Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
microsoft works 8.0 vulnerabilities and exploits
(subscribe to this query)
9.3
CVSSv2
CVE-2008-0105
Microsoft Works 6 File Converter, as used in Office 2003 SP2 and SP3, Works 8.0, and Works Suite 2005, allows remote malicious users to execute arbitrary code via a .wps file with crafted section header index table information, aka "Microsoft Works File Converter Index Table...
Microsoft Office 2003
Microsoft Works 8.0
Microsoft Works 2005
1 EDB exploit
9.3
CVSSv2
CVE-2007-0216
wkcvqd01.dll in Microsoft Works 6 File Converter, as used in Office 2003 SP2, Works 8.0, and Works Suite 2005, allows remote malicious users to execute arbitrary code via a .wps file with crafted section length headers, aka "Microsoft Works File Converter Input Validation Vu...
Microsoft Office 2003
Microsoft Works 2005
Microsoft Works 8.0
1 EDB exploit
9.3
CVSSv2
CVE-2008-0108
Stack-based buffer overflow in wkcvqd01.dll in Microsoft Works 6 File Converter, as used in Office 2003 SP2 and SP3, Works 8.0, and Works Suite 2005, allows remote malicious users to execute arbitrary code via a .wps file with crafted field lengths, aka "Microsoft Works File...
Microsoft Office 2003
Microsoft Works 2005
Microsoft Works 8.0
2 EDB exploits
2.6
CVSSv2
CVE-2006-3653
wksss.exe 8.4.702.0 in Microsoft Works Spreadsheet 8.0 allows remote malicious users to cause a denial of service (CPU consumption or crash) via crafted (1) Works, (2) Excel, and (3) Lotus 1-2-3 files.
Microsoft Works 8.0
1 EDB exploit
2.6
CVSSv2
CVE-2006-3654
Buffer overflow in wksss.exe 8.4.702.0 in Microsoft Works Spreadsheet 8.0 allows remote malicious users to cause a denial of service (CPU consumption or crash) via crafted Excel files.
Microsoft Works 8.0
9.3
CVSSv2
CVE-2008-3018
Microsoft Office 2000 SP3, XP SP3, and 2003 SP2; Office Converter Pack; and Works 8 do not properly parse the length of a PICT file, which allows remote malicious users to execute arbitrary code via a crafted PICT file, aka the "Malformed PICT Filter Vulnerability," a d...
Microsoft Office 2000
Microsoft Office Converter Pack
Microsoft Works 8.0
9.3
CVSSv2
CVE-2008-3460
WPGIMP32.FLT in Microsoft Office 2000 SP3, XP SP3, and 2003 SP2; Office Converter Pack; and Works 8 does not properly parse the length of a WordPerfect Graphics (WPG) file, which allows remote malicious users to execute arbitrary code via a crafted WPG file, aka the "WPG Ima...
Microsoft Office 2000
Microsoft Office Converter Pack
Microsoft Works 8.0
Microsoft Office 2003
Microsoft Office Xp
9.3
CVSSv2
CVE-2008-3019
Microsoft Office 2000 SP3, XP SP3, and 2003 SP2; Office Converter Pack; and Works 8 do not properly parse the length of an Encapsulated PostScript (EPS) file, which allows remote malicious users to execute arbitrary code via a crafted EPS file, aka the "Malformed EPS Filter ...
Microsoft Office 2000
Microsoft Office Converter Pack
Microsoft Works 8.0
Microsoft Office 2003
Microsoft Office Xp
9.3
CVSSv2
CVE-2008-3020
Microsoft Office 2000 SP3 and XP SP3; Office Converter Pack; and Works 8 do not properly parse the length of a BMP file, which allows remote malicious users to execute arbitrary code via a crafted BMP file, aka the "Malformed BMP Filter Vulnerability."
Microsoft Office 2003
Microsoft Office Xp
Microsoft Office 2000
Microsoft Office Converter Pack
Microsoft Works 8.0
9.3
CVSSv2
CVE-2008-3021
Microsoft Office 2000 SP3, XP SP3, and 2003 SP2; Office Converter Pack; and Works 8 do not properly parse the length of a PICT file, which allows remote malicious users to execute arbitrary code via a crafted PICT file with an invalid bits_per_pixel field, aka the "PICT Filt...
Microsoft Works 8.0
Microsoft Office Xp
Microsoft Office Converter Pack
Microsoft Office 2000
Microsoft Office 2003
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
blind SQL injection
SSRF
buffer overflow
CVE-2023-28952
CVE-2023-41822
CVE-2024-27956
CVE-2023-7028
CVE-2024-34447
CVE-2024-34460
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
3
4
NEXT »