Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
microsoft visual basic 6.0 vulnerabilities and exploits
(subscribe to this query)
9.3
CVSSv2
CVE-2008-2959
Buffer overflow in a certain ActiveX control (vb6skit.dll) in Microsoft Visual Basic Enterprise Edition 6.0 SP6 might allow remote malicious users to execute arbitrary code via a long lpstrLinkPath argument to the fCreateShellLink function.
Microsoft Visual Basic Enterprise Edition 6.0
1 EDB exploit
10
CVSSv2
CVE-2007-0065
Heap-based buffer overflow in Object Linking and Embedding (OLE) Automation in Microsoft Windows 2000 SP4, XP SP2, Server 2003 SP1 and SP2, Vista, Office 2004 for Mac, and Visual basic 6.0 SP6 allows remote malicious users to execute arbitrary code via a crafted script request.
Microsoft Office
Microsoft Visual Basic 6.0
9.3
CVSSv2
CVE-2008-0392
Multiple buffer overflows in Microsoft Visual Basic Enterprise Edition 6.0 SP6 allow user-assisted remote malicious users to execute arbitrary code via a .dsr file with a long (1) ConnectionName or (2) CommandName line.
Microsoft Visual Basic 6.0
1 EDB exploit
9.3
CVSSv2
CVE-2007-4776
Buffer overflow in Microsoft Visual Basic 6.0 and Enterprise Edition 6.0 SP6 allows user-assisted remote malicious users to execute arbitrary code via a Visual Basic project (vbp) file containing a long Reference line, related to VBP_Open and OLE. NOTE: there are limited usage sc...
Microsoft Visual Basic 6.0
3 EDB exploits
9.3
CVSSv2
CVE-2007-2224
Object linking and embedding (OLE) Automation, as used in Microsoft Windows 2000 SP4, XP SP2, Server 2003 SP1 and SP2, Office 2004 for Mac, and Visual Basic 6.0 allows remote malicious users to execute arbitrary code via the substringData method on a TextNode object, which causes...
Microsoft Office 2004
Microsoft Visual Basic 6.0
9.3
CVSSv2
CVE-2007-2223
Microsoft XML Core Services (MSXML) 3.0 up to and including 6.0 allows remote malicious users to execute arbitrary code via the substringData method on a (1) TextNode or (2) XMLDOM object, which causes an integer overflow that leads to a buffer overflow.
Microsoft Xml Core Services 3.0
Microsoft Xml Core Services 6.0
Microsoft Xml Core Services 4.0
Microsoft Xml Core Services 5.0
1 EDB exploit
9.3
CVSSv2
CVE-2007-2884
Multiple stack-based buffer overflows in Microsoft Visual Basic 6 allow user-assisted remote malicious users to cause a denial of service (CPU consumption) or execute arbitrary code via a Visual Basic Project (vbp) file with a long (1) Description or (2) Company Name (VersionComp...
Microsoft Visual Basic 6.0
2 EDB exploits
2.6
CVSSv2
CVE-2006-4685
The XMLHTTP ActiveX control in Microsoft XML Parser 2.6 and XML Core Services 3.0 up to and including 6.0 does not properly handle HTTP server-side redirects, which allows remote user-assisted malicious users to access content from other domains.
Microsoft Xml Core Services 4.0
Microsoft Xml Core Services 6.0
Microsoft Xml Parser 2.6
Microsoft Xml Core Services 3.0
7.5
CVSSv2
CVE-2006-4686
Buffer overflow in the Extensible Stylesheet Language Transformations (XSLT) processing in Microsoft XML Parser 2.6 and XML Core Services 3.0 up to and including 6.0 allows remote malicious users to execute arbitrary code via a crafted Web page.
Microsoft Xml Core Services 3.0
Microsoft Xml Core Services 4.0
Microsoft Xml Core Services 6.0
Microsoft Xml Parser 2.6
10
CVSSv2
CVE-2006-4732
Unspecified vulnerability in Microsoft Visual Basic (VB) 6 has an unknown impact ("overflow") via a project that contains a certain Click event procedure, as demonstrated using the msgbox function and the VB.Label object.
Microsoft Visual Basic 6.0
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2020-4463
CVE-2024-29895
inject
CVE-2023-52689
CVE-2024-5049
CVE-2024-5051
privilege escalation
physical
CVE-2023-52676
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
NEXT »