Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
visual basic vulnerabilities and exploits
(subscribe to this query)
9.3
CVSSv2
CVE-2008-2959
Buffer overflow in a certain ActiveX control (vb6skit.dll) in Microsoft Visual Basic Enterprise Edition 6.0 SP6 might allow remote malicious users to execute arbitrary code via a long lpstrLinkPath argument to the fCreateShellLink function.
Microsoft Visual Basic Enterprise Edition 6.0
1 EDB exploit
9.3
CVSSv2
CVE-2008-1092
Buffer overflow in msjet40.dll prior to 4.0.9505.0 in Microsoft Jet Database Engine allows remote malicious users to execute arbitrary code via a crafted Word file, as exploited in the wild in March 2008. NOTE: as of 20080513, Microsoft has stated that this is the same issue as C...
Microsoft Word 2007 Sp1
Microsoft Word 2000
Microsoft Word 2003 Sp3
Microsoft Word 2007
Microsoft Word 2002
Microsoft Word 2003
10
CVSSv2
CVE-2007-0065
Heap-based buffer overflow in Object Linking and Embedding (OLE) Automation in Microsoft Windows 2000 SP4, XP SP2, Server 2003 SP1 and SP2, Vista, Office 2004 for Mac, and Visual basic 6.0 SP6 allows remote malicious users to execute arbitrary code via a crafted script request.
Microsoft Office
Microsoft Visual Basic 6.0
9.3
CVSSv2
CVE-2008-0392
Multiple buffer overflows in Microsoft Visual Basic Enterprise Edition 6.0 SP6 allow user-assisted remote malicious users to execute arbitrary code via a .dsr file with a long (1) ConnectionName or (2) CommandName line.
Microsoft Visual Basic 6.0
1 EDB exploit
9.3
CVSSv2
CVE-2007-6026
Stack-based buffer overflow in Microsoft msjet40.dll 4.0.8618.0 (aka Microsoft Jet Engine), as used by Access 2003 in Microsoft Office 2003 SP3, allows user-assisted malicious users to execute arbitrary code via a crafted MDB file database file containing a column structure with ...
Microsoft Jet 4.0.8618.0
Microsoft Office 2003
Microsoft Windows Xp
Microsoft Windows 2003 Server
Microsoft Windows Nt 4.0
Microsoft Windows 2000
1 EDB exploit
9.3
CVSSv2
CVE-2007-4776
Buffer overflow in Microsoft Visual Basic 6.0 and Enterprise Edition 6.0 SP6 allows user-assisted remote malicious users to execute arbitrary code via a Visual Basic project (vbp) file containing a long Reference line, related to VBP_Open and OLE. NOTE: there are limited usage sc...
Microsoft Visual Basic 6.0
3 EDB exploits
9.3
CVSSv2
CVE-2007-3041
Unspecified vulnerability in the pdwizard.ocx ActiveX object for Internet Explorer 5.01, 6 SP1, and 7 allows remote malicious users to execute arbitrary code via unknown vectors related to Microsoft Visual Basic 6 objects and memory corruption, aka "ActiveX Object Memory Cor...
Microsoft Internet Explorer 5.01
Microsoft Internet Explorer 6
Microsoft Internet Explorer 7
9.3
CVSSv2
CVE-2007-2223
Microsoft XML Core Services (MSXML) 3.0 up to and including 6.0 allows remote malicious users to execute arbitrary code via the substringData method on a (1) TextNode or (2) XMLDOM object, which causes an integer overflow that leads to a buffer overflow.
Microsoft Xml Core Services 3.0
Microsoft Xml Core Services 6.0
Microsoft Xml Core Services 4.0
Microsoft Xml Core Services 5.0
1 EDB exploit
9.3
CVSSv2
CVE-2007-2224
Object linking and embedding (OLE) Automation, as used in Microsoft Windows 2000 SP4, XP SP2, Server 2003 SP1 and SP2, Office 2004 for Mac, and Visual Basic 6.0 allows remote malicious users to execute arbitrary code via the substringData method on a TextNode object, which causes...
Microsoft Office 2004
Microsoft Visual Basic 6.0
5.8
CVSSv2
CVE-2007-3142
Visual truncation vulnerability in Opera 9.21 allows remote malicious users to spoof the address bar and possibly conduct phishing attacks via a long hostname, which is truncated after 34 characters, as demonstrated by a phishing attack using HTTP Basic Authentication.
Opera Opera Browser 9.21
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2023-7028
memory leak
log injection
CVE-2024-3400
CVE-2022-48695
CVE-2022-48675
CVE-2024-34487
CVE-2024-33792
spoof
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
NEXT »