Monitor vulnerabilities like this one.
Sign up free to get alerted when software you use is affected.
8.8
Microsoft Windows Video ActiveX Control Lets Attackers Run Malicious Code
Known exploited
Exploitation likelihood: 81%
CVE-2008-0015
CVE-2008-0015
Summary
A security flaw in the Microsoft Windows Video ActiveX Control could allow hackers to take control of a user's computer if they visit a malicious website. This could let the hacker do anything the user can do on the computer, including accessing sensitive information or installing malware. Update your software to fix this issue.
What to do
No fix is available yet. Check with your software vendor for updates.
Affected software
| Vendor | Product | Affected versions | Fix available |
|---|---|---|---|
| microsoft | windows | All versions | – |
| microsoft | windows_2003_server | All versions | – |
| microsoft | windows_2003_server | All versions | – |
| microsoft | windows_2003_server | All versions | – |
| microsoft | windows_xp | All versions | – |
| microsoft | windows_xp | All versions | – |
| microsoft | windows_xp | All versions | – |
Original title
Microsoft Windows Video ActiveX Control Remote Code Execution Vulnerability
Original description
Microsoft Windows Video ActiveX Control contains a remote code execution vulnerability. An attacker could exploit the vulnerability by constructing a specially crafted Web page. When a user views the Web page, the vulnerability could allow remote code execution. An attacker who successfully exploited this vulnerability could gain the same user rights as the logged-on user.
Vulnerability type
CWE-119
Buffer Overflow
CWE-121
Stack-based Buffer Overflow
- http://osvdb.org/55651
- http://blogs.technet.com/srd/archive/2009/08/11/ms09-037-why-we-are-using-cve-s-...
- http://isc.sans.org/diary.html?storyid=6733 Exploit
- http://secunia.com/advisories/36187
- http://www.csis.dk/dk/nyheder/nyheder.asp?tekstID=799 Exploit
- http://www.iss.net/threats/329.html Exploit
- http://www.kb.cert.org/vuls/id/180513 US Government Resource
- http://www.microsoft.com/technet/security/advisory/972890.mspx Vendor Advisory
- http://www.securityfocus.com/bid/35558
- http://www.securityfocus.com/bid/35585
- http://www.securitytracker.com/id?1022514
- http://www.us-cert.gov/cas/techalerts/TA09-187A.html US Government Resource
- http://www.us-cert.gov/cas/techalerts/TA09-195A.html US Government Resource
- http://www.us-cert.gov/cas/techalerts/TA09-223A.html US Government Resource
- http://www.vupen.com/english/advisories/2009/2232
- https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-03...
- https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-03...
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3...
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3...
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3...
- https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2008-...
Published: 17 Feb 2026 · Updated: 15 Mar 2026 · First seen: 6 Mar 2026