Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
microsoft works 8.0 vulnerabilities and exploits
(subscribe to this query)
935
VMScore
CVE-2007-0216
wkcvqd01.dll in Microsoft Works 6 File Converter, as used in Office 2003 SP2, Works 8.0, and Works Suite 2005, allows remote malicious users to execute arbitrary code via a .wps file with crafted section length headers, aka "Microsoft Works File Converter Input Validation Vu...
Microsoft Office 2003
Microsoft Works 2005
Microsoft Works 8.0
1 EDB exploit
935
VMScore
CVE-2008-0105
Microsoft Works 6 File Converter, as used in Office 2003 SP2 and SP3, Works 8.0, and Works Suite 2005, allows remote malicious users to execute arbitrary code via a .wps file with crafted section header index table information, aka "Microsoft Works File Converter Index Table...
Microsoft Office 2003
Microsoft Works 8.0
Microsoft Works 2005
1 EDB exploit
940
VMScore
CVE-2008-0108
Stack-based buffer overflow in wkcvqd01.dll in Microsoft Works 6 File Converter, as used in Office 2003 SP2 and SP3, Works 8.0, and Works Suite 2005, allows remote malicious users to execute arbitrary code via a .wps file with crafted field lengths, aka "Microsoft Works File...
Microsoft Office 2003
Microsoft Works 2005
Microsoft Works 8.0
2 EDB exploits
265
VMScore
CVE-2006-3653
wksss.exe 8.4.702.0 in Microsoft Works Spreadsheet 8.0 allows remote malicious users to cause a denial of service (CPU consumption or crash) via crafted (1) Works, (2) Excel, and (3) Lotus 1-2-3 files.
Microsoft Works 8.0
1 EDB exploit
231
VMScore
CVE-2006-3654
Buffer overflow in wksss.exe 8.4.702.0 in Microsoft Works Spreadsheet 8.0 allows remote malicious users to cause a denial of service (CPU consumption or crash) via crafted Excel files.
Microsoft Works 8.0
828
VMScore
CVE-2008-3018
Microsoft Office 2000 SP3, XP SP3, and 2003 SP2; Office Converter Pack; and Works 8 do not properly parse the length of a PICT file, which allows remote malicious users to execute arbitrary code via a crafted PICT file, aka the "Malformed PICT Filter Vulnerability," a d...
Microsoft Office 2000
Microsoft Office Converter Pack
Microsoft Works 8.0
828
VMScore
CVE-2008-3020
Microsoft Office 2000 SP3 and XP SP3; Office Converter Pack; and Works 8 do not properly parse the length of a BMP file, which allows remote malicious users to execute arbitrary code via a crafted BMP file, aka the "Malformed BMP Filter Vulnerability."
Microsoft Office 2003
Microsoft Office Xp
Microsoft Office 2000
Microsoft Office Converter Pack
Microsoft Works 8.0
828
VMScore
CVE-2008-3019
Microsoft Office 2000 SP3, XP SP3, and 2003 SP2; Office Converter Pack; and Works 8 do not properly parse the length of an Encapsulated PostScript (EPS) file, which allows remote malicious users to execute arbitrary code via a crafted EPS file, aka the "Malformed EPS Filter ...
Microsoft Office 2000
Microsoft Office Converter Pack
Microsoft Works 8.0
Microsoft Office 2003
Microsoft Office Xp
828
VMScore
CVE-2008-3460
WPGIMP32.FLT in Microsoft Office 2000 SP3, XP SP3, and 2003 SP2; Office Converter Pack; and Works 8 does not properly parse the length of a WordPerfect Graphics (WPG) file, which allows remote malicious users to execute arbitrary code via a crafted WPG file, aka the "WPG Ima...
Microsoft Office 2000
Microsoft Office Converter Pack
Microsoft Works 8.0
Microsoft Office 2003
Microsoft Office Xp
828
VMScore
CVE-2008-3021
Microsoft Office 2000 SP3, XP SP3, and 2003 SP2; Office Converter Pack; and Works 8 do not properly parse the length of a PICT file, which allows remote malicious users to execute arbitrary code via a crafted PICT file with an invalid bits_per_pixel field, aka the "PICT Filt...
Microsoft Works 8.0
Microsoft Office Xp
Microsoft Office Converter Pack
Microsoft Office 2000
Microsoft Office 2003
VMScore
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-22460
CVE-2024-4646
CVE-2024-29212
IMAP
CVE-2023-36672
CVE-2024-34547
command injection
CVE-2024-4651
stored XSS
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
3
4
NEXT »