Multiple stack-based buffer overflows in the Oracle JInitiator ActiveX control (beans.ocx) 1.1.8.16 and earlier, as used by Oracle Forms applications from Oracle and third parties, allow remote attackers to execute arbitrary code via unspecified “initialization parameters.” NOTE: it was later reported that 1.1.8.3 through 1.1.8.25, and probably 1.1.5.x and 1.1.7.x, are affected.
osvdb.org/37711
secunia.com/advisories/26644
securitytracker.com/id?1018618
www.integrigy.com/security-resources/analysis/integrigy-oracle-jinitiator-vulnerability.pdf
www.kb.cert.org/vuls/id/474433
www.securityfocus.com/archive/1/479186/100/100/threaded
www.securityfocus.com/bid/25473
www.vupen.com/english/advisories/2007/3007
exchange.xforce.ibmcloud.com/vulnerabilities/36310