Home

Description

activePDF WebGrabber version 3.8.2.0 contains a stack-based buffer overflow vulnerability in the GetStatus() method of the APWebGrb.ocx ActiveX control. By passing an overly long string to this method, a remote attacker can execute arbitrary code in the context of the vulnerable process. Although the control is not marked safe for scripting, exploitation is possible via crafted HTML content in Internet Explorer under permissive security settings.

PUBLISHED Reserved 2025-08-28 | Published 2025-08-30 | Updated 2025-09-16 | Assigner VulnCheck




HIGH: 7.5CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N

Problem types

CWE-121 Stack-based Buffer Overflow

Product status

Default status
unaffected

*
affected

Credits

MC finder

References

raw.githubusercontent.com/...eformat/activepdf_webgrabber.rb exploit

www.exploit-db.com/exploits/16635 exploit

web.archive.org/...f.com/products/serverproducts/webgrabber/ product

support.activepdf.com/support/solutions/35000139131 product

documentation.activepdf.com/...llation/New_Installation.html product

www.vulncheck.com/...grabber-activex-control-buffer-overflow third-party-advisory

cve.org (CVE-2008-20001)

nvd.nist.gov (CVE-2008-20001)

Download JSON