Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%
Get alerts for future matching vulnerabilitiesLog in to subscribe
I. Basic Information for CVE-2006-5559
Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Description
The Execute method in the ADODB.Connection 2.7 and 2.8 ActiveX control objects (ADODB.Connection.2.7 and ADODB.Connection.2.8) in the Microsoft Data Access Components (MDAC) 2.5 SP3, 2.7 SP1, 2.8, and 2.8 SP1 does not properly track freed memory when the second argument is a BSTR, which allows remote attackers to cause a denial of service (Internet Explorer crash) and possibly execute arbitrary code via certain strings in the second and third arguments.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Title
Microsoft IE ADODB.Connection对象Execute函数内存破坏漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Internet Explorer是微软发布的非常流行的WEB浏览器。 IE中ADODB.Connection ActiveX对象的Execute()函数存在内存破坏漏洞,远程攻击者可以通过诱骗用户访问恶意WEB页面或HTML文档导致浏览器崩溃或执行任意代码。 Execute()函数允许恶意脚本以绕过脚本解释程序内存管理器的方式释放堆内存。Execute的第二个参数是一个变量,传送给了VariantClear,如果变量代表BSTR的话就会使用SysFreeString释放相关的字符串内存。脚本解释程序无法
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)
Affected Products
VendorProductAffected VersionsCPESubscribe
-n/a n/a -
II. Public POCs for CVE-2006-5559
#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC
III. Intelligence Information for CVE-2006-5559
Please Login to view more intelligence information
IV. Related Vulnerabilities
V. Comments for CVE-2006-5559

No comments yet


Leave a comment