a victim's Windows machine without proper validation or restrictions. This platform was sometimes referred to or otherwise known as RealArcade or Arcade Games and has since consolidated with RealNetworks' platform, GameHouse.
CVE-2014-23680.000.01Jul 19, 2014The BrowseFolder method in the bwocxrun ActiveX control in Advantech WebAccess before 7.2 allows remote attackers to read arbitrary files via a crafted call.